![]() (Find out more about the " If You See Something, Say Something®" campaign.) A suspicious item is any item (e.g., bag, package, vehicle, etc.) that is reasonably believed to contain explosives, an Improvised Explosive Device (IED), or other hazardous material that requires a bomb technician and/or specialized equipment to further evaluate it. Together we can help keep our communities safe-if you see something that is suspicious, out of place, or doesn't look right, say something. Watch the Bomb Threat Training Video below and refer to the DHS-DOJ Bomb Threat Guidance for more information. Facility supervisors and/or law enforcement will assess the situation and provide guidance regarding facility lock-down, search, and/or evacuation. ![]() Be available for interviews with facility supervisors and/or law enforcement.For threats made in person, via email, or via written note, refer to the DHS Bomb Threat Checklist and DHS-Department of Justice (DOJ) Bomb Threat Guidance for more information.Write down as much information as possible-caller ID number, exact wording of threat, type of voice or behavior, etc.-that will aid investigators.If possible, signal or pass a note to other staff to listen and help notify authorities.DO NOT HANG UP, even if the caller does.Be polite and show interest to keep them talking. Keep the caller on the line as long as possible.Refer to the Department of Homeland Security (DHS) Bomb Threat Checklist for guidance, if available.Call 9-1-1 or your local law enforcement if no facility supervisor is available.(See below for assistance with developing a plan for your facility or location.) Notify your facility supervisor, such as a manager, operator, or administrator, or follow your facility's standard operating procedure.Facility supervisors and law enforcement will be in the best position to determine the credibility of the threat. Every bomb threat is unique and should be handled in the context of the facility or environment in which it occurs. ![]() Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.Bomb threats are most commonly received via phone, but are also made in person, via email, written note, or other means. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner Disclaimer: Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. and/or its affiliates and is used herein with permission. The GARTNER PEER INSIGHTS CUSTOMERS’ CHOICE badge is a trademark and service mark of Gartner, Inc. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose. Gartner® Peer Insights™ content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner, Gartner Peer Insights ‘Voice of the Customer’: Privileged Access Management, Peer Contributors, 21 December 2021. Gartner, Magic Quadrant for Privileged Access Management, By Michael Kelley, etc., 19 July 2022.
0 Comments
Leave a Reply. |