The price to be paid by an aircraft passenger for a particular journey.
When checking availability, each booking code represents a different cabin class or fare type. On all flights a variety of fares are offered. Highest fares which are flexible are normal fares. Those which are lower and less flexible are special fares.
Career Opportunities in Tourism and Hospitality Management(Bangladesh Perspec...Md Shaifullar Rabbi
This presentation has uploaded for the students of Tourism and Hospitality Management those who have desired to work Bangladesh Tourism and Hospitality Industry.
The Transportation Security Administration, an agency of the U.S. Department of Homeland Security, was created in the aftermath of 9/11 to oversee security for all transportation systems. This presentation, updated October 2015, provides information on the background, mission, and operations of TSA. For more information, visit www.tsa.gov.
The aviation system is a complex and interrelated network with concern on the airline operations safety. Safety in aviation involves airport conditions, aircraft maintenance, communication with the system operators and route information which aims at avoiding airline hazards on and off flights (Cushing, 1997). The Federal Aviation Regulations is a set of guidelines that are set for airline operations to be safe, enhancing effective air traffic control, effective airline safety measures among other safety procedures. There are also other aviation authorities that monitor commercial and general aviation to improve safety. The industry also depends on statistical research which justifies changes and improvements of the safety features of airlines. Safety in aviation also depends on external factors such as economic and political environments for effective safety measures and therefore the aerospace industry works in alliances and partnerships with other companies and the military aviation for a safe civil aviation practice (Cushing, 1997). Costs of operations, liability insurance covers, meteorological conditions and human errors which are safety related factors in commercial aviation are evaluated and used to develop safe and comfortable aviation practices in commercial aviation. In this paper, the safety guidelines in commercial aviation and the relevant authorities that monitor aviation safety are the significant concern especially in commercial airline companies.
Destination Management Public Sector and Tourism Policy Destination Image Development Attributes of Destination Destination Planning Destination Development and Sustainable Future
Compilation of reports and lectures on Travel Safety and Security for the subject TSMN07H Tour Guiding Services for the students of the College of International Tourism and Hospitality Management of the Lyceum of the Philippines Cavite Campus.
Central Reservation System (CRS) and Global Distribution System (GDS)Trawex Technologies
Trawex CRS really is your central place to manage everything. Trawex integrates global distribution systems which allow accessing for reserving airline seats, hotel rooms, rental cars, and other travel sectors.
Importance of Tourism Planning in Skyline College Delhithomasmary607
Looking a career in travel and tourism industry then you are in the right place. SKYLINE College is a career-oriented business professional school in India that can boost your prospects by joining the relevant courses in which you are interested. As we all know that the tourism industry is a fascinating one giving employees the advantages of meeting hundreds of people and a chance to see the world.
Tourist Security and the Role of the Tour GuideWhistling Crow
Today vacationers view their holidays as an escape from the worlds problems and worries. While on a tour, the last thing they wan to be concerned about is being victims of crime. Tourists while at destinations can be lucrative targets to crime, the thematic slide explores how tour guides may convert unprevented security calamity into a tolerable inconvenience.
The price to be paid by an aircraft passenger for a particular journey.
When checking availability, each booking code represents a different cabin class or fare type. On all flights a variety of fares are offered. Highest fares which are flexible are normal fares. Those which are lower and less flexible are special fares.
Career Opportunities in Tourism and Hospitality Management(Bangladesh Perspec...Md Shaifullar Rabbi
This presentation has uploaded for the students of Tourism and Hospitality Management those who have desired to work Bangladesh Tourism and Hospitality Industry.
The Transportation Security Administration, an agency of the U.S. Department of Homeland Security, was created in the aftermath of 9/11 to oversee security for all transportation systems. This presentation, updated October 2015, provides information on the background, mission, and operations of TSA. For more information, visit www.tsa.gov.
The aviation system is a complex and interrelated network with concern on the airline operations safety. Safety in aviation involves airport conditions, aircraft maintenance, communication with the system operators and route information which aims at avoiding airline hazards on and off flights (Cushing, 1997). The Federal Aviation Regulations is a set of guidelines that are set for airline operations to be safe, enhancing effective air traffic control, effective airline safety measures among other safety procedures. There are also other aviation authorities that monitor commercial and general aviation to improve safety. The industry also depends on statistical research which justifies changes and improvements of the safety features of airlines. Safety in aviation also depends on external factors such as economic and political environments for effective safety measures and therefore the aerospace industry works in alliances and partnerships with other companies and the military aviation for a safe civil aviation practice (Cushing, 1997). Costs of operations, liability insurance covers, meteorological conditions and human errors which are safety related factors in commercial aviation are evaluated and used to develop safe and comfortable aviation practices in commercial aviation. In this paper, the safety guidelines in commercial aviation and the relevant authorities that monitor aviation safety are the significant concern especially in commercial airline companies.
Destination Management Public Sector and Tourism Policy Destination Image Development Attributes of Destination Destination Planning Destination Development and Sustainable Future
Compilation of reports and lectures on Travel Safety and Security for the subject TSMN07H Tour Guiding Services for the students of the College of International Tourism and Hospitality Management of the Lyceum of the Philippines Cavite Campus.
Central Reservation System (CRS) and Global Distribution System (GDS)Trawex Technologies
Trawex CRS really is your central place to manage everything. Trawex integrates global distribution systems which allow accessing for reserving airline seats, hotel rooms, rental cars, and other travel sectors.
Importance of Tourism Planning in Skyline College Delhithomasmary607
Looking a career in travel and tourism industry then you are in the right place. SKYLINE College is a career-oriented business professional school in India that can boost your prospects by joining the relevant courses in which you are interested. As we all know that the tourism industry is a fascinating one giving employees the advantages of meeting hundreds of people and a chance to see the world.
Tourist Security and the Role of the Tour GuideWhistling Crow
Today vacationers view their holidays as an escape from the worlds problems and worries. While on a tour, the last thing they wan to be concerned about is being victims of crime. Tourists while at destinations can be lucrative targets to crime, the thematic slide explores how tour guides may convert unprevented security calamity into a tolerable inconvenience.
Making Quick Decission and Job Discription.pptxDenaLigo
key to quick decision-making is a balance between speed and thoughtfulness. While you want to act swiftly, it's crucial to ensure that you're not sacrificing critical thinking and analysis. Practice and experience will also improve your ability to make effective decisions under pressure.
These are the slides from the physical security presentation at the Cincinnati Networking Professionals Association Security Special Interest Group (CiNPA Security SIG) meeting on 08/16/2018. Topics covered include physical security control types and methods.
66Chapter 3Security Surveys and the AuditLawrence .docxblondellchancy
66
Chapter 3
Security Surveys and the Audit
Lawrence J. Fennelly, CPO, CSS, HLC III
A security survey is a critical on-site examination and analysis of a place, which may be an industrial
plant, business, home, or public or private institution to ascertain the present security status, identify
deficiencies or excesses, determine the protection needed, and make recommendations to improve the
overall security. Your survey or audit must include the external and internal complex, as well as the
identification of threats, identify controls, level of risk and your completed risk assessment, which
should include risk analysis, risk identification, and risk evaluation.
It is interesting to note that a definition of as outlined by the British Home Officecrime prevention
Crime Prevention Program—“the anticipation, recognition and appraisal of a crime risk and the
initiation of action to remove or reduce it”—could, in fact, be an excellent description of a security
survey. The only difference, of course, is that a survey generally does not become the “action” as such
but rather a basis for recommendations for action.
This definition can be divided into five components and analyzed so that its implications can be
applied to the development of a working foundation for the security surveyor:
1. How does the anticipation of a crime risk become important to the security or crimeAnticipation.
prevention surveyor? Obviously, a primary objective of a survey is the anticipation or prevention
aspects of a given situation—the pre- or before concept. Thus, an individual who keeps anticipation
in the proper perspective maintains a proper balance in the total spectrum of security surveying. In
other words, the anticipatory stage could be considered a prognosis of further action.
2. What does an individual need to conduct a survey of the relationships betweenRecognition.
anticipation and appraisal? Primarily, the ability to recognize and interpret what seems to be a
crime risk becomes an important skill a security surveyor acquires and develops.
3. The responsibility to develop, suggest, and communicate recommendations is certainlyAppraisal.
a hallmark of any security survey.
4. As defined in this text, a crime risk is the opportunity gained from crime. The totalCrime risk.
elimination of opportunity is most difficult, if not improbable. Therefore, the cost of protection is
measured in (1) protection of depth and (2) delay time. Obviously, the implementation of the
recommendation should not exceed the total (original or replacement) cost of the item(s) to be
protected. An exception to this rule would be human life.
5. This section indicates the phase of aThe initiation of action to remove or reduce a crime risk.
survey in which the recipient of the recommendations decides whether to act, based on the
suggestions (recommendations) set forth by the surveyor. In some cases, the identification of
Co
py
ri
gh
t
@
20
12
.
Bu
tt
er ...
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROLsecurexukweb
At Securex UK Ltd we are dedicated to providing top-rated security solutions tailored to your specific needs. With a team of highly trained professionals and cutting-edge technology, we prioritize your safety and peace of mind.
Our commitment to excellence extends beyond traditional security measures. We understand the dynamic nature of security challenges, and our personalized approach ensures that every client receives a bespoke protection plan.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
The Importance of Physical Security Safeguarding Your Assets.pdfMax Secure Ltd
Discover the importance of physical security in safeguarding assets and ensuring a resilient environment. Explore key insights on protecting people and property.
The importance of physical security can’t be easily stated since there are many parts to it, and its importance changes depending on the situation. There is a reason why it’s one of the oldest forms of security.
In this article, we will be looking at the different components of physical security and the reasons why it’s important. Also, we will help you figure out how you can implement physical security for yourself or your business.
Unlocking Safety The Importance of a Lockout StationLockout India
A lockout station plays a vital role in ensuring workplace safety by providing employees with the tools and equipment needed to implement lockout/tagout procedures effectively. By investing in a lockout station and promoting a culture of safety, employers demonstrate their commitment to protecting the well-being of their workforce and fostering a secure and productive work environment.
Perimeter Security: Explore the Importance of Security, Future Trends and Eme...GQ Research
In this article, we explore the importance of perimeter security and delve into effective strategies for bolstering protection in today's dynamic threat landscape.
Security The Essential Guidance & ClassificationsFinn Hunter
Security is defense from, or resilience against, potential harm (or different unwanted coercive change) brought on by others, by restraining the flexibility of others to act. Beneficiaries (technical referents) of safety might be of individuals and cultural communities, things and institutions, ecosystems, or any other entity or trend vulnerable to undesired change.
For more details please visit our website
https://fxtsa.com/
Customer Services, Behavioral Approach and Responsibilities of a Travel Agenc...Md Shaifullar Rabbi
Customer Services, Behavioral Approach and Responsibilities of a Travel Agency Staff...
Md Shaifullar Rabbi
Assistant Manager, Customer Support and Training Department , Sabre Travel Network Bangladesh Limited
A global distribution system (GDS) is a computerized network system owned or operated by a company that enables transactions between travel industry service providers, mainly airlines, hotels, car rental companies, and travel agencies.
Training on Ticketing and Reservation(GDS-Sabre)-RTO/RPL-NTVQF Level 2(BTEB)Md Shaifullar Rabbi
This presentation is prepared for the student of Ticketing and Reservation, NTVQF Level 2, Bangladesh Technical Education Board.
Prepared By Md Shaifullar Rabbi, Assistant Manager, Customer support and Training Department, Sabre Bangladesh & Assessor- Bangladesh Technical Education Board.
Sabre Global Distribution System, owned by Sabre Corporation, is a travel reservation system used by travel agents and companies to search, price, book, and ticket travel services provided by airlines, hotels, car rental companies, rail providers and tour operators. Originally developed by American Airlines with the assistance of IBM in 1960, the booking service became available for use by external travel agents in 1976 and became independent of the airline in March 2000.
The system's parent company is organized into three business units:
Sabre Travel Network: global distribution system
Sabre Airline Solutions: airline technology
Sabre Hospitality Solutions: hotel technology solutions
A travel document is an identity document issued by a government or international treaty organization to facilitate the movement of individuals or small groups of people across international boundaries
An itinerary is a plan of a journey showing the route and the places that the visitor will visit. Thus, it is a schedule or timetable produced in association with a package tour. It is basically designed to identify the route, day-by-day journey format, origin, destination, and all the enroute halting points, period of halts along with accommodation, mode of travel, activities and other services offered during a visitor’s tour.
A travel or tour brochure is a promotional material that advertises a destination, sightseeing attraction, or tour activity. Brochures can both inspire tourists to plan a trip as well as educate them about sights to see and things to do after they've arrived at their place of interest.
Sabre is a leading software and technology company that powers the global travel industry. With decades of revolutionary firsts, our team of experts drive innovation and ingenuity across the travel ecosystem. Sabre partners with airlines, hoteliers, agencies and other travel partners to retail, distribute and fulfill travel.
Our technology is the intelligence behind mobile apps, airport check-in kiosks, online travel sites, airline and hotel reservation networks, travel agent terminals, and scores of other travel solutions. Positioned at the center of the travel ecosystem, our platform enables our customers to connect people with experiences that matter in their lives.
Dating back to 1960, Sabre was born out of a joint initiative between American Airlines and IBM to create the world’s first computerized airline reservation system. We have since evolved into a technology ecosystem that touches almost every stage of a traveler’s experience. (Source-https://www.sabre.com/about/)
বাংলাদেশ পর্যটন করপোরেশন (বাপক) ১৯৭২ সালে মহামান্য রাষ্ট্রপতির ১৪৩ নং আদেশের মাধ্যমে প্রতিষ্ঠিত হয় এবং ১৯৭৩ সালে এর কার্যক্রম শুরুকরে। এটি বেসরকারী বিমান পরিবহন ও পর্যটন মন্ত্রণালয়ের অধীনে একটি স্বায়ত্বশাসিত প্রতিষ্ঠান।
Tour Operators Association of Bangladesh (TOAB) was formed in the year of 1992. This was the time when a handful of agencies operating tours inside Bangladesh, felt the need of such an association or trade body to overcome immense problems and difficulties being faced by them regularly. Besides this, the other main objective or aim of the organization was to develop and nourish tourism in Bangladesh and to promote the tourism products of Bangladesh in the international arena. After a long wait and completion of different formalities, the association was recognized as a trade organization by the Ministry of Commerce, Government of the People's Republic of Bangladesh in 2002. Currently, TOAB is having 751 active Members.
বাংলাদেশ একটি বৈচিত্র্যপূর্ণ পর্যটন সম্ভাবনাময় দেশ। বর্তমান বিশ্বে পর্যটন শিল্প একক বৃহত্তম অর্থনৈতিক কর্মকান্ড হিসেবে প্রতিষ্ঠা লাভ করেছে। পাশাপাশি এই শিল্পটি তার বহুমাত্রিক বৈশিষ্ঠ্যতার কারণে বিভিন্ন দেশে অর্থনৈতিক উন্নয়নের সাথে সাথে ব্যাপক কর্মসংস্থানের সুযোগ সৃষ্টি করেছে। অফুরন্ত প্রাকৃতিক সৌন্দর্যমন্ডিত বাংলাদেশে পর্যটন শিল্প খুবই সম্ভাবনাময়। পৃথিবীর যে কোন পর্যটককে আকৃষ্ট করার মত সকল পর্যটন আকর্ষণীয় উপাদান বাংলাদেশে বিদ্যমান। অপার সম্ভাবনাময় বাংলাদেশের পর্যটন শিল্পকে বিশ্বব্যাপী প্রচারের উদ্দেশ্যে এবং আমাদের এই সোনার বাংলাকে বিশ্ব দরবারে একটি ‘পর্যটন গন্তব্য’ হিসেবে প্রতিষ্ঠা করার লক্ষ্যে গণপ্রজাতন্ত্রী বাংলাদেশ সরকারের মাননীয় প্রধানমন্ত্রী শেখ হাসিনা’র নেতৃত্বে বর্তমান গণতান্ত্রিক সরকার পর্যটন আইন-২০১০-এর মাধ্যমে ২০১০ সালের সেপ্টেম্বর মাসে জাতীয় পর্যটন সংস্থা হিসেবে বাংলাদেশ ট্যুরিজম বোর্ড (বিটিবি) গঠন করেছে। পর্যটন শিল্পের উন্নয়ন এবং দেশের অর্থনীতিতে পর্যটন শিল্পের ক্রমবর্ধমান অবদানকে আরও শক্তিশালী করণ, সর্বোপরি বর্হি:বিশ্বে দেশের ভাবমুর্তি উন্নয়নের জন্য অন্যান্য দেশের ন্যায় জাতীয় পর্যটন সংস্থা (National Tourism Organization) বাংলাদেশ ট্যুরিজম বোর্ড প্রতিষ্ঠার পর থেকেই ব্যাপক প্রচার ও বিপণনের লক্ষ্যে নিরলস কাজ করে যাচ্ছে। Source- http://www.tourismboard.gov.bd/site/page/039c81b0-e8d4-4627-8f3e-f6c4a711b7e7/-
Discussion on "Classes of Service of Airlines"
Generally, airlines offer three main classes of service: 1. Economy class 2. Business class 3. First class Some airlines may differentiate within a class, and in addition to the standard service may offer a superior service within the same cabin. However, not all airlines offer three classes - some have two and others may only have one, and the classes offered may vary on different routes with varying aircraft types.
The Impact of Artificial Intelligence on Modern Society.pdfssuser3e63fc
Just a game Assignment 3
1. What has made Louis Vuitton's business model successful in the Japanese luxury market?
2. What are the opportunities and challenges for Louis Vuitton in Japan?
3. What are the specifics of the Japanese fashion luxury market?
4. How did Louis Vuitton enter into the Japanese market originally? What were the other entry strategies it adopted later to strengthen its presence?
5. Will Louis Vuitton have any new challenges arise due to the global financial crisis? How does it overcome the new challenges?Assignment 3
1. What has made Louis Vuitton's business model successful in the Japanese luxury market?
2. What are the opportunities and challenges for Louis Vuitton in Japan?
3. What are the specifics of the Japanese fashion luxury market?
4. How did Louis Vuitton enter into the Japanese market originally? What were the other entry strategies it adopted later to strengthen its presence?
5. Will Louis Vuitton have any new challenges arise due to the global financial crisis? How does it overcome the new challenges?Assignment 3
1. What has made Louis Vuitton's business model successful in the Japanese luxury market?
2. What are the opportunities and challenges for Louis Vuitton in Japan?
3. What are the specifics of the Japanese fashion luxury market?
4. How did Louis Vuitton enter into the Japanese market originally? What were the other entry strategies it adopted later to strengthen its presence?
5. Will Louis Vuitton have any new challenges arise due to the global financial crisis? How does it overcome the new challenges?
This comprehensive program covers essential aspects of performance marketing, growth strategies, and tactics, such as search engine optimization (SEO), pay-per-click (PPC) advertising, content marketing, social media marketing, and more
Want to move your career forward? Looking to build your leadership skills while helping others learn, grow, and improve their skills? Seeking someone who can guide you in achieving these goals?
You can accomplish this through a mentoring partnership. Learn more about the PMISSC Mentoring Program, where you’ll discover the incredible benefits of becoming a mentor or mentee. This program is designed to foster professional growth, enhance skills, and build a strong network within the project management community. Whether you're looking to share your expertise or seeking guidance to advance your career, the PMI Mentoring Program offers valuable opportunities for personal and professional development.
Watch this to learn:
* Overview of the PMISSC Mentoring Program: Mission, vision, and objectives.
* Benefits for Volunteer Mentors: Professional development, networking, personal satisfaction, and recognition.
* Advantages for Mentees: Career advancement, skill development, networking, and confidence building.
* Program Structure and Expectations: Mentor-mentee matching process, program phases, and time commitment.
* Success Stories and Testimonials: Inspiring examples from past participants.
* How to Get Involved: Steps to participate and resources available for support throughout the program.
Learn how you can make a difference in the project management community and take the next step in your professional journey.
About Hector Del Castillo
Hector is VP of Professional Development at the PMI Silver Spring Chapter, and CEO of Bold PM. He's a mid-market growth product executive and changemaker. He works with mid-market product-driven software executives to solve their biggest growth problems. He scales product growth, optimizes ops and builds loyal customers. He has reduced customer churn 33%, and boosted sales 47% for clients. He makes a significant impact by building and launching world-changing AI-powered products. If you're looking for an engaging and inspiring speaker to spark creativity and innovation within your organization, set up an appointment to discuss your specific needs and identify a suitable topic to inspire your audience at your next corporate conference, symposium, executive summit, or planning retreat.
About PMI Silver Spring Chapter
We are a branch of the Project Management Institute. We offer a platform for project management professionals in Silver Spring, MD, and the DC/Baltimore metro area. Monthly meetings facilitate networking, knowledge sharing, and professional development. For event details, visit pmissc.org.
Resumes, Cover Letters, and Applying OnlineBruce Bennett
This webinar showcases resume styles and the elements that go into building your resume. Every job application requires unique skills, and this session will show you how to improve your resume to match the jobs to which you are applying. Additionally, we will discuss cover letters and learn about ideas to include. Every job application requires unique skills so learn ways to give you the best chance of success when applying for a new position. Learn how to take advantage of all the features when uploading a job application to a company’s applicant tracking system.
NIDM (National Institute Of Digital Marketing) Bangalore Is One Of The Leading & best Digital Marketing Institute In Bangalore, India And We Have Brand Value For The Quality Of Education Which We Provide.
www.nidmindia.com
New Explore Careers and College Majors 2024.pdfDr. Mary Askew
Explore Careers and College Majors is a new online, interactive, self-guided career, major and college planning system.
The career system works on all devices!
For more Information, go to https://bit.ly/3SW5w8W
2. Speaker Profile:
Md. Shaifullar Rabbi
Tourism Educator & Consultant
Professional Experiences
Coordinator & Lecturer- Dept. of Tourism & Hospitality
Management, Daffodil Institute of IT(Affiliated National
University)
Assessor -Bangladesh Technical Education Board (Ticketing
and Reservation)
Guest Trainer - Sheikh Hasina National Institute of Youth
Development
GuestTrainer - ATABTourismTraining Institute
GuestTrainer- HB Aviation Training Center
Guest Trainer - Bangladesh Hotel Management Tourism
Training Institute
Former Manager sales - Mamun Air Service (IATA Travel
Agency)
Founder –Travel Memoria
Educational Qualifications
MBA & BBA-Major in Tourism & Hospitality
Management, University of Dhaka.
Certified NTVQF Level -4/Assessor Part (Ticketing
And Reservation)
Completed Diploma Course in Travel Agency &
Tour Operation Management
Certified NTVQF Level 2 Course entitled Ticketing
& Reservation
Certified NTVQF Level 1 Course entitled Tour
Guiding
3. Security Strategy
A Security Strategy is a document prepared periodically which outlines the major security concerns of a country or
organization and outlines plans to deal with them.
Effective security strategy
Risk Analysis – Analyzing risk helps you determine your tolerance levels for risk and which you can accept, avoid,
transfer, or prevent. Risk analysis can help determine how to best budget and prioritize security initiatives.
Classification of Data and Assets – It is necessary to understand the data and assets that your organization
maintains, and classify based on importance to the core business objectives. This helps you set priorities for levels
of security and set permissions for information access.
User Security Awareness Training – Without question, people pose the biggest threat to your organization via
accidental or malicious misuse or abuse of data. Employees must be properly trained on the sensitivity of data,
threats, and how to handle data appropriately. Employee awareness of company policy and procedures can
certainly help prevent data loss.
Management Approval – Management approval and executive sponsorship is the most important factor in the
success of a successful security program. Align your security strategy with business objectives to ensure
management approval. This can lead to improved employee adherence to policies and increased security budgets
leading to implementation of effective solutions that support the strategy.
4. An effective security plan should be based on the following principles
o It should result from collaboration between entity management, scientific, facilities, safety
and security personnel.
o It is built upon tested, well documented operational processes.
o It should account for and secure all biological select agents or toxins from creation or
acquisition to destruction.
o It complements other plans such as biosafety, disaster recovery, continuity of operations,
and others.
o It does not violate any laws. Laws to consider when creating the security plan include the
Americans with Disabilities Act, OSHA Safety Standards, and local building and fire codes.
o The entity should provide security plan training to ensure every person understands his or
her responsibilities.
o It requires reporting of all suspected security incidents and suspicious activities.
o It is reviewed at least annually and updated whenever conditions change.
o It is based on a site-specific risk assessment.
5. Security Plan Roles and Responsibilities
The security program should define each individual’s roles and
responsibilities and solicit their input for improvements. An
entity should be aware of, and collaborate with, the personnel
responsible for and/or impacting security.This may include:
o Responsible Official
o Facility key control and access control personnel
o Alarm companies
o Campus security personnel
o Security personnel who observe video
o Local law enforcement or other response forces
6. Key Entity Leadership
Certain parties should be involved in the process of designing and
implementing the security plan. These include, but are not limited
to:
o Owner/Controller
o Principal Investigator (PI)
o Responsible Official (RO)
o Alternate Responsible Official (ARO)
o Human Resources
o Biosafety staff
o Security staff
o Institutional Biosafety Committee
o Laboratory Management
7. Three Security Objectives
Deterrence: The ability to affect the
motivation / psychology of attacker and
upset their intention to compel them to
abandon or cancel the plan.
Detection: The ability to identify the
hazard usually at a portal or defined site.
Prevention: Physically intercepting the
attackers, after the initial sequence or
planning of the plot has been carried out.
8. Orientation with Security Equipment& Functionality
1. Standoff Distance : Standoff distance is a security term that refers to measures to prevent unscreened
and potentially threatening people and vehicles from approaching within a certain distance of
a building, car, or other shelter, roadblock or other location, or to a person such as a law enforcement
officer or VIP, or to a friendly area / location. Standoff distance is used when a violent criminal is in a
fortified position, when hostages are under armed threat from kidnappers, when a bomb is believed to
have been placed, or when other unspecified dangers may be lurking. It is a measure of distance used by
government, law enforcement, or military operatives handling the situation to protect their own agents
and civilians from physical injury or death while the situation is resolved.
2. Spike Strip: A spike strip (spike belt, traffic spikes, tire shredders, stingers, stop sticks or formally known
as a tire deflation device) is a device or incident weapon used to impede or stop the movement of
wheeled vehicles by puncturing their tires. Generally, the strip is composed of a collection of 35-to-75-
millimetre-long (1 1⁄2 to 3 in) metal barbs, teeth or spikes pointing upward. The spikes are designed to
puncture and flatten tires when a vehicle is driven over them; they may be detachable, with new spikes
fitted to the strip after use.
3. Separation Barrier : A separation barrier or separation wall is a barrier, wall or fence, constructed to
limit the movement of people across a certain line or border, or to separate peoples or cultures. A
separation barrier that runs along an internationally recognized border is known as a border barrier.
9. 4. Barbed Wire: Barbed wire, also known as barb wire, occasionally corrupted as bobbed wire or bob wire, is a
type of steel fencing wire constructed with sharp edges or points arranged at intervals along the strands. It is
used to construct inexpensive fences and is used atop walls surrounding secured property. It is also a major
feature of the fortifications in trench warfare (as a wire obstacle).
5. Electric Fence: An electric fence is a barrier that uses electric shocks to deter animals and people from
crossing a boundary. The voltage of the shock may have effects ranging from discomfort to death. Most electric
fences are used today for agricultural fencing and other forms of animal control, although they are also used to
protect high-security areas such as military installations or prisons, where potentially lethal voltages may be
used.
6. Access control system operation: When a credential is presented to a reader, the reader sends the credential's
information, usually a number, to a control panel, a highly reliable processor. The control panel compares the
credential's number to an access control list, grants or denies the presented request, and sends a transaction log
to a database. When access is denied based on the access control list, the door remains locked. If there is a
match between the credential and the access control list, the control panel operates a relay that in turn
unlocks the door. The control panel also ignores a door open signal to prevent an alarm. Often the reader
provides feedback, such as a flashing red LED for an access denied and a flashing green LED for an access
granted.
7. Airport security: Airport security refers to the techniques and methods used in an attempt to protect
passengers, staff, aircraft, and airport property from accidental/malicious harm, crime, terrorism, and other
threats. Aviation security is a combination of human and material resources to safeguard civil aviation against
unlawful interference. Unlawful interference could be acts of terrorism, sabotage, threat to life and property,
communication of false threat, bombing, etc.
10. 8. Safe Deposit Locker: A safe deposit box, also known as a safe deposit locker (SDL) and safety deposit box, is an
individually secured container, usually held within a larger safe or bank vault. Safe deposit boxes are generally located
in banks, post offices or other institutions such as private safe deposit vault companies. Safe deposit boxes are used
to store valuable possessions, such as gemstones, precious metals, currency, marketable securities, luxury goods,
important documents (e.g. wills, property deeds, or birth certificates), or computer data, which need protection
from theft, fire, flood, tampering, or other perils. Hotels, resorts, and cruise ships sometimes also offer safe deposit
boxes or small safes to their patrons, for temporary use during their stay. These facilities may be located behind
the reception desk, or securely anchored within private guest rooms for privacy.
9. Security Alarm: A security alarm is a system designed to detect intrusion – unauthorized entry – into a building or
other area such as a home or school. Security alarms are used in residential, commercial, industrial, and military
properties for protection against burglary (theft) or property damage, as well as personal protection against
intruders. Security alarms in residential areas show a correlation with decreased theft. Car alarms likewise help
protect vehicles and their contents. Prisons also use security systems for control of inmates.
10. Closed-Circuit Television: Closed-circuit television (CCTV), also known as video surveillance, is the use of video
cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in
that the signal is not openly transmitted, though it may employ point-to-point (P2P), point-to-multipoint (P2MP),
or mesh wired or wireless links. Though almost all video cameras fit this definition, the term is most often applied to
those used for surveillance in areas that may need monitoring such as banks, stores, and other areas where security is
needed. Though video telephony is seldom called "CCTV" one exception is the use of video in distance education,
where it is an important tool.
11. Internet Protocol Camera: An Internet Protocol camera, or IP camera, is a type of digital video camera that
receives control data and sends image data via an IP network. They are commonly used for surveillance but unlike
analog closed-circuit television (CCTV) cameras, they require no local recording device, only a local area network.
Most IP cameras are webcams, but the term IP camera or net cam usually applies only to those that can be directly
accessed over a network connection, usually used for surveillance.
11. 12. Security Lighting: In the field of physical security, security lighting is lighting that intended to deter or detect
intrusions or other criminal activity on a piece of real property. It can also be used to increase a feeling of safety.
Lighting is integral to crime prevention through environmental design.
13. Thermal Imaging: Infrared thermograph (IRT), thermal imaging, and thermal video are examples
of infrared imaging science. Thermos graphic cameras usually detect radiation in the long-infrared range of
the electromagnetic spectrum (roughly 9,000–14,000 nanometers or 9–14 µm) and produce images of that radiation,
called thermos grams. Since infrared radiation is emitted by all objects with a temperature above absolute zero
according to the black body radiation law, thermograph makes it possible to see one's environment with or
without visible illumination. The amount of radiation emitted by an object increases with temperature; therefore,
thermograph allows one to see variations in temperature. When viewed through a thermal imaging camera, warm
objects stand out well against cooler backgrounds; humans and other warm-blooded animals become easily visible
against the environment, day or night. As a result, thermograph is particularly useful to the military and other users
of surveillance cameras.
14. Night-Vision Device : A night-vision device (NVD), also known as night optical/observation device (NOD)
and night-vision goggles (NVG), is an optoelectronic device that allows images to be produced in levels of light
approaching total darkness. The image may be a conversion to visible light of both visible light and near-infrared,
while by convention detection of thermal infrared is denoted thermal imaging. The image produced is
typically monochrome, e.g. shades of green. NVDs are most often used by the military and law enforcement agencies,
but are available to civilian users.
15. Metal Detector: A metal detector is an electronic instrument that detects the presence of metal nearby. Metal
detectors are useful for finding metal inclusions hidden within objects, or metal objects buried underground. They
often consist of a handheld unit with a sensor probe which can be swept over the ground or other objects. If the
sensor comes near a piece of metal this is indicated by a changing tone in earphones, or a needle moving on an
indicator. Usually the device gives some indication of distance; the closer the metal is, the higher the tone in the
earphone or the higher the needle goes. Another common type are stationary "walk through" metal detectors used
for security screening at access points in prisons, courthouses, and airports to detect concealed metal weapons on a
person's body. The main types of metal detectors are beat-frequency oscillation, very low frequency, pulse induction
and industrial.
12. 16.Archway:An archway is the passage ("way") under an arch.
17. X-Ray Scanner: A full-body scanner is a device that detects objects on or inside a person's body for
security screening purposes, without physically removing clothes or making physical contact. Depending on
the technology used, the operator may see an alternate-wavelength image of the person's naked body,
merely a cartoon-like representation of the person with an indicator showing where any suspicious items
were detected or full X-ray image of the person. For privacy and security reasons, the display is generally
not visible to other passengers, and in some cases is located in a separate room where the operator cannot
see the face of the person being screened.
18. Biometric Access Control: Biometrics is the analysis of biological data using technology. Typically, this
data relates to specific physical traits that an individual might have. So, biometric access control is the use
of this biological data to either grant or deny access to a building or area of a building.
19. A smart card: A smart card, chip card, or integrated circuit card (ICC) is a physical electronic
authorization device, used to control access to a resource. It is typically a plastic credit card-sized card
with an embedded integrated circuit (IC) chip. Many smart cards include a pattern of metal contacts to
electrically connect to the internal chip. Others are contactless, and some are both. Smart cards can
provide personal identification, authentication, data storage, and application processing. Applications
include identification, financial, mobile phones (SIM), public transit, computer security, schools, and
healthcare. Smart cards may provide strong security authentication for single sign-on (SSO) within
organizations. Numerous nations have deployed smart cards throughout their populations.
20. Proximity Card : A proximity card or proxy card is a contactless smart card which can be read without
inserting it into a reader device, as required by earlier magnetic stripe cards such as credit cards and
contact type smart cards. The proximity cards are part of the contactless card technologies. Held near an
electronic reader for a moment they enable the identification of an encoded number. The reader usually
produces a beep or other sound to indicate the card has been read.
13. Hazard
A hazard is an agent which has the potential to cause harm to a vulnerable target. Hazards can be both natural
and human induced. Sometimes natural hazards such as floods and drought can be caused by human activity.
Floods can be caused by bad drainage facilities and droughts can be caused by over-irrigation or groundwater
pollution. The terms "hazard" and "risk" are often used interchangeably however, in terms of risk assessment, they
are two very distinct terms. A hazard is any agent that can cause harm or damage to humans, property, or the
environment. Risk is defined as the probability that exposure to a hazard will lead to a negative consequence, or
more simply, a hazard poses no risk if there is no exposure to that hazard.
Hazards can be dormant or potential, with only a theoretical probability of harm. An event that is caused by
interaction with a hazard is called an incident. The likely severity of the undesirable consequences of an incident
associated with a hazard, combined with the probability of this occurring, constitute the associated risk. If there is
no possibility of a hazard contributing towards an incident, there is no several ways. One of these ways is by
specifying the origin of the hazard. One key concept in identifying a hazard is the presence of stored energy that,
when released, can cause damage. Stored energy can occur in many forms: chemical, mechanical, thermal,
radioactive, electrical, etc. Another class of hazard does not involve release of stored energy; rather it involves the
presence of hazardous situations. Examples include confined or limited egress spaces, oxygen-depleted
atmospheres, awkward positions, repetitive motions, low-hanging or protruding objects, etc. Hazards may also be
classified as natural, anthropogenic, or technological. They may also be classified as health or safety hazards, by
the populations that may be affected, and the severity of the associated risk. In most cases a hazard may affect a
range of targets, and have little or no effect on others.
14. Classification of Hazards
Hazards can be classified as different types in several ways. One
of these ways is by specifying the origin of the hazard. One key
concept in identifying a hazard is the presence of stored energy
that, when released, can cause damage. Stored energy can occur
in many forms: chemical, mechanical, thermal, radioactive,
electrical, etc. Another class of hazard does not involve release of
stored energy; rather it involves the presence of hazardous
situations. Examples include confined or limited egress spaces,
oxygen-depleted atmospheres, awkward positions, repetitive
motions, low-hanging or protruding objects, etc.
15. Based on energy source
Biological hazard-Biological hazards, also known as biohazards, originate in biological processes of living organisms,
and refer to agents that pose a threat to the health of living organisms, the security of property, or the health of the
environment.
Chemical hazard-A chemical can be considered a hazard if by virtue of its intrinsic properties it can cause harm or
danger to humans, property, or the environment.
Ergonomic hazard- Ergonomic hazards are physical conditions that may pose risk of injury to the musculoskeletal
system, such as the muscles or ligaments of the lower back, tendons or nerves of the hands/wrists, or bones
surrounding the knees. Ergonomic hazards include things such as awkward or extreme postures, whole-body or
hand/arm vibration, poorly designed tools, equipment, or workstations, repetitive motion, and poor lighting.
Mechanical hazard- A mechanical hazard is any hazard involving a machine or industrial process. Motor vehicles,
aircraft, and air bags pose mechanical hazards. Compressed gases or liquids can also be considered a mechanical
hazard.
Physical hazard- A physical hazard is a naturally occurring process that has the potential to create loss or damage.
Physical hazards include earthquakes, floods, fires, and tornadoes. Physical hazards often have both human and
natural elements.
Psychosocial hazard- Psychological or psychosocial hazards are hazards that affect the psychological well-being of
people, including their ability to participate in a work environment among other people. Psychosocial hazards are
related to the way work is designed, organized and managed, as well as the economic and social contexts of work and
are associated with psychiatric, psychological and/or physical injury or illness.
16. Based on origin
Natural hazards- Natural hazards such as earthquakes, floods, volcanoes and tsunami have threatened
people, society, the natural environment, and the built environment, particularly more vulnerable people,
throughout history, and in some cases, on a day-to-day basis. According to the Red Cross, each year
130,000 people are killed, 90,000 are injured and 140 million are affected by unique events known as
natural disasters.
Anthropogenic hazards- Hazards due to human behavior and activity. The social, natural and built
environment are not only at risk from geophysical hazards, but also from technological hazards including
industrial explosions, release of chemical hazards and major accident hazards (MAHs).
Technological hazards- Hazards due to technology, and therefore a sub-class of anthropogenic hazards.
Sociological hazards- Hazards due to sociological causes, also a sub-class of anthropogenic hazards.
Sociological hazards include crime, terrorist threats and war.
Environmental hazards-Any single or combination of toxic chemical, biological, or physical agents in the
environment, resulting from human activities or natural processes, that may impact the health of exposed
subjects, including pollutants such as heavy metals, pesticides, biological contaminants, toxic waste,
industrial and home chemicals.
17. Based on effects
Health hazards- Hazards affecting the health of exposed persons, usually
having an acute or chronic illness as the consequence. Fatality would not
normally be an immediate consequence. Health hazards may cause
measurable changes in the body which are generally indicated by the
development of signs and symptoms in the exposed persons, or non-
measurable, subjective symptoms.
Safety hazards- Hazards affecting the safety of individuals, usually having
an injury or immediate fatality as the consequence of an incident.
Economic hazards- Hazards affecting property, wealth and the economy.
Environmental hazards-Hazards affecting the environment, particularly
the natural environment and ecosystems.
18. Personal Protective Equipment
Personal protective equipment (PPE) is protective clothing, helmets, goggles, or other
garments or equipment designed to protect the wearer's body from injury or infection. The
hazards addressed by protective equipment include physical, electrical, heat,
chemicals, biohazards, and airborne particulate matter. Protective equipment may be worn for
job-related occupational safety and health purposes, as well as for sports and
other recreational activities. "Protective clothing" is applied to traditional categories of
clothing, and "protective gear" applies to items such as pads, guards, shields, or masks, and
others.PPE suits can be similar in appearance to a clean room suit.
The purpose of personal protective equipment is to reduce employee exposure to hazards
when engineering controls and administrative controls are not feasible or effective to reduce
these risks to acceptable levels. PPE is needed when there are hazards present. PPE has the
serious limitation that it does not eliminate the hazard at the source and may result in
employees being exposed to the hazard if the equipment fails.
19. PPE may include
Ear muffs and ear plugs
Respirators
Eye and face protection such as goggles
Safety helmets and sun hats
Gloves and safety boots
Clothing, such as aprons, uniforms, vests, life jackets
20. Ear Protection
Earmuffs are used to protect the ears from too much noise in the workplace.
The designed is to fully cover the ears.
Earplugs are used to protect the ears from too much noise in the workplace.The designed is to fully cover the ears.
Eye and Face Protection
Face shield is best for general protection of the face. Commonly worn under a welding helmet.
Safety Goggles are used to protect the eyes from dust and particles.
Lung Protection
Respirators filter dust and other particles from the air.
Hand Protection
Gloves are the most common type of PPE used. It can protect the hands from heat, spatter, dirt or radiations.
Foot Protection
Safety shoes are made of leather designed purposively to protect the toe from falling objects.
Body Protection
Leather apron is made of chrome leather and provides a welder with complete protection from sparks and hot metal from his chest
to mid calf.
Protective clothing and ensembles
This form of PPE is all-encompassing and refers to the various suits and uniforms worn to protect the user from harm. Lab coats worn
by scientists and ballistic vests worn by law enforcement officials, who are worn on a regular basis, would fall into this category. Entire sets
of PPE, worn together in a combined suit, are also in this category.
21. Fire
Fire is the rapid oxidation of a material in the exothermic chemical process
of combustion, releasing heat, light, and various reaction products. Fire is
hot because the conversion of the weak double bond in molecular oxygen,
O2, to the stronger bonds in the combustion products carbon dioxide and
water releases energy (418 kJ per 32 g of O2); the bond energies of
the fuel play only a minor role here. At a certain point in the combustion
reaction, called the ignition point, flames are produced. The flame is the
visible portion of the fire. Flames consist primarily of carbon dioxide, water
vapor, oxygen and nitrogen. If hot enough, the gases may become ionized to
produce plasma. Depending on the substances alight, and any impurities
outside, the color of the flame and the fire's intensity will be different.
22. Classes of fire
Class A - fires involving solid materials such as wood, paper or textiles.
Class B - fires involving flammable liquids such as petrol, diesel or oils.
Class C - fires involving gases.
Class D - fires involving metals.
Class E - fires involving live electrical apparatus. (Technically ‘Class E’ doesn’t exists
however this is used for convenience here)
Class F - fires involving cooking oils such as in deep-fat fryers.
23. Types of Fires
Not all fires are the same. Per NFPA 10, burning may be
classified into one or more of the following fire classes
and your fire protection specialist will select the right
fire extinguisher size and agent for the hazard.
o Class A
o Class B
o Class C
o Class D
o Class K
24. Class A
Class A fires are
fires in ordinary
combustibles such
as wood, paper,
cloth, rubber, and
many plastics.
25. Class B
Class B fires are fires in flammable
liquids such as gasoline, petroleum
greases, tars, oils, oil-based paints,
solvents, alcohols. Class B fires also
include flammable gases such
as propane and butane. Class B
fires do not include fires involving
cooking oils and grease.
26. Class C
Class C fires are fires
involving energized electrical
equipment such as computers,
servers, motors, transformers, and
appliances. Remove the power
and the Class C fire becomes one
of the other classes of fire.
27. Class D
Class D fires are fires
in combustible metals such
as magnesium, titanium,
zirconium, sodium, lithium,
and potassium.
28. Class K
Class K fires are fires
in cooking oils and
greases such
as animal and vegetable fats.
29. Types of Fire Extinguishers
Water and Foam
Carbon Dioxide
Dry Chemical
Wet Chemical
Clean Agent
Dry Powder
Water Mist
Cartridge Operated Dry Chemical
30. Water and Foam
Water and Foam fire
extinguishers extinguish the fire
by taking away the heat element
of the fire triangle. Foam agents
also separate
the oxygen element from the
other elements.
Water extinguishers are for Class
A fires only - they should not be
used on Class B or C fires. The
discharge stream could spread
the flammable liquid in a Class B
fire or could create a shock
hazard on a Class C fire.
31. Carbon Dioxide
Carbon Dioxide fire extinguishers
extinguish fire by taking away
the oxygen element of the fire
triangle and also be removing
the heat with a very cold
discharge.
Carbon dioxide can be used on
Class B & C fires. They are usually
ineffective on Class A fires.
32. Dry Chemical
Dry Chemical fire extinguishers extinguish the
fire primarily by interrupting the chemical
reaction of the fire triangle.
Today's most widely used type of fire
extinguisher is the multipurpose dry chemical
that is effective on Class A, B, and C fires. This
agent also works by creating a barrier between
the oxygen element and the fuel element on
Class A fires.
Ordinary dry chemical is for Class B & C fires
only. It is important to use the correct
extinguisher for the type of fuel! Using the
incorrect agent can allow the fire to re-ignite
after apparently being extinguished successfully.
33. Wet Chemical
Wet Chemical is a new agent that
extinguishes the fire by removing the
heat of the fire triangle and prevents re-
ignition by creating a barrier between
the oxygen and fuel elements.
Wet chemical of Class K extinguishers
were developed for modern, high
efficiency deep fat fryers in commercial
cooking operations. Some may also be
used on Class A fires in commercial
kitchens.
34. Clean Agent
Halogenated or Clean Agent extinguishers
include the halon agents as well as the newer
and less ozone depleting halocarbon agents.
They extinguish the fire by interrupting
the chemical reaction and/or removing
heat from the fire triangle.
Clean agent extinguishers are effective on
Class A, B and C fires. Smaller sized handheld
extinguishers are not large enough to obtain a
1A rating and may carry only a Class B and C
rating.
35. Dry Powder
Dry Powder extinguishers are
similar to dry chemical except
that they extinguish the fire by
separating the fuel from
the oxygen element or by
removing the heat element of the
fire triangle.
However, dry powder
extinguishers are for Class D or
combustible metal fires, only.
They are ineffective on all other
classes of fires.
36. Water Mist
Water Mist extinguishers are a
recent development that
extinguishes the fire by taking away
the heat element of the fire
triangle. They are an alternative to
the clean agent extinguishers where
contamination is a concern.
Water mist extinguishers are
primarily for Class A fires, although
they are safe for use on Class C
fires as well.
37. Cartridge Operated Dry Chemical
Cartridge Operated Dry Chemical fire extinguishers
extinguish the fire primarily by interrupting
the chemical reaction of the fire triangle.
Like the stored pressure dry chemical extinguishers,
the multipurpose dry chemical is effective on Class A,
B, and C fires. This agent also works by creating a
barrier between the oxygen element and the fuel
element on Class A fires.
Ordinary dry chemical is for Class B & C fires only. It
is important to use the correct extinguisher for the
type of fuel! Using the incorrect agent can allow the
fire to re-ignite after apparently being extinguished
successfully.
38. Basic Fire FightingTips
Before deciding to fight a fire, be certain that:
The fire is small and not spreading.
A fire can double in size within two or three minutes.
You have the proper fire extinguisher for what is burning.
The fire won’t block your exit if you can’t control it.
A good way to ensure this is to keep the exit at your back.
You know your fire extinguisher works. Inspect extinguishers once a month
for dents, leaks or other signs of damage.
Assure the pressure is at the recommended level.
39. PASS Method
1.Pull- the Pin at the top of the extinguisher. The pin releases a locking
mechanism and will allow you to discharge the extinguisher.
2. Aim- at the base of the fire, not the flames. This is important – in order
to put out the fire, you must extinguish the fuel.
3. Squeeze- the lever slowly. This will release the extinguishing agent in the
extinguisher. If the handle is released, the discharge will stop.
4. Sweep from side to side- Using a sweeping motion, move the fire
extinguisher back and forth until the fire is completely out. Operate the
extinguisher from a safe distance, several feet away, and then move
towards the fire once it starts to diminish. Be sure to read the instructions
on your fire extinguisher – different fire extinguishers recommend
operating them from different distances.
40. Basic Fire Fighting 101
How to Fight a Fire Safely:
Always stand with an exit at your back.
Stand several feet away from the fire, moving closer once the
fire starts to diminish.
Use a sweeping motion and aim at the base of the fire.
If possible, use a “buddy system” to have someone back you up
or call for help if something goes wrong.
Be sure to watch the area for a while to ensure it doesn’t re-
ignite.
41. Never Fight A Fire If:
The fire is spreading rapidly. Only use a fire extinguisher when the fire is in its early stages.
If the fire is already spreading quickly, evacuate and call the fire department.
You don’t know what is burning. Unless you know what is burning, you won’t know what type of fire
extinguisher to use.
Even if you have an ABC extinguisher, there could be something that will explode or produce highly
toxic smoke.
You don’t have the proper fire extinguisher. The wrong type of extinguisher can be dangerous or life-
threatening.
There is too much smoke or you are at risk of inhaling smoke. Seven out of ten fire-related deaths occur
from breathing poisonous gases produced by the fire.
Any sort of fire will produce some amount of carbon monoxide, the most deadly gas produced by a fire.
Materials such as wool, silk, nylon and some plastics can produce other highly toxic gases such as carbon
dioxide, hydrogen cyanide, or hydrogen chloride. Beware – all of these can be fatal.
Smoke inhalation or exposure to fire itself can be life threatening so get educated about the basics in
CPR and burn treatment.
42. Safety equipment Related to Fire Fighting
Fire Extinguisher: A fire extinguisher is a portable device that discharges a
jet of water, foam, other material to extinguish a fire.
Smoke alarms / Detector: A fire protection device that automatically
detects and gives a warning of the presence of smoke.
Fire sprinkler: A fire sprinkler is the component of a fire sprinkler system
that discharges water when the effects of a fire have been detected.
Carbon monoxide alarm: Be aware of the hazards of Carbon Monoxide
(CO), known as the "invisible killer."
Fire /Flame Detector: A fire protection device that automatically detects
and gives a warning of the presence of fire.
Fire hydrant: A fire hydrant is a connection point by which firefighters can
tap into a water supply.