SAFEVISITOR BLOG
Developing a plan for reunification after emergencies
Most companies, schools, and religious facilities have developed plans for evacuation in the event of a fire or other type of emergency. But getting people out of a building is only part of the plan. You also need to give serious thought to where all those people are going to go, as well as what their next steps will be.
First, you need to make sure everyone is in a safe location and that their presence won’t interfere with the response. As first responders arrive at the scene, they shouldn’t have to fight their way through a crowd of evacuees. The best strategy is to designate a reunification site for each emergency exit. The site should be close enough for evacuees to reach it quickly, but far enough so they’re not blocking responders and are safe from additional hazards. It should be large enough to house the largest potential group of people who would use that exit. Don’t forget to consider the needs of people who have limited mobility.
You also need to have alternate reunification sites in case the normal site becomes unsafe. For example, if everyone is fleeing an active shooter, they should not be brought to a site which would be within the shooter’s range. If those alternate sites are at a distance, you may need to consider how occupants would be transported. Again, people with limited mobility may require additional planning.
Some facilities create what’s often called a “go” kit that’s placed near the emergency exits. Items in the kit may include diagrams of evacuation sites, signage to help evacuees find their way, flashlights and extra batteries, basic first aid kits, paper and pencils, as well as other material that may be needed.
As you develop your plan, be careful about depending too heavily on electronics for storing information or communicating. If the power fails during your incident, computer apps and cloud-based documents may be inaccessible.
Although you may prefer that the incident not be publicized until you have regained complete control of the scene, in an era of cell phones and social media, you probably won’t have that luxury. It’s likely that parents and other family members may panic and rush to the scene, particularly if your facility is a school or other organization occupied by young people.
If your site is likely to be visited by parents or family members who intend to pick people up, your plan should also address that process. You’re responsible for maintaining custody of children and others during the incident, and for verifying that they leave with the right people. One effective approach is to have parents and legal guardians arrive at designated locations that are away from where the evacuees are waiting. Once your personnel review their identification and verify that they are authorized to pick up evacuees, a runner heads to the reunification area to bring those evacuees to the pick-up site, at which point their parent or guardian can leave with them. Keep clear and accurate records of this process in case questions arise, such as if one parent arrives after the other has picked up the children.
If there might be a delay in reuniting evacuees with their family members, you may also need to consider whether you’ll need to arrange for temporary restroom facilities for both groups.
It’s important to maintain up-to-date contact information for parents and guardians, and to have an effective process for notifying them in emergency situations, whether that’s a phone call, a text message, or some other channel. Keep your notifications brief, with only the most important information. An example would be, “We have evacuated the school and students may be picked up at LOCATION starting at TIME. Be sure to bring your identification.”
Finally, while nobody likes to think about tragedies, your plan should include a protocol for informing family members about injuries or deaths. Ideally, those conversations should take place in a separate and quiet area.
Articles
-
Active Shooter
5
- Dec 3, 2018 Wait -- is Code Yellow a shooter or a bus problem? Dec 3, 2018
- Jul 2, 2018 Is your security toolkit complete? Jul 2, 2018
- Jun 1, 2018 Active Shooter: Facility Security Starts Far From Your Front Door Jun 1, 2018
- May 23, 2018 School Active Shooters: Getting "Left of Bang" May 23, 2018
- May 7, 2018 Active Shooters: Stop Reacting, Start Preventing May 7, 2018
-
Background Checks
4
- Oct 25, 2017 How Do We Comply With Indiana HEA 1079? Oct 25, 2017
- Oct 3, 2017 Top 5 Problems with Vendor Background Checks Oct 3, 2017
- Aug 25, 2017 Can I manage employee background checks in a visitor management system? Aug 25, 2017
- Aug 17, 2017 Do Visitor Management Systems Integrate with Comprehensive Background Checks? Aug 17, 2017
-
Building Security
3
- Jun 3, 2019 Preventing “road rage” in your parking lot Jun 3, 2019
- Sep 4, 2018 Metal Detectors Aren't a Magical Safety Solution Sep 4, 2018
- Feb 27, 2018 Making Sure Your Building is Safe No Matter Who is There Feb 27, 2018
-
Cloud Hosting
1
- Nov 7, 2017 Visitor Management System: Cloud Hosting vs Local Server Nov 7, 2017
-
Concealed Carry
1
- Feb 1, 2019 How should you deal with concealed carry? Feb 1, 2019
-
Corporate Security
2
- Aug 1, 2018 How a Warrior Views Your Facility Aug 1, 2018
- Dec 7, 2017 How to Protect Yourself at Work Dec 7, 2017
-
Emergency Alerts
2
- Nov 1, 2018 When an Excluded Visitor Creates a Disruption Nov 1, 2018
- Jan 9, 2018 How Our Emergency Button Helps Put the 'Safe' in SafeVisitor How Our Emergency Button Helps Put the 'Safe' in SafeVisitor Jan 9, 2018
-
Excluded Parties
1
- Sep 11, 2017 How to Create Visitor Management Excluded Parties Lists Sep 11, 2017
-
Facial Recognition
1
- Aug 26, 2019 Use and Misuse of Facial Recognition Software Aug 26, 2019
-
Geofence
2
- Oct 6, 2017 How Does Geo-Fence Expand Your Security Perimeter? Oct 6, 2017
- Aug 22, 2017 Visitor Management: How Can A Geofence Protect My Organization? Aug 22, 2017
-
Pricing
1
- Sep 13, 2017 What is the Cost of a Visitor Management System? Sep 13, 2017
-
Reunification
2
- Mar 9, 2021 Visitor Management System for Schools Mar 9, 2021
- May 1, 2019 Developing a plan for reunification after emergencies May 1, 2019
-
School Visitor Management
13
- Mar 9, 2021 Visitor Management System for Schools Mar 9, 2021
- Oct 18, 2019 How to Make Schools Safer With A School Visitor Check-In System Oct 18, 2019
- Oct 4, 2019 What is Best Visitor Management System for Schools? Oct 4, 2019
- Sep 24, 2019 School Visitor Management Systems Are The Foundation for Security Sep 24, 2019
- Aug 30, 2019 What Should a Visitor Management System for Schools Do? Aug 30, 2019
- Aug 8, 2019 Visitor Management System for Schools Aug 8, 2019
- Apr 1, 2019 Anonymous reporting systems enhance safety Apr 1, 2019
- Mar 1, 2019 Someone phoned in a bomb threat. Now what? Mar 1, 2019
- Jan 2, 2019 Are Your After-School Events Safe Places? Jan 2, 2019
- Nov 14, 2017 What’s the Purpose of a Visitor Management System? Nov 14, 2017
- Sep 22, 2017 Are You Keeping Students Safe with a Quality Visitor Management System? Sep 22, 2017
- Sep 11, 2017 How to Create Visitor Management Excluded Parties Lists Sep 11, 2017
- Aug 29, 2017 What Is the Best School Visitor Management System? Aug 29, 2017
-
Sex Offender Search
2
- Nov 1, 2017 Is the Visitor Management System Sex Offender Data Up To Date? Nov 1, 2017
- Aug 31, 2017 Visitor Management System: Do You Really Know All of Your Visitors? Aug 31, 2017
-
Vendor Management
1
- Oct 1, 2018 Visitor Management: How Well Do You Trust Vendors in Your Facilities? Oct 1, 2018
-
Visitor Management
2
- Sep 15, 2019 Visitor Management Software: Security Technology Removes Stress Sep 15, 2019
- Sep 9, 2019 What is Visitor Management System? Sep 9, 2019
-
Volunteer Management
2
- Nov 21, 2017 How do I Conduct a Kiwanis Background Check? Nov 21, 2017
- Sep 25, 2017 Creating a Volunteer Background Screening Consortium Sep 25, 2017
-
WA WATCH Background Check
1
- Jan 15, 2018 WA State Police WATCH Volunteer Background Checks Jan 15, 2018
-
visitor kiosk
1
- Aug 15, 2019 Visitor Management Kiosk Aug 15, 2019