Quadient Guide to Mail Security
Serious incidents are not common and simple steps can be taken to limit vulnerability to attack, provide a safe working environment and reduce disruption.Download
Important Facts about Hazardous Mail
- Postal threats can be easily constructed and anonymously delivered via ordinary postal methods. Effective devices that can cause injury are not necessarily explosive and could be simply powders or cutting devices.
- A postal threat is easy to conceal in an ordinary postal package such as a jiffy bag. It may not be bulky.
- A postal threat is designed to be victim-operated and is normally triggered by the action of opening. Therefore they are relatively safe if left unopened.
- It is the role of the Mailroom and its staff to understand and look out for postal threats so that they can be detected before any damage or injury can occur.
Develop a Mail Security Plan
Mailroom staff play a key role in detecting incoming threats, but all employees need to be aware of potential risks and their roles and responsibilities. It’s all about implementing common-sense measures in day to day mail handling throughout the organisation.
A Mail Security Plan should be developed to define responses to postal threats, taking into account:
- Vulnerability/Risk Assessment - delivery points and procedures
- Threat awareness among staff handling items
- Communications with internal staff and outside experts
- Staff training and appointment of a Mailroom Security Co-ordinator
- Screening techniques and equipment (manual and/or electronic)
- Emergency procedures and responses to different postal threats – IED (Improvised Explosive Device) and CBRN (Chemical, Biological, Radiological, and Nuclear)
- Testing and reviewing the plan to ensure optimal ongoing protection