Page 41 - UNIZULU Disaster Management Plan Report
P. 41
11. BOMB THREAT AND SUSPECT THREAT
There are three levels of response which broadly equate to threat levels as shown below:
UNIVERSITY OF ZULULAND
RESPONSE LEVEL
DESCRIPTION
THREAT LEVELS
Normal
Routine protective security measures appropriate to the business concerned
Low and Moderate
Heightened
Additional and sustainable protective security measures reflecting the broad nature of the threat combined with specific business and geographical vulnerabilities and judgements on acceptable risk
Substantial and Severe
Exceptional
Maximum protective security measures to meet specific threats and to minimise vulnerability and risk
Critical
Bomb threats and other threats of violence are serious emergencies that require prompt attention. Even though evacuations are disruptive, employees and students will be required to evacuate; and a safety perimeter will be established around the affected buildings in the event of a bomb threat.
If you receive a bomb threat over the phone, remain calm and courteous. If feasible, notify another person to listen on a different extension. Take notes on the caller’s threat, tone, voice characteristics, and background noise.
Upon receiving a threatening call, note down important details, outlined in the bomb threat checklist.
AFTER HOURS CALL PSD
IMMEDIATELY! DIAL 6599
HOT
If you discover (or are called to) an unattended item or an object that appears out of place, consider the following HOT characteristics when attempting to confirm its status:
• Has the item been hidden? Has any attempt been made to conceal it from view or place
it where accidental discovery is unlikely? Innocent items are not usually deliberately hidden. Because of the consequences of the device being found before it functions, explosive devices are not usually left in the open.
• Is the item obviously suspicious? Does it look like a bomb? (Does it have wiring; circuitry; a power supply or something that may be explosives attached to it? Has it been found after a suspicious event?) Does it look like any of the items you have seen during training or security briefings?
• Is the item typical of what you might reasonably expect to find in the given location? For example, lost property is often found in locations where people congregate or wait before moving to a new location.
DISASTER MANAGEMENT PLAN
37