Browse
Search
Agenda - 03-10-20; 8-n Attachment 1 - System Safety Plan
OrangeCountyNC
>
Board of County Commissioners
>
BOCC Agendas
>
2020's
>
2020
>
Agenda - 03-10-20 Business Meeting
>
Agenda - 03-10-20; 8-n Attachment 1 - System Safety Plan
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
3/5/2020 4:36:56 PM
Creation date
3/5/2020 4:33:19 PM
Metadata
Fields
Template:
BOCC
Date
3/10/2020
Meeting Type
Business
Document Type
Agenda
Agenda Item
8-n
Document Relationships
Agenda - 03-10-20; 8-n - Approval of System Safety Program Plan and Title VI for Orange County Public Transportation
(Message)
Path:
\Board of County Commissioners\BOCC Agendas\2020's\2020\Agenda - 03-10-20 Business Meeting
Minutes 03-10-2020 Business Meeting
(Message)
Path:
\Board of County Commissioners\Minutes - Approved\2020's\2020
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
108
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Threat analysis defines the level or degree of the threats by evaluating the probability and <br /> impact of the threat. The process involves gathering historical data about threatening events <br /> and evaluating which information is relevant in assessing the threats against OCPT. Some of the <br /> questions answered in our threat analysis included. <br /> • How safe are vehicles and equipment? <br /> • How secure is the transportation facility? <br /> • What event(s) or act(s) of nature has a reasonable probability of occurring? <br /> • Have similar-sized agencies been targets of criminal or terrorist acts in the past? <br /> • How significant would the impacts be? <br /> A vulnerability is anything that can make an agency more susceptible to a threat. This includes <br /> vulnerabilities in safety/security procedures and practices involving transit facilities, transit <br /> equipment and transit staff. Vulnerability analysis identifies specific weaknesses to threat that <br /> must be mitigated. <br /> Threat and Vulnerability Identification <br /> The primary method used by OUT to identify the threats to the transit system and the <br /> vulnerabilities of the system is a collection of historical data and incident reports submitted by <br /> drivers and supervisors and information provided by federal and state agencies and local law <br /> enforcement. <br /> Information resources include but are not limited to the following: <br /> • Operator incident reports ar <br /> • Risk management reports <br /> • Bus maintenance reports <br /> • Marketing surveys <br /> • Passengers' letters and telephone calls <br /> • Management's written concerns <br /> • Staff meeting notes <br /> • Statistical reports <br /> • Special requests <br /> • Historical data <br /> • Information from public safety officials <br /> OUT reviews safety/security information resources and determines if additional methods <br /> should be used to identify system threats and vulnerabilities. This includes a formal evaluation <br /> program to ensure that safety/security procedures are maintained and that safety/security <br /> systems are operable. Safety/security testing and inspections may be conducted to assess the <br /> vulnerability of the transit system. Testing and inspection includes the following three-phase <br /> approach: <br /> 1. Equipment preparedness <br /> 2. Employee proficiency <br /> 3. System effectiveness <br /> 641Page <br />
The URL can be used to link to this page
Your browser does not support the video tag.