Identify times of vulnerability
Central to the safety of your staff is the ability to identify when they become susceptible to situations that may become volatile.
Establishing a timeline allows staff to consider the activities and tasks that they do day to day and consider which activities make them more vulnerable.
Here at Indefence we have established a blueprint or template that demonstrates the common denominators (RED FLAGS) present during confrontation and potentially violent situations.
with the intent to reduce opportunity we consider what red flags are present during any given activity allowing you to identify which activities pose a greater threat to your staff. By understanding the direct threats posed to your staff your workplace is able to establish clear controls to mitigate the exact risk factor that contributes to an unacceptable risk assessment.
The vulnerability calculator
The vulnerability calculator indicates the "Red Flags". we have provided a value associated with each Red Flag . That value is weighted based on its contribution to creating volatile situations for example as it is normal to find yourself "Alone" we have given a value to that red flag of 1, in contrast the presence of a known threat such as a violent male known to reside in a residence a staff member is attending holds a higher value, in this case 5.
If specific circumstances are likely to reduce the likelihood of a situation escalating, such as the presence of a colleague, then a negative value is calculated as it reduces rather than adds risk.
Once you have created your time line use the Vulnerability calculator to determine the risk values for each task by checking the appropriate boxes and recording the value shown at the bottom of the calculator
The Table is an example of a normal day in the life of a self employed individual who works from home, takes his children to school, does the grocery shopping and conducts evening classes.
The timeline asks the worker to itemise every movement on a typical day of work and then using the vulnerability calculator determine a vulnerability value for each movement.
if, for example, a realestate agent is attending a private residence to inspect the property, we would ask the agent to break down every step such as:
driving to the property
parking at the property
walking up to the front door
initial contact with the resident
entering the property
exiting the property
getting into the car
driving back to the office
Then for each element determine what red flags are present and record the associated value which will determine the most likely times of vulnerability and allow the agent to create pre-planned responses as controls to mitigate foreseeable issues.