Suspicious Mail or Packages Guidance
Protect yourself, your organization, and your mail room in the event that you receive a suspicious letter or package.
- High Holidays
- Incident Response
Best-practice guidance documents, training materials, security protocols and checklists, and templates, and more– all developed by leading experts in communal security.
Whether your organization’s spending a day at the zoo, taking a trip across thecountry, or flying overseas, planning and preparedness is a priority, and severalsafety…
Across America, Jewish communities are on heightened alert and are wondering what role armed security should play in their security plans.
Does hiring a private security firm make Jews safer?
Search
Filter By
Protect yourself, your organization, and your mail room in the event that you receive a suspicious letter or package.
Criminals or terrorists sometimes conceal improvised explosive devices (IEDs) in backpacks, suitcases, or common items. Use this process to safely determine if an item is a serious threat or just unattended
Safety and security remain a shared responsibility and a key priority for community institutions across the United States. From schools to houses of worship, our nation has seen increased levels of targeted violence occurring at these facilities. The Jewish community, in particular, faces a complex and dynamic set of threats. Increased numbers of anti-Semitic incidents and hate crimes directed at the community after the tragic loss of life and injury inflicted at Tree of Life synagogue in Pittsburgh require a consistent, comprehensive and standardized approach to the security of our whole community. The below guidelines constitute a component of a layered security plan and may assist in providing an increased level of safety while also raising community situational awareness.
A Threat, Vulnerability & Risk Assessment (TVRA) should be considered during facility construction or renovation. A TVRA can assist in the security planning for the project and specify measures to ensure the safety and security of the project and facility. The security plan will establish who is responsible for the site’s security during construction or renovation.
This quick reference checklist is designed to help employees, volunteers and decision makers of facilities, institutions, etc. in responding to harassing or threatening calls. It is critical that relevant information be documented and recorded to provide to law enforcement and other relevant parties.
This set of security and safety measures, crafted by the Secure Community Network (SCN) — the official safety and security organization of the Jewish community of North America — aims to offer concrete guidance to campus and university administrators, enabling them to safeguard their students. Many of these measures are designed to benefit students from diverse backgrounds, addressing various challenges encountered in the college and university environment.
In 2023, The Secure Community Network identified 927 bomb threats, an increase of 1,016.8%from 2022. Following the Hamas terrorist attacks of October 7th, SCN identified…
This document represents a compilation of existing best practices, considerations, and information intended to assist individuals and organizations with general financial preparedness planning guidance and basic considerations. It is not intended to provide comprehensive, organization-specific advice or policy guidance on financial matters nor is it meant to replace the advice of a financial professional or legal counsel. For comprehensive individual or organization-specific financial advice and recommendations, a financial professional should be consulted. SCN specifically disclaims any and all responsibility for and is not responsible for any loss or damage arising out of the use, nonuse, or misuse of this information.
What is Cyber Security? A set of principles and practices designed to safeguard your computing assets and online information against threats. Why is Cyber Security important? Studies consistently show that 85-95% of cyber security incidents/data breaches are attributable to "end users" or human error. As individuals and organizations, we have a critical role to play in the security of our data, personal information and systems.
Simply saying “Hello” can prompt a casual conversation with a new person, providing an opportunity to observe and establish a connection. The OHNO approach–Observe, Initiate a Hello, Navigate the Risk, and Obtain Help–enables staff to observe and evaluate suspicious behaviors, empowering them to lower risk and obtain help when necessary