Escalation protocols are the structured procedures that organizations implement to effectively manage a security event and lessen the consequences on employees and business assets or operations. During a physical security incident, escalation protocols are initiated when a bona fide threat is identified, a security tripwire incident occurs or a crisis event emerges. Although they vary based on the nature of the event and the maturity of a company’s security program, escalation protocols provide guidance and decision-making support throughout a security incident’s lifecycle.
Protocol Elements
Each company has a different definition of a “crisis” vs. an “issue” and escalation protocols govern the criteria to elevate situations that require attention.
The protocols articulate how to assess and categorize situations and include the sequence of actions to respond appropriately as a crisis develops.
They outline the personnel involved at each stage of an evolving incident and provide alerting thresholds to facilitate clear communications.
Also, coordination with external resources or law enforcement agencies may become required during an incident. Escalation protocols typically include guidelines for sharing information and collaborating with outside entities.
Best Practice
Companies with mature security programs view their policies and procedures as evergreen resources that protect employees’ safety and firm assets. It is a best practice to commit to regular review of escalation protocols and other elements of a corporate security plan to ensure they include lessons learned and reflect any changes in organizational structure and operations.
Want to learn more? Contact Us.