Presentation is loading. Please wait.

Presentation is loading. Please wait.

Secretaries’ In-Service Officer Cindy Paz Brownsville ISD Police & Security Department.

Similar presentations


Presentation on theme: "Secretaries’ In-Service Officer Cindy Paz Brownsville ISD Police & Security Department."— Presentation transcript:

1 Secretaries’ In-Service Officer Cindy Paz cpaz1@bisd.us Brownsville ISD Police & Security Department

2 Visitor Management Procedures Ask for a valid Identification for all visitors Conduct sex offender check on all visitors who will access student populated areas Keep visitor passes in a safe location out of reach Apply the 90/10 rule Escort visitors at all times

3 Texas Sex Offender Registry https://records.txdps.state.tx.us/DPS_WEB/ SorNew/PublicSite/Search/index.aspx?Page Index=Search&SearchType=Namerecords.txdps.state.tx.us/DPS_WEB/ SorNew/PublicSite/Search/index.aspx?Page Index=Search&SearchType=Name

4 Purpose To help you recognize situations that impact potential verbal and physical abuse by a student or visitor toward staff. To provide tools to help you de-escalate a volatile situation. Your safety and welfare are important to us.

5 Defusing a Situation Be aware of the anxiety level Note when situation first escalates. Louder voice Fidgeting, verbal sounds Build up of energy Be Proactive not Reactive. Attend before things get out of hand. The staff needs to be in control by actively defusing the student or visitor.

6 Defusing Techniques Avoid arguing or defending previous actions. Avoid threatening body language (don’t stand with arms crossed). Calmly but firmly outline limits of the setting.

7 Defusing a Situation Watch for the Defense Phase If situation continues to escalate, student or visitor will give more physical cues (louder, more agitated verbalizations, etc). Staff needs to intervene to defuse. –Reduce stimulation from setting…eg. bring to an office. –Communicate information about any delays etc. –Give some choices. As emotions increase, auditory processing abilities decrease.

8 Defusing Techniques Give an upset student or visitor plenty of personal space. Allow a frustrated person some time to vent. Ignore personal verbal “attacks”.

9 Violence Reduction Strategies Limit stimulation and traffic in location. If there is a trusted person that can be identified, consider suggesting that the person be present to help calm the individual.

10 Tips: Dealing with Agitated Persons Isolate the person who is agitated if possible. Position yourself between the person and the exit. (Safely) Call for help. Offer simple statements.

11 Acting Out Level Visitor looses control Staff need to remain professional and in control. It is not personal. Use calm voice…simple statements. The visitor can’t process as well as normal. Help visitor get in control. “I want to hear what you have to say but I can’t do it when you are screaming”. Call for assistance

12 Emergency Response Procedures Lockdown-3 drills per school year Soft Lockdown-1 drill per school year Shelter in Place-1 drill per school year Evacuation-Monthly Fire Drill Severe Weather Drop Cover and Hold-1 drill per school year

13 No screening is 100% effective. That’s why we developed this program to help you recognize a potentially harmful mail piece and instruct you what to do if you get suspicious mail.

14 General guidelines Do not eat or drink while handling the mail. If you have open cuts or skin lesions on your hands, wear disposable vinyl gloves. Upon completion of your postal task wash your hands with anti-bacterial soap and warm water.

15 Main threats Bomb Anthrax

16 What mail is suspicious? Anything out of pattern! If you have received a piece of mail which looks different from what you receive usually, be cautious. Remember, most mail carriers (USPS, UPS, FEDEX etc) usually deliver mail at the same time and leaves it at the same spot every day. If you find a piece of mail in a different place, it could be left by somebody else.

17 What mail is suspicious? Look for a combination of the following signs: No return address Restrictive markings Misspelled words Badly typed or written

18 What mail is suspicious? Look for a combination of the following signs: Excessive postage Possibly mailed from foreign country Lopsided Rigid or bulky

19 What mail is suspicious? Look for a combination of the following signs: Oily stains, discolorations, or crystallization on wrapper Protruding wires Excessive tape or string Rattling or other sounds Strange odor

20 What mail is suspicious? Uneven, spongy appearance Powder on surface Powder on hands Powder flies when handled

21 Prevention: Suspicious Packages  Although the presence of one of these conditions does not mean, for certain, that there is a bomb in the package, check further if any of these indicators are present. Find out if the recipient is expecting the package, recognizes the return address, and if the package is the right size for the item expected. Verify the return address. If any of these items come up a "no," investigate further and alert police.  Most importantly, DO NOT OPEN ANY SUSPICIOUS PACKAGES. Many mail bombs are triggered by the act of opening the box or envelope. Leave the package where it is, evacuate the area, and call the bomb squad.

22 If you receive a suspicious letter or package What should you do? DO NOT OPEN Do not move Do not shake or bump Place it in a plastic bag or cover the envelope, letter, and contents. Notify your immediate supervisor and BISD Campus Security Turn A/C off. Leave the room and close the door.

23 WASH your hands with in a weak bleach solution or with soap and water. Ensure that all persons who have touched the letter wash their hands. If possible, take a shower. List all people who were in the room when this suspicious letter or package was recognized. Keep this group together until Security or police arrive. If you receive a suspicious letter or package What should you do?

24 The Reality of Bombs Bombings are very rare. In the last three years, there were only 65 incidents where an actual explosive device was placed in a school (excluding colleges and universities). However, from 1993-1997, juveniles were responsible for 34% of the bombings in the United States. In some states, the percentage is as high as 66%. 87% of the devices that juveniles build function, which is 6% higher than the national average of 81% for all bombs placed on a target. Juveniles have built sophisticated devices, some even using high explosives. We must investigate and respond to every bomb threat we receive. To respond properly and consistently, we have created a bomb threat response plan. This presentation will explain our plan.

25 The Reality of Bombs Even though bomb threats may be frightening, we must remain calm and professional. Our first priority is to safeguard students and staff. We must stick to the protocol to ensure that panic does not occur. We must also take measures to prevent bomb threats.

26 How Bomb Threats Can Be Communicated Phoned Written E-mailed Verbal Rumor Let’s look at the threat reception protocol for each method of communication.

27 Phoned Threats Remember these essential steps: Start recording device. Signal another staff member to listen, if possible. Transcribe the threat. Fill out as much of the Phoned Threat Data Sheet as possible, including detailed questions. Notify the Site Decision Maker of the threat. Complete any unanswered questions on the Phoned Threat Data Sheet. Be available after the call for the school's Bomb Threat Response Team and law enforcement to interview you.

28 Written Threats Remember these essential steps: Handle the item as little as possible. On a separate piece of paper, re-write the threat exactly as it reads. On this copy, also record:  Where the item was found  The date and time you found the item  Any situations or conditions surrounding the discovery  Any other person you are aware of who saw the threat Secure the original item. If small, place in a bag or envelope. DO NOT fold, crumple, tear, or mark the item in any way. If on a large object, secure the location. Notify the Site Decision Maker of the threat.

29 E-Mailed Threats Remember these essential steps: Leave the e-mail message open on the computer. Notify the Site Decision Maker and the [title of the computer supervisor at your school], [name of the computer supervisor at your school], of the threat Print, photograph, or copy down the message. Include the header of the e-mail. Save the e-mail. Leave the e-mail open until assistance arrives.

30 Verbal Threats Remember these essential steps: Detain the person making the threat, if possible and practical. If the person who made the threat leaves, note which direction they are going. If possible and safe, follow them at a discreet distance. Have another staff member notify the Site Decision Maker. Note the description of the person who made the threat: –Name, if you know them –Race –Sex –Type and color of clothing –Body size –Hair color –Distinguishing features  Write down the threat exactly as it was communicated to you:  Exact wording  Who made the threat  The date and time of the threat  Where the person who made the threat is now Notify the Site Decision Maker, if someone else has not already done so.

31 Rumors If you overhear a rumor about a bomb or explosive device threat or incident, write down exactly what you heard, from whom you heard it, and then report the rumor to the Site Decision Maker.

32 Prevention To combat bomb threats, we have implemented a two-part prevention initiative: –Improve the physical security of the school –Improve relations between students, faculty, and administration. It is especially important that we listen to students and make students feel comfortable coming forward with information.

33 As part of our incident prevention effort, all staff must be alert for suspicious items. School staff know what belongs in our building and what doesn’t. If you see an item that you feel does not belong or makes you suspicious in any way: –DO NOT TOUCH IT. –If possible, secure the area (such as locking the door to the room where the item is). –Notify the Site Decision Maker. Prevention: Suspicious Items


Download ppt "Secretaries’ In-Service Officer Cindy Paz Brownsville ISD Police & Security Department."

Similar presentations


Ads by Google