FAQs
If you believe that an item is suspicious, the “4Cs” protocol should be applied - CONFIRM, CLEAR, COMMUNICATE and CONTROL.
What is the protocol for identifying suspicious items? ›
Members of the public should not be able to approach the area until it is deemed safe. It is of utmost importance for the safety of your site and its people, to remember these simple protocols. HOT, hidden, obviously suspicious, typical. The four C's, confirm, clear, communicate, control.
Why is it important to identify and report suspicious items? ›
By reporting a suspicious package or unattended bag, you could prevent harm to yourself and others. 3. Law enforcement: Reporting suspicious activity is essential to helping law enforcement do their job. They rely on the public to report potential threats and suspicious activity to prevent crime and terrorism.
How do you recognize suspicious activity? ›
Dressing inappropriately for the weather or occasion (having a coat on when the temperature is warm, etc.) Leaving packages, bags or other items behind. Exhibiting unusual mental or physical symptoms. Unusual noises like screaming, yelling, gunshots or glass breaking.
How do you handle suspicious items? ›
Suspicious Package
Do not put the package in water or a confined space such as a desk drawer or cabinet. If possible, open windows in the immediate area to assist in venting potential explosive gases. Isolate the suspicious package/article and clear the immediate area until law enforcement arrives.
What is the 4 C's protocol? ›
The routine provides learners with a structure for a text-based discussion built around making connections, asking questions, identifying key ideas, and considering application.
What is a formal process for identifying suspicious activity? ›
Reporting Procedures for Suspicious Transactions
- Filing Suspicious Activity Reports (SARs): A key compliance requirement is the filing of SARs or equivalent reports. ...
- Timeliness and Confidentiality: SARs should be filed within the timeframe stipulated by the relevant regulations.
How to identify a suspicious object? ›
A suspicious object is defined as any package, parcel, container, or other object that is suspected of being an explosive device because it is out of place or unusual for that location and cannot be accounted for, or because a threat has been received.
What is the process for reporting suspicious or damaged items? ›
If you receive suspicious item call 999 and ask for the police. Clear the area immediately. Do not attempt to open the letter or package.
Why it is important to report suspicious activities that occur on school grounds? ›
Identifying, reporting, and addressing concerning student behaviors and other suspicious activities can help stop violence before it occurs.
A surveillance monitoring system, sometimes referred to as an automated account monitoring system, can cover multiple types of transactions and use various rules to identify potentially suspicious activity. In addition, many can adapt over time based on historical activity, trends, or internal peer comparison.
What are examples of suspicious activity? ›
Collection or discovery of unusual amounts or types of weapons, including explosives, chemicals, and other destructive materials, or evidence, detonations or other residue, wounds, or chemical burns, that would arouse suspicion of terrorism or other criminality in a reasonable person.
What methods and controls are used to detect suspicious activities? ›
Sources for identifying suspicious activity can be regular controls, name screening, look back exercises, and transaction monitoring. Institutions are required to monitor the huge amount of transactions each day.
How to identify and report suspicious activity? ›
Tips for making a good quality Suspicious Activity Report (SAR)
- Submit at SAR online. Wherever possible use SAR Online. ...
- Be clear and concise. The report should be clear, concise, logical, including all relevant and supporting documentation. ...
- Providing the right information.
- Use glossary codes. ...
- Other reporting considerations.
What is an indicator of suspicious activity? ›
Impersonation of authorized personnel (e.g., police/security officers, janitor, or other personnel). Misrepresentation. Presenting false information or misusing insignia, documents, and/or identification to misrepresent one's affiliation as a means of concealing possible illegal activity. Theft/Loss/Diversion.
What is the 4 C's in security? ›
The 4 C's security refers to a framework comprising four essential elements: Concealment, Control, Communication, and Continuity. These elements collectively contribute to fortifying security measures and safeguarding assets, premises, and individuals against potential threats and risks.
What are the 4 C's used to manage incidents? ›
Many factors affect emergency operations. Managing the four C's is a key ingredient and a definite requirement for success. These are command, control, communications and coordination.
What are the 4 C's explained? ›
You've probably heard about the 4Cs of a diamond, and you may even know that it stands for diamond cut, color, clarity and carat weight.
What are the four C's for handling a situation? ›
The 4Cs Clarity, Confidence, Control, and Compassion.