Date:
… courier deliveries:  Possible Indicators that a Delivered Item Might be of Concern please see:   NPSA Action Upon Discovery of any Suspicious Delivered Item NPSA Mail Screening Matters NPSA … Chemical Biological …
… to positively engage with customers and report any suspicious activity to security or police  Enhance your … staff members who are trained to operate it Unattended Items: Ensure staff understand how to respond to unattended items. Do staff know the HOT principles ?   For further …
… to counter terrorism across seven modules, including suspicious activity and items, marauding attackers and bomb threats. In addition to …
… including Run Hide Tell and how to respond to unattended or suspicious items Information resources, local schemes and legislation  …
… seem right Run Hide Tell – What to do in a terrorist attack Suspicious items And if you’re an organiser of an event, concert or … attack Guide to evacuation & lockdown What to do about suspicious items Dealing with bomb threats      Hazardous …
… community have a vital role in alerting the authorities to suspicious activity that may be the prelude to a terrorist attack. This can include: Suspicious purchases of items or materials that could be used as a weapon or …
… from the public help police to respond early to potentially suspicious activity. If you see or hear something that …     Stay Vigilant Bomb Threat Guidance    Unattended and suspicious items Marauding Terrorist Attacks (MTA)   The Action …
… Young people should feel able and confident to report suspicious behaviour or items, and to protect themselves in the unlikely event of …
…   'Recruit’ staff to be vigilant and immediately report suspicious activity and items: use existing staff communication channels, such as … shift briefings and the intranet, to inform your staff what suspicious activity may look like. Encourage them to trust …
… and entry, such as not carrying unnecessary or forbidden items; • Ensuring that staff phones are charged and numbers … where you would run to; • Be aware of the possibility of suspicious activity or items, and report them if you are … • Modules include how to identify security vulnerabilities, suspicious activity and how to respond to a weapons attack; …