Monday 20 July 2015

Develop Hostile Intruder Procedures For A School

Develop Hostile Intruder Procedures for a School


During a hostile intruder threat to your school, it is important to provide safe shelter fast. Develop a tight school security system to prevent a dangerous situation. Educate staff on evaluate suspicious activity or possible intruders. Have a check-in system at the main entrance of the school and a process for securing the building during class time.


Instructions


1. Initiate an immediate response plan. Establish a course of action for staff to take in case a hostile intruder enters the building. Whoever discovers the danger to security should immediately contact police, stay calm and communicate as many details as possible throughout the school.


2. Go to lockdown mode. Announce an emergency lockdown by intercom or other communication device. Secure the building. While a hostile intruder is in the building it is dangerous for students and employees to roam the halls.


3. Lock all classroom doors if possible. Instruct everyone to remain as quiet as they can and crouch down in places that are out of the line of sight of doors and windows.


4. Seek shelter in the nearest classroom if you happen to be in the hallway when the alarm sounds or an announcement is made. Use your judgment for keeping safe when an emergency confronts you. You might have to think fast and be resourceful to stay safe. This could include hiding, escaping or barricading a door or window.


5. Ensure proper communication systems throughout the building. Keep in contact with police during the entire situation.


6. Educate all school personnel about hostile intruder procedures. Have security seminars including what to do during a dangerous event.


7. Develop tasks for teachers and administrative personnel. Work into your emergency procedures steps for helping students take cover, communicating with departments and providing medical attention.

Tags: hostile intruder, Develop Hostile, Develop Hostile Intruder, Hostile Intruder, Hostile Intruder Procedures, Intruder Procedures