Your Solution for SMART Response Plans

Emergency Response Plan - Annexes for Added Incident Management

Posted on Mon, Aug 08, 2011

According to FEMA, the basic emergency operations plan should provide a broad scope of responses for potential emergency and crisis situations. Additional emergency response annexes that focus on hazard, threat, or incident-specific response needs can be added to broaden a site-specific basic plan to encompass the full range of hazards associated with a facility. These annexes contain unique and regulatory response details that apply to a single hazard, such as a pandemic response or hurricane plan. Depending upon the emergency operation plan’s structure and content amount, hazard-specific information may be included as either separate functional annexes or stand-alone hazard-specific annexes.

Hazard or incident-specific annexes should include many of the same details of the basic operations plan including, but not limited to:

  • Details of hazard-specific location(s)
  • Evacuation routes
  • Plot Plans
  • Specific provisions and protocols for warning employees, the public and disseminating emergency  information
  • Personal protective equipment and detection devices
  • Policies and processes for each specific hazard
  • Roles and responsibilities

Just as in the basic emergency operations plan, a planning team may use supporting documents as needed to clarify the contents of the incident specific plan. These supporting documents can include hazard specific aerial and facility maps, charts, tables, checklists, resource inventories, and summaries of critical information. For example, the hurricane plan may be made clearer by attaching maps marked with evacuation routes or shelter in place areas. Evacuation routes may change depending on the location or scale of the hazard.

Hazard-specific operational information usually includes, but is not limited to:

  • Assessment and control of the hazard information
  • Identification of unique prevention and preparedness of critical infrastructure/key resources
  • Protective actions
  • Communications procedures and warning systems
  • Implementation of protective actions
  • Identification of short-term stabilization actions
  • Implementation of recovery actions.

It is crucial to identify the critical functions necessary for a successful emergency response to a specific hazard in the planning development stage.  This may include identifying alternate communications methods in the event of a hurricane or pinpointing essential personnel to implement a pandemic plan. Hazard-specific annexes should follow the same layout and organizational format as the main operational plan to ensure consistency.

For tips and best practices on designing a crisis management program, download Best Practices for Crisis Management.

TRP Download

Tags: Pandemic Planning, Fire Pre Plans, Emergency Preparedness, Crisis Management, Facility Management, Emergency Management Program, Security plans, Terrorism Threat Management, FEMA, Hurricane Preparedness, Flood Preparedness

Emergency Management and Initial Response Actions for Communicated Threats

Posted on Thu, Jul 07, 2011

In 2011, the Department of Homeland Security released information regarding specific terrorist targets that they derived from terrorists' communications data. Included in these threats were highly combustible oil tankers and refineries.  Facilities that produce, store, or supply hazardous material should ensure their emergency management program contains a security plan that contains initial response actions in the event that they are targeted.

An example of initial response actions are as follows:

Person Receiving Threat

  • Document as much information as possible utilizing a Threat Report Form
  • Immediately notify the Facility Manager and remain available for additional questions.

On-Scene Commander

  • Activate and consult with EMT advisers and law enforcement and determine details of the threat. Consolidate evidence and evaluate facts.
  • Notify and consult with Facility Management. The following factors should be considered:
    • Method of threat delivery (in person, telephone, radio, written/letter, email, other, etc.).
    • Principal persons, groups, and/or facilities targeted.
    • Specific action(s) threatened.
    • Timetable of threatened action(s).
    • Persons or groups claiming responsibility (if any).
    • Number of similar threats to other facilities/installations in the area (if any) or any other event or condition which might provoke a threat.
    • Employee disturbance or contract labor unrest.
    • National or international politics, radical local activity, specific groups, etc.
    • Indication of juvenile hoax (if any).initial_Response_actions_TRP.jpg
  • Notify Corporate Management as appropriate
  • Contact Corporate Security.
  • Maintain low profile - no publicity if possible.
  • Coordinate further specific response actions with Corporate Management.
  • Identify/verify all potential victims.
  • Debrief employees/victims as to details of the threat.
  • Evaluate need for evacuation.
  • Facilitate emergency shutdowns if appropriate.
  • Develop Bomb Search Plan, if appropriate.
  • Review security and evacuation plans.
  • Implement personnel protection plan for targeted victim(s) and family members, if appropriate.
  • Implement employee and family assistance/counseling, as necessary.
  • Prepare for possible Search and Rescue with assistance of local authorities
  • Consult with corporate legal counsel.

Post-Incident Actions

  • Review and update emergency plan procedures.
  • Review and update evacuation plans.
  • Conduct post-incident investigation.
  • Conduct team debriefings.
  • Perform response/cleanup operations as directed or coordinated by the On-Scene Commander.


Corporate Crisis Management

Tags: Emergency Preparedness, Emergency Management Program, Security plans, Terrorism Threat Management

Emergency Response Security Measures

Posted on Fri, Dec 03, 2010

According to the U.S. Coast Guard, “Perimeter protection is the first line of defense in providing physical security for personnel, property, and information at a facility.” Interior security controls should be determined by considering the monetary value and integral items and areas to be protected, the vulnerability of the facility, and the cost of the mitigation necessary to reduce vulnerabilities.

Due to the large amount of public attention and increased on-site population created at an oil spill site, fire, or industrial emergency, preparing for additional security measures should be part of the emergency planning processes.  

Several measures should be planned in advance to prepare security personnel for possible events that may occur at the spill site.

  • Restrict access to the facility.
  • Direct traffic away from the affected area.
  • Request assistance from those trained in security measures in the affected area.
  • Request assistance from the local authorities to:
    • Establish road blocks where necessary to secure the area
    • Divert local traffic away from the spill area
  • Provide monitored access for response equipment and personnel
  • If necessary, establish procedure to communicate with the FAA to restrict air space over the safety zone.
  • Contract for additional security personnel (as needed).
  • Maintain strict control over all personnel and entering vehicular traffic.
  • Position security personnel to effectively control non-response personnel.
  • Barricade lesser traveled points with appropriate signs warning against entry.
  • Establish check points at barricaded points to verify security effectiveness.
  • Maintain a log that documents all security related incidents and observations made at the spill site.
  • Establish a pass system and distribute pre-prepared security passes to all spill related personnel.
  • Ensure all response equipment is safeguarded.

The most efficient and cost-effective method of instituting security measures into any facility or operation is through advance planning and continuous monitoring throughout an emergency. Response security protocols should be reviewed to educate security personnel on roles and responsibilities. Such exercises can strengthen security awareness for the emergency response team and reduce the potential for security-related incidents.   

For tips and best practices on designing a crisis management program, download our Best Practices for Crisis Management.

TRP Download

Tags: Emergency Preparedness, Crisis Management, Emergency Management Program, Security plans, Emergency Action Plan

Facility Security Plans and the Maritime Transportation Security Act

Posted on Fri, Sep 24, 2010


Certain industrial and municipal facilities are vulnerable to breaches in security and associated threats. Those vulnerabilities vary according to the location and characteristics of the sites; however, the main goal of assessments are to identify and limit security risks to your facility, equipment, and personnel. Being able to identify and quantify risks allows you to establish policies and procedures that can minimize the risk and consequences of security threats, and provide increased safety.

Marine Transportation Security Act requires “any structure or facility of any kind located in, on, under, or adjacent to any waters subject to the jurisdiction of the United States to conduct a vulnerability assessment and prepare and submit a security plan to the Secretary of Homeland Security based on the assessment.”

The following topics should be considered in developing security plans:
  • Internal and external risks, and vulnerability assessment of those levels of risks.
  • On-site and/or off-site security oversight organization and specific duties and responsibilities.
  • Detailed list of security personnel and Facility Security Officer training, exercises and drill procedures.
  • Security of facility record keeping and documentation procedures.
  • Procedures for implementing MARSEC Level security measures, within 12 hours of notification of an increase.


  • Specific standard internal and external communications procedures, and alternate communication procedures (ex: Interfacing with Vessels, Declaration of Security (DoS)).
  • Security measures for access control in general and restricted areas for employees, contractors and outside parties for each MARSEC Level.
  • Identify alternate security measures if initial systems fail.
  • Identification of on-site and off-site security command center.
  • Evaluation and identification of procedures and security measure for deliveries of hazardous and/or non-hazardous materials, and delivery of vessel stores and bunkers.
  • Identification of potential ignition sources and security control procedures.
  • Detailed site-specific incident security and monitoring procedures.
  • Identification and evaluation of security procedures for auditing and updating security plans
  • Facilities must be able to present a Facility Security Assessment (FSA) Report and Facility Vulnerability and Security Measures Summary (Form CG-6025).
  • If these items are not included in the Facility Security plan, the plan will not be approved by Coast Guard Inspectors.


TRP Corp - Emergency Response Planning Crisis Management

Tags: USCG, CFATS, Emergency Preparedness, Security plans


Posted on Tue, Jul 27, 2010

With the unsuccessful bombing attempt in Times Square a few months ago, it is apparent that home-based terrorism continues to plague U.S. citizens and its infrastructure.  The security of vulnerable infrastructures, such as chemical plants and other facilities that house combustible material, has had little oversight until recently.  A plotted incident at one of these facilities could result in catastrophic loss.

However in 2007, the Department of Homeland Security was given the responsibility to develop and administer the appropriate security regulations for specific "high risk" facilities through the Section 550 of the DHS Appropriations Act of 2007.  These facilities are now required by the Department of Homeland Security to develop and implement security plans in accordance the Chemical Facility Anti-terrorism Standards (CFATS).  Any business or facility manufacturing, processing, using, or storing specific chemicals in specific quantities, unless exempt by statute or rule, must now adhere to CFATS requirements. 

The Department assigns facilities to one of four risk-based tiers, ranging from high (Tier 1) to low (Tier 4) risk. It is estimated that over 6,000 facilities are covered by CFATS regulations.  Facilities that submitted a Security Vulnerability Assessment (SVA) and were subsequently notified in writing as high-risk have access via the Chemical Security Assessment Tool (CSAT) to complete and submit the CSAT Site Security Plan (SSP) within 120 days. Congress established steep non-compliance penalties of up to $25,000 per day for missed deadlines and/or potential facility closure.

TRP Corp.

The SSP identifies and details countermeasure of security vulnerabilities. It should cover the current 18 Risk-Based Performace Standards, (RBPS) which covers

  • Area Perimeter
  • Site Assets
  • Screen and Control Access
  • Deter, Detect, and Delay
  • Shipping, Receipt, and Storage
  • Theft or Diversion
  • Sabotage
  • Cyber
  • Response
  • Monitoring
  • Training
  • Personnel Surety
  • Elevated Threats
  • Specific Threats, Vulnerabilities, or Risks
  • Reporting of Significant Security Incidents
  • Significant Security Incidents and Suspicious Activities
  • Officials and Organization
  • Record

Facilities will be inspected after an initial Site Security plan (SSP) approval to ensure CFATS compliance

For more tips and best practices on designing a crisis management program, download our Free Best Practices Guide

TRP Corp.

Tags: CFATS, Security plans