Date:
Please note that premises used for counting ballot papers may well be used for other purposes until shortly before counting commences. It is imperative therefore, that a thorough search be made as near as possible to the arrival of the first ballot box. Particular attention must be paid to the storage and delivery areas for ballot boxes, exits and…
Implementing the SCA should lead to fewer security-related changes being required at a later stage. It also reduces the chance of repeating mistakes that may have compromised security in the past.
The use of vehicles as a weapon remains a realistic possibility, amongst other forms of attack covered later in this section. Vehicles are widely available and easy to use with devastating effect. Consequently, driving a vehicle into a queue or crowd is a low complexity attack that is easy to initiate.
… or acidic substance. For further advice download the Threat Recognition Guide … Screening mail and courier …
… Video Surveillance Systems) detect intruders and/or high threat scenarios control access to secure areas, when used …
Good housekeeping is an important part of your security regime, helping to reduce the opportunity for placing suspicious items or bags and helping to deal with false alarms and hoaxes.
If you receive suspicious item call 999 and ask for the police. Clear the area immediately. Do not attempt to open the letter or package. Avoid unnecessary handling. Keep it separate so it is easily identifiable.
If you are alerted to a firearms or weapons attack, stay calm, RUN or HIDE, only when it is safe TELL the police
Most social media companies provide advice about online security. This includes guidance on how to secure your account and how to report incidents of online abuse, harassment and intimidation.