Emergency Management Plan Revision of May 1, 2011



Download 1.93 Mb.
Page11/19
Date18.10.2016
Size1.93 Mb.
1   ...   7   8   9   10   11   12   13   14   ...   19

CONCEPT of OPERATIONS

Although the greatest majority of these type incidents across the nation are hoaxes or false alarms, all threats or suspicious packages must be treated as a real threat until proven otherwise.
All GSWSA employees should remain alert and aware of their surroundings. Question packages, mail, or any other items that seem to be out-of-place or suspicious.


      1. EMERGENCY PROCEDURES


THREAT of a HARMFUL DEVICE
Refer to Action Forms 18, Bomb Threat Report form for documenting the threat.
Try to get as much information as possible: Where is the device? Why was it put here? When will it activate? Etc.

Write down exactly what the person says. Take note of speech patterns, accents, background noises, etc.


Report the threat immediately to Safety Manager, the Supervisor, the Division Chief, and the CEO.

If the above persons cannot be immediately contacted, initiate an evacuation by announcing “Code 89” over the intercom 3 times, then call 911 (preferably from a cell phone while evacuating).
All personnel hearing the Bomb Threat evacuation signal should visually scan their areas for anything out of the ordinary, then promptly evacuate in accordance with the Evacuation Plan in Appendix 12.
FOUND a SUSPICIOUS PACKAGE or MAIL

If a package appears suspicious for any reason, DO NOT OPEN IT.

Report the package immediately to Safety Manager and the department supervisor.
Depending on the specific circumstances, efforts may be made to authenticate the package before implementing emergency procedures. Is the recipient expecting the package? Can the sender be identified and contacted to verify the contents? Is this consistent with other packages routinely received? (If possible, the immediate area around the package should be evacuated and isolated during this process.)
If the package cannot be authenticated, or there is strong reason to believe it is a harmful package, initiate an evacuation by announcing “Code 89” over the intercom 3 times, then call 911 (preferably from a cell phone while evacuating).
NOTE: Not every suspicious package will require a full evacuation of the entire facility. For suspected chemical or biological agents, only the immediate area of the package will need to be evacuated and isolated.
SUSPICIOUS MATERIALS FOUND AFTER OPENING A PACKAGE
Most importantly – STAY CALM. Even if it should happen to be a harmful material, which is highly unlikely, following the correct procedures will significantly minimize the chances of anyone being harmed in any way.

As soon as the suspicious materials are discovered, gently put the package down, isolate the area if possible (close the door), move a safe distance away, and alert others of the situation.


If the package contains a suspected chemical or biological hazard, for example, a powdery substance, then try to gently cover the package with something to prevent the materials from becoming airborne. Isolate the area, alert others, and wash hands thoroughly with soap and water.

Report the incident immediately to Safety Manager and the department supervisor.


Depending on the specific circumstances, efforts may be made to authenticate the package before implementing emergency procedures. Is the recipient expecting the package? Can the sender be identified and contacted to verify the contents? Is this consistent with other packages routinely received? (The immediate area around the package should remain isolated during this process.)
If the package cannot be authenticated, or there is strong reason to believe it is a harmful package, initiate an appropriate evacuation and call 911.

NOTE: Not every suspicious package will require a full evacuation of the entire facility. For suspected chemical or biological agents, only the immediate area of the package will need to be evacuated and isolated.




      1. FOLLOW-UP

Safety Manager shall investigate all bomb threat / suspicious package incidents, and shall properly document and follow-up on all findings and resulting corrective actions and/or recommendations.




Physical Assault / Violence


      1. SITUATION

GSWSA employees are susceptible to the threat of physical violence or assault, which falls under the general heading of “Violence in the Workplace.”


      1. THREAT or HAZARD INFORMATION

Workplace Violence is the second leading cause of total deaths in the workplace. It is the leading cause of death for women in the workplace.

A large number of these deaths occur during the course of criminal acts such as armed robbery. (Refer to ESG-20, Armed Robbery.)


Physical violence in the workplace can come from a large number of sources, including but not limited to:

  • other employees

  • former employees

  • family or friends of employees

  • customers

  • sales or delivery persons

  • complete strangers / outsiders




      1. CONCEPT of OPERATIONS

This Guideline applies to physical violence incidents that are imminent, in progress, or have already occurred. For detailed procedures and requirements regarding other forms of “Violence in the Workplace”, refer to the GSWSA Safety Manual.
GSWSA employees involved in a confrontation or altercation that seems to be getting out of control should make every reasonable attempt to defuse or de-escalate the situation.


      1. EMERGENCY PROCEDURES

Notify the Human Resources Manager.
If necessary or appropriate, call 911 to notify the police.
If the area is not safe, or if others are potentially threatened by the incident, alert everyone in the area and attempt to move to a safe location.
If the incident results in injuries, refer to the Emergency Procedures in ESG-5, Multiple Employees Injured. Even if there is only one employee injured, many of these procedures will still apply and can provide helpful guidance.


      1. FOLLOW-UP

The Human Resources Manager shall investigate all physical assault / violence incidents, and shall properly document and follow-up on all findings and resulting corrective actions and/or recommendations


Armed Robbery


      1. SITUATION

GSWSA employees are susceptible to the threat of armed robbery, which falls under the general heading of “Violence in the Workplace.”
The Billing and Collections Teller area, in particular, could appear to be an attractive target to a would-be robbery.


      1. THREAT or HAZARD INFORMATION

Workplace Violence is the second leading cause of total deaths in the workplace. It is the leading cause of death for women in the workplace.
A large number of these deaths occur during the course of criminal acts such as armed robbery.


      1. CONCEPT of OPERATIONS

GSWSA has a number of “Panic Alarms” in various locations in the Administrative Center. Any one of these alarms, activated during a robbery, would initiate a police response.


      1. EMERGENCY RESPONSIBILITIES

Don’t be a hero; give the robber what he wants. Do not argue or resist.
Concentrate on remaining as calm as possible. Make no sudden moves; explain what you are going to do before you make any movements.
Try to take a mental snapshot of the robber. Focus on clothing type and color, weapon type, any physical features, speech patterns, etc.
If it can be done discreetly without the robber seeing, activate the silent alarm.

As the robber leaves, try to get a vehicle description and direction of travel.


Have someone immediately telephone the police with this information.
As soon possible after the robber is out of the building, lock both sets of front doors.
Notify Safety Manager, the department supervisor, the Division Chief, and the CEO.
Everyone involved or witnessing the robbery should immediately find a place to be alone, and write down anything and everything you can remember about the event and the robber. DO NOT discuss the incident or compare notes with anyone until after the police have conducted their interviews. Things other people say may influence your recollection of the incident.
Activate ISF-3, Emergency Communications.
Consider the emotional trauma of all those affected. GSWSA’s Employee Assistance Program (EAP) may be one resource, but if more immediate assistance is needed, the police and/or EMS may be able to activate other resources.


      1. FOLLOW-UP

Safety Manager shall coordinate and follow-up with law enforcement regarding all armed robbery incidents, and shall properly document and follow-up on all findings and resulting corrective actions and/or recommendations.




Terrorist Attack


      1. SITUATION

Water and wastewater utilities are considered by the federal government to be one of the nation’s “critical infrastructures”, which also makes them a potential terrorist target.
While it is believed to be highly unlikely, it is possible that GSWSA could be the target of a terrorist attack.
While it is believed to be highly unlikely, if a true terrorist organization chooses to target GSWSA, there is little that could be done to stop them.


      1. THREAT or HAZARD INFORMATION

The worst-case scenario for a terrorist attack involving GSWSA would be a successful contamination of our water Distribution System. While this is possible, it would be extremely difficult to accomplish, for a variety of reasons.
Terrorists could have many potential alternatives to a full water system contamination. The possibilities are almost endless, but some potential options might include: contaminating one portion of our water system; causing physical damage or destruction to one or more water treatment facilities; interrupting power to our facilities; causing physical damage or destruction to one or more wastewater collection or treatment facilities; disrupting our SCADA / telemetry systems; disrupting our computer system; causing physical damage or destruction to our Operations or Administrative Centers; attacking our employees; intentionally causing a chlorine release; etc.


      1. CONCEPT of OPERATIONS

GSWSA has conducted a comprehensive security Vulnerability Analysis (VA) of all our facilities and operations. The VA results and associated report are maintained under separate cover and are under very tight security restrictions.
The findings and recommendations of that report are being addressed, in part through updates and revisions to this plan that improve our emergency response procedures and capabilities, and also through a “Security” Capital Improvement Project (CIP) that deals with physical security improvements.

Given the assumption that a true terrorist organization would have the resources to carry out a planned attack despite any preventive measures we could realistically implement, GSWSA has chosen to focus our efforts primarily on early detection and rapid, effective response to the effects of the attack.


In the event of ANY terrorist activity targeting or involving GSWSA, full activation and implementation of our emergency plans will be required, as will close coordination with local, County, State, and Federal resources.


      1. EMERGENCY RESPONSIBILITIES

Response activities and operations should focus on the specific effects, or impact of the attack, rather than the source of the attack.

  • For injured employees, refer to ESG-5.

  • For fatalities involving employees, refer to ESG-6.

  • For disruption to power supplies, refer to ESG-7.

  • For disruption to telephone service, refer to ESG-8.

  • For disruption of SCADA systems, refer to ESG-9.

  • For disruption of IS / IT systems, refer to ESG-10.

  • For water system contamination, refer to ESG-13.

  • For an intentional hazardous material release, refer to ESG-14.

  • For a fire or explosion, refer to ESG-17.

  • For a bomb or suspicious package, refer to ESG-18.




      1. FOLLOW-UP

Safety Manager shall work closely with law enforcement regarding all terrorism incidents, and shall properly document and follow-up on all findings and resulting corrective actions and/or recommendations.




  1. ACTION FORMS




    1. Hurricane

ACTION FORMS TO BE DEVELOPED





    1. Tornado

ACTION FORMS TO BE DEVELOPED




    1. Earthquake

ACTION FORMS TO BE DEVELOPED




    1. Severe Thunderstorm

ACTION FORMS TO BE DEVELOPED




    1. Multiple Employees Injured

ACTION FORMS TO BE DEVELOPED



    1. Employee Fatality

ACTION FORMS TO BE DEVELOPED





    1. Power Outage

ACTION FORMS TO BE DEVELOPED




    1. Telephone System Failure

ACTION FORMS TO BE DEVELOPED




    1. SCADA Failure / Cyber Attack

ACTION FORMS TO BE DEVELOPED




    1. MIS Failure / Cyber Attack

ACTION FORMS TO BE DEVELOPED



    1. Major Water Main Leak / Break

ACTION FORMS TO BE DEVELOPED



    1. Water System Pressure Loss




CALCULATING STORAGE RATE OF DECLINE

Maximum Storage Capacity = 9.8 Million Gallons (MG)

Critical” Storage Level = 30% = 2.94 MG



DATE _________________ TIME ____________ am / pm

CURRENT % ___________ CURRENT GALLONS _____________________


PREVIOUS Storage Level: Level: ________% Time: _______ am / pm


CURRENT Storage Level: Level: ________% Time: _______ am / pm
DIFFERENCE: (subtract) ________% _______ minutes

Convert “Difference” % to gallons:

9.8MG X “Difference” _______% = _________MG X 1,000,000 = _________________ gallons



Calculate Rate of Decline:
_________________ “Difference” gallons / ______ “Difference” minutes = ___________ GPM

Gallons Remaining Before Reaching “Critical” Level:
Current Storage _________________ gallons – 2,940,000 “critical” storage capacity
= _________________ gallons until “critical”

Time Remaining Before Reaching “Critical” Level:
_________________ gallons until “critical” / Rate of Decline _______________ GPM
= ___________ minutes until “critical” / 60 min/hour

= ___________ hours until reaching “critical” level at current pumping rates




Report By:



    1. Water System Contamination

ACTION FORM TO BE DEVELOPED





    1. Loss of Raw Water Supply

ACTION FORMS TO BE DEVELOPED




    1. Hazardous Materials Release

ACTION FORMS TO BE DEVELOPED





    1. Confined Space Emergency

ACTION FORMS TO BE DEVELOPED





    1. Trench / Excavation Collapse

ACTION FORMS TO BE DEVELOPED




    1. Fire / Explosion

ACTION FORMS TO BE DEVELOPED




    1. Bomb Threat / Suspicious Package




BOMB THREAT REPORT

Date:

Time Received:

Time Ended:

Received on Number / Line: Caller ID displayed:

Call was taken on the phone located:

GET SOMEONE’S ATTENTION IF YOU CAN – HAVE THEM GET ON THE LINE TOO

EXACT WORDS USED BY CALLER













QUESTIONS TO ASK

WHEN will it explode?

Did you place the bomb yourself?

WHERE is it?

WHY did you put it here?

WHAT will make it explode?

What is your name?

What does it look like?

Where are you right now?

Did you know there are a lot of people here?

CHARACTERISTICS

Caller

 Male


 Female

 Adult


 Juvenile

 Child


~Age:_____

Other:


Voice

 Loud


 Soft

 Deep


 High

 Raspy


 Pleasant

Other:



Accent

 None


 Local

 Foreign

__________

 Slight


 Moderate

 Heavy


Other:

Speech

 Fast


 Slow

 Clear


 Distorted

 Mumbled

 Stuttered

 Lisp


Other:

Language

 Excellent

 Good

 Fair


 Poor

 Foul


Other:

Manner

 Calm


 Angry

 Emotional

 Rational

 Irrational

 Righteous

 Laughing

Other:


Background

 Traffic

 Voices

 Music


 Planes

 Office


 Noisy

 Quiet


Other:


ADDITIONAL INFORMATION:










NAME:




    1. Physical Assault / Violence

ACTION FORMS TO BE DEVELOPED




    1. Armed Robbery

ACTION FORMS TO BE DEVELOPED




APPENDIX


    1. GSWSA Organization & System Information




      1. System Description




GENERAL INFORMATION

Service Area

See service area map – figure 1

Board Members

9 Members appointed by Governor

Employees (2011)

283

Customers

75,000










WATER INFORMATION

Water Source and Capacity

Pee Dee River (Bull Creek), Intercoastal, Wells

Water Treatment and Capacity




Average Daily Water Production




Total Storage Tank Capacity




Water Lines in System




Fire Hydrants in System




WASTEWATER INFORMATION

Wastewater Treatment and Capacity




Wastewater Lines in System




Wastewater Pump Stations




BACKGROUND & HISTORY














mg = million gallons mgd = million gallons per day



      1. Download 1.93 Mb.

        Share with your friends:
1   ...   7   8   9   10   11   12   13   14   ...   19




The database is protected by copyright ©ininet.org 2020
send message

    Main page