Emergency Text Messaging (via cellular phone) Opt-In

The text messaging system will be utilized only during extreme emergencies that represent an imminent danger to the campus. The messages will be extremely brief in explanation and will include suggested actions to take. Those individuals that are registered for text messaging are encouraged to monitor other media/information sources for additional emergency information. Those individuals are also encouraged to contact others by word of mouth without placing themselves or others in danger. The text messaging system will be in addition to (not to replace) other emergency notification procedures already in place. The system will be tested periodically and utilized as dictated. Questions should be directed to Public Safety at 731-881-7777. To sign up, the procedure is as follows:

  1. From the “UTM Home Page,” enter your ID and Password in the “My UTMartin Portal.”
  2. Click on “Banner Self-Service” then, click on “Personal Information.”
  3. Select “Text Messaging Opt-In.”
  4. Click on the link shown (https://www.getrave.com/login/utm) to access the Rave Alert System.
  5. Validate user by entering your UTM User Name and Password.
  6. Create an account by entering:
    UTM e-mail
    First name
    Last name
    Cell phone number
    Re-enter cell phone number
    Preferred e-mail and agree to the Terms of Service
  7. Confirm mobile carrier.
  8. Confirm mobile number: Enter 4-digit code that was texted to the phone.
  9. “Official Groups:” Select “My Groups” and choose text/e-mail options.
  10. Log out.

If at some point you want to remove your number from the system, go to the Rave Alert System link shown above to do so.

Reporting Emergencies

Fire and Fire Alarms

  • You should immediately activate the building alarm system upon detecting a fire or visible smoke.
  • All employees must immediately report all fires, regardless of size (even if extinguished); smoke; or fire alarms on campus to UT Martin Department of Public Safety by dialing 911 or 7777. The Department of Public Safety dispatches all emergency calls on campus. Most university buildings have local fire alarm systems that are not remotely monitored; therefore, it is imperative that someone notify the UTM Police Department of fires and fire alarms at 7777 or 911 as soon as it is safely possible.

Medical Emergencies

All employees may request an ambulance and medical assistance on campus by dialing 7777 or 911 . The Department of Public Safety dispatches all emergency calls on the UT Martin campus.

The ambulance service is dispatched by dialing 911 at off-campus or remote sites.

Bomb Threats

  • All employees may report bomb threats or the discovery of suspicious objects or devices on campus by dialing 7777 or 911 . The Department of Public Safety dispatches all emergency calls on campus.
  • Off campus or at remote sites bomb threats or the discovery of suspicious objects or devices may be reported by dialing 911 .

Other Emergencies (stopped elevators, chemical spills, etc.)

All other emergencies on campus may also be reported by dialing 7777 or 911 . The Department of Public Safety dispatches all emergency calls on campus.

Off-campus or remote-site emergencies can be reported by dialing 911 .

Tornado

Tornadoes are most likely to occur in mid-afternoon, generally between 3 p.m. and 7 p.m. although they can occur at any time. Movement is generally from southwest to northeast. The cloud associated with a tornado is a dark, thunderstorm cloud from which a whirling funnel-shaped pendent extends to or near the ground. Rain usually precedes the tornado, frequently with hail, and as a heavy downpour.

Tornado Watch

A tornado watch is the first alert message issued by the weather bureau. A tornado watch is issued when the conditions are favorable for the formation of a tornado. The local National Weather Service will issue a watch bulletin to the local authorities, as well as the local media. A "watch" specifies the potentially affected area(s) and timeframe during which tornado formation is highly probable. Watches are not warnings. Until a warning is issued, you should not interrupt your normal routine except to stay tuned to the radio or television, and look for threatening weather.

Tornado Warning

A tornado warning is issued when a tornado is actually sighted visually in the immediate area or by radar. A warning gives the location of the tornado at the time of detection, the area through which it is expected to move, and the time period during which it will pass the area. When a tornado warning is issued, persons in the path of the storm should take immediate safety precautions. If you actually sight a tornado funnel, move to shelter immediately and report it by dialing 911 or 7777.

An outdoor tornado siren/warning system is installed on campus. It will be tested monthly at noon on the last Wednesday of the month. The siren will be activated anytime there is information that a tornado might involve the Martin area.

The siren/warning system will also be activated any time there is any emergency situation involving the Martin area. Residents have been advised to tune their radios to WCMT-1410 for information concerning the emergency situation.

Employees should note that the tornado siren/warning system is an OUTDOOR system only. It is not intended to be audible inside of buildings. Since the tornado siren/warning system may not be audible inside of buildings, the Department of Public Safety will make every attempt to notify the building managers and residential facilities managers of the warning.

Protection

(The following information is provided for both on- and off-campus situations.)

  • If employees are notified of a tornado warning, they should alert the building occupants and move to the safest place in your building and/or complex. THEY SHOULD NOT PULL A FIRE ALARM - no one should leave the safety of the building. Students, faculty and staff should not leave the building until they are notified that the danger has passed. It is helpful if flashlights are kept handy as a power outage may occur during this type of storm.
  • Safe places to seek shelter include basements of modern, steel-reinforced office and classroom buildings, storm shelters, tunnels, sub-basements, basements, and interior corridors. Dangerous places to seek shelter include auditoriums, gymnasiums, aircraft hangers, modular buildings, structures with wide, free-span roofs, upper stories of office buildings, glass enclosed areas and vehicles.
  • The basement or ground floor interior corridor usually offers the greatest safety in campus buildings. Seek shelter in the middle of the building. Take cover under heavy furniture or in an interior hallway against a strong, inside wall on the lower floor.
  • Motor vehicles do not offer adequate protection from a tornado. Violent winds can roll a vehicle over, crushing it and its occupants. Encourage everyone to remain in the building and not attempt to drive.
  • No matter where you are, keep a battery-powered radio with you, if available, and listen to weather information so that you will know when the warning is lifted. Call the weather bureau and emergency response agencies only to report a tornado or request emergency assistance. Radio and television stations will broadcast the latest tornado advisory information.
  • If caught in the open, move away from the tornado's path at a right angle. If there is no time to escape, lie flat in the nearest depression such as a ravine or ditch.
  • Follow the instructions of emergency response personnel or remain in the hallway until the Campus Police, Safety Officer, Fire Department, Emergency Management, or other emergency response personnel give the all clear.

Tornado emergency preparation information for administration and management

The university may potentially face a tornado capable of producing mass casualties, significant property damage, or significantly interrupting normal campus operations. In a typical year, more than 800 tornadoes are reported nationwide causing 80 deaths and 1,500 injuries. Extremely violent tornadoes are capable of winds in excess of 250 mph and producing widespread damage paths in excess of a mile wide and 50 miles long. From 1961 through 1990, Tennessee averaged 3 tornado deaths per year and 2.91 tornadoes reported per 10,000 square miles or 12 tornadoes per year.

A consistent factor in post-tornado analyses is that community preparation and planning results in minimized casualties, reduced property damage, and faster economic recovery. The university, city of Martin and Weakley County have an emergency reaction plan in place and routinely review it and conduct simulated exercises to test its effectiveness.

The National Weather Service increasingly relies on strategically located Doppler radars across the country to provide information on developing storms. These radars can detect air movement toward or away from the radar providing early detection of increasing rotation aloft within a thunderstorm and can allow life-saving warnings to be issued before a tornado forms.

The National Weather Service uses information from weather radar, spotters and other sources to issue severe thunderstorm and tornado warnings for areas where severe weather is imminent. Severe thunderstorm and tornado warnings are broadcast over local National Oceanic and Atmospheric Administration (NOAA) Weather Radio stations serving the warned areas. These warnings are also relayed to local emergency management and public safety officials who can activate local warning systems to alert communities. Stay informed about storm and tornado developments by listening to NOAA Weather Radio for the latest tornado watches and warnings.

It is recommended that each department obtain a weather radio with the capability to operate off of either battery or AC current. The university has a campus-wide outdoor emergency warning system. However, NOAA weather radio is the best means to receive warnings from the National Weather Service. Remember that tornadoes occasionally develop so rapidly that advance warning is limited or not possible.

Advice and assistance for preparation and planning is available from Environmental Health and Safety. Contact the Environmental Health and Safety at 7602 or 7583 for further information.

Earthquake Procedures

Before an Earthquake Occurs

  1. Keep a flashlight and possibly a portable radio, both with fresh batteries, on hand.
  2. Place large and heavy objects on lower shelves. Bottled goods, glass and other breakables should also not be stored in high places or left where they can freely slide on shelves.
  3. Remove heavy picture frames, mirrors and other heavy objects over the bed or desk.

During an Earthquake

  1. First and foremost, stay calm . Think through the consequences of any action you take.
  2. If you are outdoors, stay outdoors: if you are indoors, stay indoors. Most injuries during quakes occur as people are entering or leaving buildings.
  3. If you are indoors, take cover under a heavy desk or table, in doorways, halls or against inside walls. Stay away from glass.
  4. If you are outdoors, move away from buildings and utility wires. The greatest danger comes from falling debris just outside of doorways or outer walls. Once in the open, stay there until shaking stops.
  5. If you are in a moving car, stop as soon as you can, but stay in your car. A car may jiggle violently on its springs, but it is a good place to stay until the shaking stops. When you drive on, watch for hazards created by the quake. Some of these hazards include fallen or falling objects, downed electrical wires, or broken or undermined roadways.

After an Earthquake

  1. Be prepared for additional earthquake shocks called “after shocks”. Although most of these are smaller than the main shock, some may be large enough to cause additional damage.
  2. Stay out of severely damaged buildings. After shocks can shake them down.
  3. Check for injuries. Don't attempt to move seriously injured persons unless they are in immediate danger of further injury.
  4. Don't smoke. A cigarette could ignite gas leaks and cause an explosion. Don't use candles, matches, or other open flames because of possible gas leaks. Douse all fires. Don't turn on the lights.
  5. If water pipes are damaged shut off the supply at the main valve. Emergency water may be drawn from water heaters, toilet tanks (not bowl) and melted ice.
  6. Check to see that sewage lines are intact before using sanitary facilities.
    • Physical Plant will direct the clean up of chemicals.
Inclement Weather

Students, faculty and staff should check the university's home page, e-mail, official UT Martin Facebook, Twitter and Instagram accounts, and the My UTMartin Portal for cancellations and schedule changes when inclement weather occurs. Area radio and television stations are also sources of information. UT Martin offices will be open unless announcements specifically say that all offices are closed. Students should assess local and regional conditions and forecasts before traveling to the university and should contact their instructors for more information on classes and class work.

Announcement Procedures

  • A decision about main campus operations will be provided to the director of university relations or designee by 5:30 a.m.
  • Center directors will also contact the director of university relations or designee by 5:30 a.m. with the decision to remain open, close, or operate on an alternate schedule.
  • Updates will be made first to the news headlines on the university's home page, to the My UTMartin Portal and to official UT Martin Facebook, Twitter and Instagram accounts. (NOTE: Power outages and/or technical issues can possibly delay these updates.)
  • Media contacts will then be made, starting with local radio stations.
  • Every effort will be made by the Office of University Relations to complete updates and media contacts by 6 a.m.

Additionally

  • Text messages from the Department of Public Safety will only be sent to announce an unscheduled closing. (NOTE: These notifications only address main campus operations.)
  • The automated message at 731-881-7000 will be updated, letting callers know of schedule changes at all locations.
  • Television stations (WBBJ, WPSD, KFVS-12) normally do not announce openings. If UT Martin is open on a regular schedule, no information will appear on the screen or on the stations' websites.
    • Notifications for evening classes will be made starting at approximately 4 p.m.
Flu Pandemic Update

A pandemic is a global disease outbreak.  A flu pandemic occurs when a new influenza type A virus emerges for which there is little or no immunity in the human population, begins to cause serious illness, and then spreads easily person-to-person worldwide.  A pandemic is determined by spread of disease, not by its ability to cause death.

Flu viruses are constantly changing. A global pandemic (worldwide outbreak) can happen if three conditions are met:

  • A new subtype of type A virus is introduced into the human population.
  • The virus causes serious illness in humans.
  • The virus can spread easily from person-to-person in a sustained manner.

H1N1 (Swine) Flu

The H1N1 (Swine) flu virus met all three conditions of a flu pandemic and caused the first global pandemic in more than 40 years.  The H1N1 flu virus caused more illness in the 2009-2010 flu season in young people and pregnant women than is usual for prior flu seasons.  Like seasonal flu, illness in people with H1N1 can vary from mild to severe.

In late spring 2009 the World Health Organization (WHO) declared that an H1N1 flu pandemic was underway.  The U.S. Public Health Emergency for 2009 H1N1 Influenza expired on June 23, 2010.  On August 10, 2010, the WHO declared an end to the 2009 H1N1 pandemic globally.  Internationally, the 2009 H1N1 viruses and seasonal viruses are co-circulating in many parts of the world.  It is likely that the 2009 H1N1 virus will continue to spread for years to come, like a regular seasonal influenza virus.

H5N1 or H5N2 (Bird or Avian) Flu

The H5N1 (Bird or Avian) flu virus is an influenza A virus subtype that is highly contagious among birds.  Humans have little or no immunity to the H5N1 (Bird) flu virus.  The majority of confirmed cases have occurred in Asia, Africa, the Pacific, Europe, and the Near East.  Currently, the United States has no confirmed human H5N1 of H5N2 (Bird) flu infections, but H5N1 (Bird) flu remains a serious concern with the potential to cause a deadly pandemic.  Avoid close contact with birds that may be infected (dead birds) or their surroundings.  The WHO is coordinating the global response to human cases of H5N1 (Bird) flu and monitoring the threat of an H5N1 (Bird) flu pandemic.

Prevention

The Centers for Disease Control recommends a yearly flu vaccination as the first and most important step in protecting against the flu.  Everyone 6 months and older should get vaccinated against the flu as soon as vaccine is available in the fall.  The U.S. 2010-2011 seasonal influenza vaccine protected against an H3N2 virus, and influenza B virus, and the 2009 H1N1 virus.  The same viruses were selected for the 2011-2012 seasonal influenza vaccine.

Additional information, details, and statistics about the flu can be found at the following websites: http://www.flu.gov  and http://www.cdc.gov/flu

Terrorism - Bomb Threat

Bomb Threat Information

Definition: Bomb threats are a violation of the law, and charges will be filed against persons making such threats. A bomb threat is legally defined as the communication through the use of mail, e-mail, telephone, telegram, or other instrument of commerce; the willful making of any threat; or the malicious conveyance of false information knowing the same to be false which concerns an attempt being made, or to be made; to kill, injure, intimidate any individual; or unlawfully to damage or destroy any building, vehicle, or other real or personal property by means of an explosive.

General: There are only three reasonable explanations for receiving a bomb threat.

First, the caller has definite knowledge or believes that an explosive or incendiary device has been or will be placed in an area and wants to minimize personal injury or property damage. The caller may be the person who placed the device or someone else who has become aware of such information.

Second, the caller wants to create an atmosphere of anxiety and panic, which will possibly result in a disruption of the normal activities at the target area. When a threat has been received, there will be a reaction to it. If the call is directed to a target area where a vacuum in leadership exists or where there has been no organized advance planning to handle such a threat, the call may well result in panic.

Third, the caller wants to bring about or amplify a lack of confidence in existing leadership or programs. By injecting panic into a normal operational situation through fear of the known or unknown, the caller may achieve his or her ultimate goals; i.e., an increased potential for personal injury, property damage, or evacuation or shutdown of essential facilities which result in unacceptable economic loss.

Past experience has revealed that targets for terrorists' bombings or threats have not been selected at random. The target is generally selected because of political, real or imagined personal gain to the terrorist. Today, more of these threats are materializing. The university's first consideration must be for the safety of its people. It is necessary to determine immediately whether a bomb threat is real. Plans devised to cope with these threats are formulated with these thoughts in mind.

Preparation: It is absolutely essential that issues of communication and planning be made in advance to safely handle bomb threats; therefore, clear-cut levels of authority have been established. It is important that each person handle his or her assignment without delay and without any manifestation of fear.

Only by having an established organization and procedures can these problems be handled with the least risk to all concerned and instill confidence so that there will be no panic.

The Threat

There is little probability of receiving a warning call where an explosive or incendiary has actually been placed; however, the university cannot ignore the fact that there have been instances where a threatening call was not a hoax. In a few instances, the person making a warning call has given the recipient enough information to aid in determining the caller's identity. In addition, there have been cases where the caller has described the device, given its location, and stated the time that the device was to be detonated or ignited.

It is for these reasons that personnel normally responsible for answering the telephone in any campus office should be instructed in advance to do the following:

  • When the caller has communicated the threat, stay calm; do not show fear. Make a note as to the date and time of day.
  • Keep the caller talking; the more he/she says, the more can be learned.
  • Record every word the caller says if possible.
  • If the caller does not indicate the location of the bomb or the time of detonation, ask the caller what time it is to go off and where it is located. If the caller has answered any of the above questions and is still on the line, ask for his/her name and try to determine the call's origin. Although the caller may not respond, it's important to ask these questions.
  • It may be advisable to inform the caller that the building is occupied and the detonation of a bomb could result in death or serious injury to many innocent people.
  • Listen closely to the voice of the caller and note the following:
  • Sex of Caller
  • Age of Caller
  • Race of Caller
  • Accent (Is the voice native to the area?)
  • Speech Impediments or Peculiar Voice Characteristics
  • Attitude of Caller
  • Pay particular attention to any strange or peculiar background noises, such as street noises, motors running, music, television or radio programs, dishes rattling, babies crying and other background noise that might give even a remote clue as to the origin of the call.
  • Notify only the department head and the Department of Public Safety. Do not discuss the call with anyone unless authorized to do so. Do not leave your post or assignment unless instructed to do so by the person in charge.

Since the Department of Public Safety will be interested in talking firsthand with the person receiving the call, this person should remain available until officers arrive on the scene.

Prevention

In order to reduce the potential placement of an explosive or incendiary device, the university can tighten physical security in some areas. Not only will this reduce the chances of having a bomb brought on to the campus, but search efforts can be maximized by doing the following:

  • During the inspection of the building, particular attention should be given to such areas as elevator shafts, ceiling areas, rest rooms, access doors, crawl spaces and other areas which are used as a means of immediate access; plumbing fixtures, electrical fixtures, utility and closet areas, areas under stairwells, boiler (furnace) rooms, flammable storage areas, electrical switches, gas or fuel valves, indoor trash receptacles, record storage areas, mail rooms, ceiling lights with easily removable panels, and fire hose racks. While this list is not complete, it is sufficient to give an idea of those areas where a time-delay explosive or an incendiary device might be concealed.
  • Establish procedures for the control and inspection of packages and materials going into critical areas.
  • Develop a positive means of identifying and controlling personnel who have authorized access to critical areas and denying access to unauthorized personnel.
  • Instruct all personnel to be alert for suspicious individuals. All personnel should be alert to the presence of foreign or suspicious objects or parcels which do not appear to belong in the area where they are observed.
  • Instruct all personnel throughout the building to be especially aware of all rest rooms, stairwells, and areas under stairwells to ensure that unauthorized personnel are not in hiding or concealment.
  • Ensure that doors and/or access ways to such areas as boiler rooms, mail rooms, computer areas, switchboards, elevator machine rooms and utility closets are securely locked when not in use.
  • Check fire exits to make sure they are not obstructed.
  • Assure adequate protection for classified documents, proprietary information and other records essential to the daily operation of the university. (A well-planted device could, upon detonation, destroy records that are vital for day-to-day operations.)
  • Check all exterior and protective lighting for proper operation and adequate illumination.
  • Conduct daily checks for good housekeeping and proper disposal of combustible material.
  • In the event electric power is shut off, have flashlights or battery powered lanterns available.

While all of the above measures might not apply to all university departments, some of them will, and the implementation of any of these measures will offer some protection.

Terrorism - Bomb Threat Procedures

Employee Responsibilities

Employees receiving a threat over the telephone should note the exact time of the call and the exact words said by the caller.

The employee should listen carefully to the details of the threat and try to keep the caller talking in an effort to obtain the answers to the following questions:

  • When will the bomb explode?
  • Where is it located?
  • What does it look like?
  • What kind of bomb is it?
  • What will cause it to explode?
  • Did you place the bomb?
  • Why?
  • From where are you calling?
  • What is your address?
  • What is your name?

The employee should write down whether the caller is male or female, what age he or she sounds like, any voice characteristics the caller may have (lisp, stuttering, accents, disguised, etc.), and any background noise heard.

If a display telephone is used, the employee should write down what appears on the digital display.

When the caller hangs up, the employee should call the Department of Public Safety at 7777 and tell the dispatcher that a bomb threat has just been received. The employee should provide all the information received from the caller and the employee's observations. The employee should also give the dispatcher his or her name, office location, and telephone extension number. The employee should stay on the phone with the dispatcher until released from the call by the Department of Public Safety.

After the employee has contacted dispatch, the employee should inform the supervisor about the call and that the police have been called and are en route to the location threatened by the bomb. If in the area threatened, employees should remain calm and stay where they are until police arrive at the scene.

If requested to leave the area or building, employees should look around their work areas as they leave. They should look for any suspicious packages or bags. If they see something that does not belong, THEY MUST NOT TOUCH IT. They should follow the department evacuation procedure and inform police officers outside the building about any suspicious article seen and the exact location.

Employees should follow all instructions given by police or fire personnel. They should not re-enter the building or area until told that they may.

Department Head, Manager and Supervisor Responsibilities

When informed that their department or building has received a bomb threat, department heads, managers, and supervisors should do the following:

  • Make sure that the Department of Public Safety has been notified. If not, call 7777 and provide the following information:
  • The person who received the bomb threat. (Officers will want to talk with the person who received the original call.)
  • The exact time the threat came in.
  • The department or area threatened.
  • Have all personnel in their area look around to determine whether they see anything unusual or different such as a box or bag that does not belong in their work area. THEY SHOULD NOT TOUCH ANY ITEM THAT IS NOT IDENTIFIABLE TO THEIR WORK AREA. If they find anything, they should call 7777 immediately and provide the following information:
  • Name and phone extension
  • Location
  • Location of the suspicious item
  • Description of the item (shape, size, color, etc.) They should secure the area around the item by asking all persons to leave the area or room. No one should be allowed to re-enter until emergency personnel arrive.
  • Evacuate only if directed by the Chancellor, Provost, Vice Chancellor of Student Affairs, Vice Chancellor of Finance and Administration, UTM Police, UTM Safety Officer, or the Fire Department. Departmental evacuation procedures should be followed.
  • If directed to evacuate, assist police or fire personnel to secure facilities to ensure the safety of all staff and students.
  • Do not pull the fire alarm. Emergency personnel may activate the fire alarm system to assist in evacuation, but only after they evaluate the circumstances and location of the threat.
  • Provide calm leadership for colleagues. Speak slowly and distinctly when giving instructions. The main consideration is a safe and orderly evacuation of the area or building until it is found to be safe to re-enter.
Terrorism - Bomb Threat and Search

All authorities are in agreement that the most effective and fastest search of a building can be made by the normal occupants of that building. No community can supply the number of police officers or firemen it would take to make a fast thorough search of a facility of any size such as the academic and public assembly facilities on campus. Even if such manpower was available, they would still not be the best qualified to conduct the search.

Since the terrorist does not label the device with the word "bomb,” what should you look for? What does a bomb look like? No one knows. It can be packaged in as many different ways as the maker's imagination will allow. Some devices may be the size of a cigarette package, while others may be as large as a 2-ton truck.

Since the object of the search can vary in size and shape, it is a fundamental rule that the search must be made by persons who are familiar with the area in order to notice a strange or foreign object. However, the use of personnel who occupy the premises to conduct the search may present problems with the hysteria that can result from the threat unless there has been careful planning beforehand.

In devising a search plan, the building or premises to be searched should be divided into areas and each person assigned a room or area. Personnel so assigned should make a survey of the area and note what objects normally occupy the area. Grill covers over heating and air-conditioning ducts should be inspected so that a subsequent inspection would reveal any entry or tampering.

In some instances the detonation or ignition of any explosive or incendiary might depend on a change in environment, e.g. temperature variations or the presence of an electric current. Therefore, the personnel assigned to conduct the search should be cautioned not to cause, or at least minimize any change in the environment. Do not go into a dark room and turn on the lights or change the setting of the room thermostats.

Other search techniques that can be employed are:

  • A staff member or supervisor should be designated as floor or area warden for each floor of the building, or perhaps several area wardens for single-story buildings. Wardens should be responsible for directing the search of their areas, receiving information from search personnel, and relaying it to the command post.
  • If dictated, the Department of Public Safety will notify fire and EMS personnel to respond to standby or assist with the search.
  • An effective search technique is as follows:
  • Maintenance and custodial personnel search such areas as hallways, rest rooms, stairwells, elevator shafts, utility closets, and areas outside the building.
  • Office personnel search their immediate areas.
  • As the search of each area is completed and no suspicious objects found, a report is given to the incident commander.

Communications During Search

A rapid two-way communication system is of utmost importance. Normally, communication among administrators, officers, search teams and the command post can be accomplished through the existing telephone system. DO NOT USE walkie-talkie radios while searching an area. The radio beam could cause premature detonation of an electric initiator (blasting cap).

Suspicious Object Located

NOTE: It is imperative that personnel involved in the search be instructed that their mission is only to search for and report suspicious objects, NOT to move, jar or touch the objects or anything attached thereto. The removal/disarming of a bomb must be left to professional bomb technicians.

  • The location and a description of the object as can best be should be reported to the command post. This information is relayed immediately to the incident commander.
  • To minimize damage sandbags or mattresses, but not metal plates or objects, may be placed around the object. DO NOT ATTEMPT TO COVER THE OBJECT.
  • The danger area should be identified and blocked off with a clear zone of at least 300 feet, including areas below and above the object.
  • Check to see that all doors and windows are open to minimize primary damage from blast and secondary damage from fragmentation.
  • Evacuate the building.
  • Do not permit re-entry into the building until the device has been removed/disarmed and the building declared safe for re-entry.

Possible concealment areas

Buildings and Structures

  • Elevator wells and shafts.
  • Nooks
  • Closets
  • Storage rooms
  • False panels
  • Walk areas
  • Counterweights
  • Motors
  • Cables
  • Trash in shafts
  • All ceiling areas
  • Rest rooms
  • Access doors
  • Crawl space in rest rooms and areas used as access to plumbing fixtures
  • Electric fixtures
  • Utility and other closet areas
  • Space under stairwell
  • Boiler(furnace) rooms
  • Flammable storage areas
  • Main switches and valves
  • Indoor trash receptacles
  • Storage areas, including record-storage areas
  • Mail rooms
  • Ceiling lights with easily removable panels
  • Fire hose racks
  • Basements
  • Around windows hidden by drapes or shades
  • Inside desks
  • Inside storage cabinets and containers
  • Under tables

Auditoriums and Theaters

Searches must be conducted under each seat, into cut seat cushions, as well as the following:

  • Stage areas
  • Microphones
  • Speaker platform
  • Crawl ways
  • Tunnels
  • Trapdoors
  • Dressing rooms
  • Restrooms
  • Storage areas
  • Ceilings
  • Props
  • Hanging decorations
  • Lighting fixtures
  • Sound system
  • Air-conditioning system
  • Roof
  • Heating system
  • Projection booths
  • Offices

Academic Buildings

Bombings in academic buildings are usually directed against non-student areas.

  • Lockers
  • Mechanical rooms
  • Utility closets
  • Offices
  • Chemistry labs
  • Auditoriums
  • Cafeterias, lounges, or break areas

Outside Areas

  • Street drainage systems
  • Manholes in street and sidewalk
  • Trash receptacles
  • Garbage cans
  • Dumpsters
  • Mailboxes
  • Parked cars, trucks and carts
Cyber Attack

Cyber attacks target computer or telecommunication networks of critical infrastructures such as power systems, traffic control systems, or financial systems. Cyber attacks target information technologies (IT) in three different ways.

First, is a direct attack against an information system "through the wires" alone (hacking). Second, the attack can be a physical assault against a critical IT element. Third, the attack can be from the inside as a result of compromising a trusted party with access to the system.

  • Be prepared to do without services you normally depend on that could be disrupted—electricity, telephone, natural gas, gasoline pumps, cash registers, ATM machines, and Internet transactions.
  • Be prepared to respond to official instructions if a cyber attack triggers other hazards. For example, general evacuation, evacuation to shelter, or shelter-in-place, because of hazardous materials releases, nuclear power plant incident, dam or flood control system failures.
  • If you suspect a cyber attack, e-mail helpdesk@utm.edu or call 881-7900.
Suspicious Parcels and Letters

Be wary of suspicious packages and letters. They can contain explosives, chemical or biological agents. Be particularly cautious at your place of employment. Some typical characteristics postal inspectors have detected over the years, which ought to trigger suspicion, include parcels that:

  • Are unexpected or from someone unfamiliar to you.
  • Have no return address, or have one that can't be verified as legitimate.
  • Are marked with restrictive endorsements, such as "Personal", "Confidential", or "Do not X-ray."
  • Have protruding wires or aluminum foil, strange odors or stains.
  • Show a city or state in the postmark that doesn't match the return address.
  • Are of unusual weight, given their size, or are lopsided or oddly shaped.
  • Are marked with any threatening language.
  • Have inappropriate or unusual labeling.
  • Have excessive postage or excessive packaging material such as masking tape and string.
  • Have misspellings of common words.
  • Are addressed to someone no longer with your organization or are otherwise outdated.
  • Have incorrect titles or title without a name.
  • Are not addressed to a specific person.
  • Have handwritten or poorly typed addresses.

With suspicious envelopes and packages other than those that might contain explosives, take these additional steps against possible biological and chemical agents.

  • Refrain from eating or drinking in a designated mail handling area.
  • Place suspicious envelopes or packages in a plastic bag or some other type of container to prevent leakage of contents. Never sniff or smell suspect mail.
  • If you do not have a container, then cover the envelope or package with anything available (e.g., clothing, paper, trash can, etc.) and do not remove the cover.
  • Leave the room and close the door, or section off the area to prevent others from entering. Be careful to limit your contact with others to prevent the spread of any possible contamination.
  • Wash your hands with soap and water to prevent spreading any powder to your face.
  • If you are at work, report the incident to your building security official or an available supervisor, who should notify police and other authorities without delay.
  • List all people who were in the room or area when this suspicious letter or package was recognized. Give a copy of this list to both the local public-health authorities and law-enforcement officials for follow-up investigations and advice.
  • If you are at home, report the incident to local police.

In the immediate area of a terrorist event, leave quickly and orderly. Listen to police, fire and other officials for instructions. Leave the building as quickly as possible. Do not stop to retrieve personal possessions or make phone calls. If things are falling around you, get under a sturdy table or desk until they stop falling. Then leave quickly, watching for weakened floors and stairs and falling debris as you exit.

Chemical and Biological Weapons

In case of a chemical or biological weapon attack near you, authorities will instruct you on the best course of action. This may be to evacuate the area immediately, to seek shelter at a designated location, or to take immediate shelter where you are and seal the premises. The best way to protect yourself is to take emergency preparedness measures ahead of time and to get medical attention as soon as possible, if needed.

Chemical

Chemical warfare agents are poisonous vapors, aerosols, liquids or solids that have toxic effects on people, animals or plants. They can be released by bombs, sprayed from aircraft, boats, or vehicles, or used as a liquid to create a hazard to people and the environment. Some chemical agents may be odorless and tasteless. They can have an immediate effect (a few seconds to a few minutes) or a delayed effect (several hours to several days). While potentially lethal, chemical agents are difficult to deliver in lethal concentrations. Outdoors, the agents often dissipate rapidly. Chemical agents are also difficult to produce.

There are six types of agents:

  • Lung-damaging (pulmonary) agents such as phosgene,
  • Cyanide,
  • Vesicants or blister agents such as mustard,
  • Nerve agents such as GA (tabun), GB (sarin), GD (soman), GF, and VX,
  • Incapacitating agents such as BZ, and
  • Riot-control agents (similar to MACE).

Biological

Biological agents are organisms or toxins that can kill or incapacitate people, livestock and crops. The three basic groups of biological agents that would likely be used as weapons are bacteria, viruses and toxins.

  • Bacteria. Bacteria are small, free-living organisms that reproduce by simple division and are easy to grow. The diseases they produce often respond to treatment with antibiotics.
  • Viruses. Viruses are organisms that require living cells in which to reproduce and are intimately dependent upon the body they infect. Viruses produce diseases that generally do not respond to antibiotics. However, antiviral drugs are sometimes effective.
  • Toxins. Toxins are poisonous substances found in, and extracted from, living plants, animals, or microorganisms; some toxins can be produced or altered by chemical means. Some toxins can be treated with specific antitoxins and selected drugs. Most biological agents are difficult to grow and maintain. Many break down quickly when exposed to sunlight and other environmental factors, while others such as anthrax spores are very long lived. They can be dispersed by spraying them in the air or infecting animals that carry the disease to humans, as well through food and water contamination.
    • Aerosols—Biological agents are dispersed into the air, forming a fine mist that may drift for miles. Inhaling the agent may cause disease in people or animals.
    • Animals—Some diseases are spread by insects and animals, such as fleas, mice, flies and mosquitoes. Deliberately spreading diseases through livestock is also referred to as agroterrorism.
    • Food and water contamination—Some pathogenic organisms and toxins may persist in food and water supplies. Most microbes can be killed, and toxins deactivated, by cooking food and boiling water. Anthrax spores formulated as a white powder were mailed to individuals in the government and media in the fall of 2001. Postal sorting machines and the opening of letters dispersed the spores as aerosols. Several deaths resulted. The effect was to disrupt mail service and to cause a widespread fear of handling delivered mail among the public. Person-to-person spread of a few infectious agents is also possible. Humans have been the source of infection for smallpox, plague and the Lassa viruses. Be aware of your surroundings. The very nature of terrorism suggests that there may be little or no warning.

What To Do To Prepare For A Chemical Or Biological Attack

Assemble a disaster supply kit and be sure to include:

  • Battery-powered commercial radio with extra batteries.
  • Non-perishable food and drinking water.
  • Roll of duct tape and scissors.
  • Plastic for doors, windows and vents for the room in which you will shelter in place—this should be an internal room where you can block out air that may contain hazardous chemical or biological agents. To save critical time during an emergency, sheeting should be pre-measured and cut for each opening.
  • First-aid kit.
  • Sanitation supplies including soap, water and bleach.

What To Do During A Chemical Or Biological Attack

  • Listen to your radio for instructions from authorities such as whether to remain inside or to evacuate.
  • If you are instructed to remain in your home, the building where you are, or other shelter during a chemical or biological attack.
  • Turn off all ventilation, including furnaces, air conditioners, vents and fans.
  • Seek shelter in an internal room, preferably one without windows. Seal the room with duct tape and plastic sheeting. Ten square feet of floor space per person will provide sufficient air to prevent carbon dioxide build-up for up to five hours.
  • Remain in protected areas where toxic vapors are reduced or eliminated, and be sure to take your battery-operated radio with you.
  • If you are caught in an unprotected area, you should:
  • Attempt to get up-wind of the contaminated area.
  • Attempt to find shelter as quickly as possible.
  • Listen to your radio for official instructions.

What To Do After A Chemical Attack

Immediate symptoms of exposure to chemical agents may include blurred vision, eye irritation, difficulty breathing and nausea. A person affected by a chemical or biological agent requires immediate attention by professional medical personnel.

If medical help is not immediately available, decontaminate yourself and assist in decontaminating others. Decontamination is needed within minutes of exposure to minimize health consequences. (However, you should not leave the safety of a shelter to go outdoors to help others until authorities announce it is safe to do so.) The best protection against a chemical or biological attack would come from being prepared and getting quick medical attention.

  • Use extreme caution when helping others who have been exposed to chemical agents:
  • Remove all clothing and other items in contact with the body. Contaminated clothing normally removed over the head should be cut off to avoid contact with the eyes, nose and mouth. Put into a plastic bag if possible. Decontaminate hands using soap and water. Remove eyeglasses or contact lenses. Put glasses in a pan of household bleach to decontaminate.
  • Remove all items in contact with the body.
  • Flush eyes with lots of water.
  • Gently wash face and hair with soap and water; then, thoroughly rinse with water.
  • Decontaminate other body areas likely to have been contaminated. Blot (do not swab or scrape) with a cloth soaked in soapy water and rinse with clear water.
  • Change into uncontaminated clothes. Clothing stored in drawers or closets is likely to be uncontaminated.
  • If possible, proceed to a medical facility for screening.

What To Do After A Biological Attack

In many biological attacks, people will not know they have been exposed to an agent. In such situations, the first evidence of an attack may be when you notice symptoms of the disease caused by an agent exposure, and you should seek immediate medical attention for treatment.

In some situations, like the anthrax letters sent in 2001, people may be alerted to a potential exposure. If this is the case, pay close attention to all official warnings and instructions on how to proceed. The delivery of medical services for a biological event may be handled differently to respond to increased demand. Again, it will be important for you to pay attention to official instructions via radio, television and emergency alert systems. If your skin or clothing comes in contact with a visible, potentially infectious substance, you should remove and bag your clothes and personal items and wash yourself with warm soapy water immediately. Put on clean clothes and seek medical assistance.

For more information, visit the website for the Centers for Disease Control and Prevention .

Nuclear and Radiological Attack

Nuclear explosions can cause deadly effects—blinding light, intense heat (thermal radiation), initial nuclear radiation, blast, fires started by the heat pulse, and secondary fires caused by the destruction. They also produce radioactive particles called fallout that can be carried by wind for hundreds of miles.

Terrorist use of a radiological dispersion device (RDD)—often called "dirty nuke" or "dirty bomb"—is considered far more likely than use of a nuclear device. These radiological weapons are a combination of conventional explosives and radioactive material designed to scatter dangerous and sub-lethal amounts of radioactive material over a general area. Such radiological weapons appeal to terrorists because they require very little technical knowledge to build and deploy compared to that of a nuclear device.

Also, these radioactive materials, used widely in medicine, agriculture, industry and research, are much more readily available and easy to obtain compared to weapons grade uranium or plutonium. Terrorist use of a nuclear device would probably be limited to a single smaller "suitcase" weapon. The strength of such a weapon would be in the range of the bombs used during World War II. The nature of the effects would be the same as a weapon delivered by an intercontinental missile, but the area and severity of the effects would be significantly more limited. There is no way of knowing how much warning time there would be before an attack by a terrorist using a nuclear or radiological weapon.

A surprise attack remains a possibility. The danger of a massive strategic nuclear attack on the United States involving many weapons receded with the end of the Cold War. However, some terrorists have been supported by nations that have nuclear weapons programs. If there were threat of an attack from a hostile nation, people living near potential targets could be advised to evacuate or they could decide on their own to evacuate to an area not considered a likely target. Protection from radioactive fallout would require taking shelter in an underground area, or in the middle of a large building.

In general, potential targets include:

  • Strategic missile sites and military bases.
  • Centers of government such as Washington, D.C., and state capitals.
  • Important transportation and communication centers.
  • Manufacturing, industrial, technology and financial centers.
  • Petroleum refineries, electrical power plants and chemical plants.
  • Major ports and airfields.

Taking shelter during a nuclear attack is absolutely necessary. There are two kinds of shelters—blast and fallout. Blast shelters offer some protection against blast pressure, initial radiation, heat and fire, but even a blast shelter could not withstand a direct hit from a nuclear detonation. Fallout shelters do not need to be specially constructed for that purpose. They can be any protected space, provided that the walls and roof are thick and dense enough to absorb the radiation given off by fallout particles. The three protective factors of a fallout shelter are shielding, distance and time.

  • Shielding. The more heavy, dense materials—thick walls, concrete, bricks, books and earth—between you and the fallout particles, the better.
  • Distance. The more distance between you and the fallout particles, the better. An underground area, such as a home or office building basement, offers more protection than the first floor of a building. A floor near the middle of a high-rise may be better, depending on what is nearby at that level on which significant fallout particles would collect. Flat roofs collect fallout particles so the top floor is not a good choice, nor is a floor adjacent to a neighboring flat roof.
  • Time. Fallout radiation loses its intensity fairly rapidly. In time, you will be able to leave the fallout shelter. Radioactive fallout poses the greatest threat to people during the first two weeks, by which time it has declined to about 1% of its initial radiation level.

Remember that any protection, however temporary, is better than none at all, and the more shielding, distance and time you can take advantage of, the better. Most electronic equipment within 1,000 miles of a high-altitude nuclear detonation could be damaged by EMP.

Electromagnetic Pulse

In addition to other effects, a nuclear weapon detonated in or above the earth's atmosphere can create an electromagnetic pulse (EMP), a high-density electrical field. EMP acts like a stroke of lightning but is stronger, faster and briefer. EMP can seriously damage electronic devices connected to power sources or antennas. This includes communication systems, computers, electrical appliances, and automobile or aircraft ignition systems. The damage could range from a minor interruption to actual burnout of components. Most electronic equipment within 1,000 miles of a high-altitude nuclear detonation could be affected. Battery powered radios with short antennas generally would not be affected. Although EMP is unlikely to harm most people, it could harm those with pacemakers or other implanted electronic devices.

Threat Conditions

There is always a risk of a terrorist threat. Each threat condition assigns a level of alert appropriate to the increasing risk of terrorist attacks:

  • Low Condition (Green). This condition is declared when there is a low risk of terrorist attacks.
  • Guarded Condition (Blue). This condition is declared when there is a general risk of terrorist
  • High Condition (Orange). A High Condition is declared when there is a high risk of terrorist attacks.
  • Severe Condition (Red). A Severe Condition reflects a severe risk of terrorist attacks. Under most circumstances, the protective measures for a Severe Condition are not intended to be sustained for substantial periods of time.
Automated External Defibrillators

UT-Martin has approximately 46 automated external defibrillators (AEDs) distributed at various locations on campus.  These are inspected periodically by Environmental Health and Safety personnel to ensure proper operation.

All AEDs located in University buildings are accessible by building occupants during the times that the buildings are open or occupied.  The AEDs shall not be used off the University campus with the exception of the one assigned to the Campus Police.

UT-Martin's AED program is registered with the Weakley County Ambulance Service, Martin Fire Department, and Weakley County 911 Communications Center.

Training Requirements

All UT-Martin personnel who have been designated as AED Responders are required to successfully complete a training course in CPR and the use of AEDs that has been approved by the American Red Cross.  There are currently approximately 200 persons on campus trained in the proper use of AEDs.

Maintenance and Testing

The AEDs used on campus are very simple to maintain.  The majority of these AEDs perform a self-test every day.  In addition, a battery insertion self-test is ran whenever a battery is installed in the device.  Periodic checks are made and recorded to determine that the green light is flashing which indicates the device is ready for use.

Contact Personnel

Safety Officer, Environmental Health and Safety extension 7602

Emergency Management Coordinator, Environmental Health and Safety extension 7583

AED Response Protocol

When an unconscious victim is discovered, the following protocol will be followed:

Responder

Shake and shout at victim. If no response,
Have someone call 911.  If no one is available, call 911 and return immediately to the victim.
Have someone retrieve an AED.
Begin ABC's of CPR.
Utilize the AED if necessary.

Police Dispatcher

Immediately dispatch an officer and call for an ambulance.  The ambulance should be summoned right away.  (DO NOT wait for the responding officer to arrive and authorize.)
Upon arrival of the responding officer, obtain as much information as possible and communicate to EMS.

Notification

Following any event involving the use of an AED, the responder must complete the AED Use Report that is shown in the UT-Martin Emergency Response Plan.
Campus police must then notify the UT-Martin Office of Environmental Health and Safety to ensure that supplies are restocked.

Armed Intruders

An armed intruder is defined as one or more subjects who participate in, or pose a threat to participate in, a random or systematic shooting spree, demonstrating their intent to continuously harm others. The overriding objective appears to be that of inflicting serious bodily injury/death rather than other criminal conduct. The dynamics of this situation demand an immediate law enforcement response with the primary focus being on neutralizing the threat to stop the on-going harm to innocent victims.

As soon as practical, campus authorities will “sound the alarm” through a multifaceted notification system which includes whole or in-part:

  • Emergency text messaging
  • Campus-wide e-mail
  • Emergency siren (for weather emergencies)
  • Campus websites
  • Campus television system
  • and most important of all - “word of mouth.”

It is important to understand that these messages will be limited in content mainly containing: The type of emergency, location, and simple responsive actions. Prior planning as to where to gain additional information and what actions to take is imperative to a successful response.

LOCKDOWN: is defined as an emergency course of action ordered by a person or persons in command, to contain a problem or incident within the area of origin by controlling the movement of people. Public Safety professionals on campus may utilize lockdown action in one building or facility where a problem(s) is occurring. In most cases, a campus-wide lockdown is not practical or feasible.

SHELTER IN PLACE: is defined as securing oneself in or around their present location for the purpose of temporary protective shelter when there is an imminent threat and it is safer for one to remain where they are than it is to evacuate. This is a temporary measure until conditions improve for evacuation or until persons in authority can direct a safe evacuation. This is not the same as taking shelter in case of severe weather - for those cases-proceed to designated safe areas.

EVACUATE: is defined as fleeing or removing (someone) from a place of danger to a safer place. Evacuation is the preferred response for an armed intruder if possible.

When a hostile person(s) is actively causing death or serious bodily injury or the threat of imminent death or seriously bodily injury to person(s) within a building, we recommend the following procedures be
implemented.

  1. Faculty/Staff/Students should immediately “sound the alarm” to anyone who may not have knowledge of the emergency (if safe to do so) and exit or EVACUATE the location. If evacuation is not practical due to the proximity of the intruder, they should attempt to lock themselves in a classroom, dorm room, office, or any area that can be secured. THIS IS REFERRED TO AS SHELTER IN PLACE. Secure or barricade the doorway immediately to prevent the intruder from entering and if the situation allows, be prepared for immediate escape/evacuation of the building.
  2. If communication is available, call 911 or 7777 and let them know who and where you are, how many people are with you, or any injuries or immediate medical needs that may be present. Take any directions in relation to evacuation, staying put, or treatment of medical emergencies given by the communications operator.
  3. Stay away from the windows and doors if possible. Also try to stay out of sight of the intruder.
  4. Turn off lights and audio equipment that may lead to detection. Turn cell phone ringer volume down to “vibrate only.”
  5. If you are able evacuate quickly, know and discuss escape routes and be prepared to evacuate immediately if directed to do so.
  6. Keep area secure until police or other responsible authorities arrive and give you directions or evacuation becomes an option.
  7. Your last option, if you are caught in close proximity to the intruder, is to fight back. This is dangerous, and you are the only one who can make this decision, but depending on the situation, this could be your last option.
Pets on Campus

For reasons of safety, health, and sanitation, pets of any type are not allowed in any University-owned building.  This policy includes University residence halls.

Exceptions

  • Service animals as defined by the Americans with Disabilities Act of 1990.
  • Animals professionally trained for theatrical purposes and directly supervised by show personnel within a controlled environment.

Any dogs or other domestic animals on University grounds must be in the control of their owners.  Under no circumstances should animals be allowed to run loose or be tied to buildings, handrails, trees, bicycle racks, or other objects.  Any infractions or complaints should be brought to the attention of the Department of Public Safety at extension 7777.

Rationale

  • Health: Pets allowed in campus buildings pose health-related problems to building occupants. Examples of detrimental health effects associated with animal/human contact include, but are not limited to:  allergies associated with pet hair or urine; animal to human disease transmissions; the potential for animal bites.
  • Safety: In the event of an emergency building evacuation, animals in campus buildings have the potential to impede occupant egress.