Security and Emergency Procedures in Texas

1. What are the key components of a comprehensive security plan for a facility in Texas?

A comprehensive security plan for a facility in Texas should include the following key components:

1. Security Assessment: Conduct a thorough assessment to identify potential vulnerabilities and risks specific to the facility and its location in Texas.

2. Access Control: Implement measures such as key card access systems, security guards, and gates to control entry and exit points effectively.

3. Surveillance Systems: Install CCTV cameras and monitoring systems to provide 24/7 surveillance of the facility, including critical areas like entrances, exits, and parking lots.

4. Alarm Systems: Utilize alarm systems for intrusion detection, fire detection, and other emergency situations to alert security personnel and relevant authorities promptly.

5. Emergency Response Plan: Develop a detailed plan outlining procedures for different emergency scenarios, such as active shooter incidents, natural disasters, or medical emergencies.

6. Training and Drills: Regularly train employees on security protocols and conduct emergency drills to ensure everyone knows how to respond effectively in crisis situations.

7. Security Personnel: Employ trained security personnel or contract with a reputable security company to maintain a visible presence and respond to security incidents promptly.

8. Communication Systems: Establish clear communication channels for coordinating responses between security personnel, employees, and external emergency services.

9. Regular Review and Updates: Continuously review and update the security plan to adapt to changing threats, technology advancements, and operational requirements.

By incorporating these components into a comprehensive security plan, a facility in Texas can enhance its ability to prevent, detect, and respond to security threats effectively.

2. How can businesses in Texas create and maintain a safe and secure work environment for employees and visitors?

Businesses in Texas can create and maintain a safe and secure work environment for employees and visitors by implementing the following strategies:

1. Conducting a thorough risk assessment to identify potential hazards and security vulnerabilities within the workplace.
2. Developing and implementing security protocols and procedures tailored to the specific needs of the business, such as access control measures, surveillance systems, and emergency response plans.
3. Providing regular training to employees on security awareness, emergency procedures, and how to respond to threats or incidents.
4. Establishing clear communication channels for reporting security concerns or suspicious activities.
5. Collaborating with local law enforcement agencies to enhance security measures and response capabilities.
6. Regularly evaluating and updating security measures to adapt to changing threats and risks.

By implementing these strategies, businesses in Texas can create a safe and secure work environment that prioritizes the well-being of employees and visitors.

3. What are the best practices for responding to an active shooter situation in Texas?

In Texas, the best practices for responding to an active shooter situation involve the following key steps:

1. Stay Informed: Be aware of your surroundings at all times and stay informed about any potential threats in your area. This could include monitoring local news, emergency alerts, and official communications.

2. Run, Hide, Fight: Remember the “Run, Hide, Fight” protocol recommended by law enforcement. If you can safely escape, do so immediately. If you can’t run, find a safe place to hide and barricade yourself. As a last resort, be prepared to fight back against the attacker using any means necessary to defend yourself.

3. Call 911: Alert emergency services as soon as it is safe to do so. Provide as much information as you can about the situation, including the location and description of the shooter.

4. Follow Law Enforcement Instructions: If law enforcement arrives on the scene, follow their instructions carefully and keep your hands visible at all times to avoid being mistaken for the shooter.

5. Stay Calm and Help Others: In a high-stress situation like an active shooter incident, it’s important to try to remain calm and help others around you stay calm as well. Look out for those who may need assistance, such as the injured or those in shock, and support each other.

By following these best practices and remaining vigilant, individuals in Texas can improve their chances of staying safe during an active shooter situation.

4. What are the legal requirements for workplace security in Texas?

In Texas, there are specific legal requirements for workplace security that employers must adhere to ensure the safety and protection of their employees. Some of the key legal requirements for workplace security in Texas include:

1. Texas Labor Code – The Texas Labor Code outlines the general duty of employers to provide a safe and secure work environment for their employees. This includes implementing security measures to prevent workplace violence, theft, and other potential threats.

2. Texas Occupations Code – This code outlines specific requirements for certain industries, such as security services, that must be followed to ensure proper security measures are in place.

3. Texas Penal Code – The Penal Code includes provisions related to criminal offenses, such as trespassing, theft, assault, and other security-related issues that may impact the workplace.

4. Texas Department of Public Safety Regulations – Employers may be required to comply with regulations set forth by the Texas Department of Public Safety regarding security measures, background checks for certain positions, and other relevant security protocols.

Overall, it is essential for employers in Texas to familiarize themselves with the legal requirements for workplace security and take proactive steps to protect their employees and property from potential risks. Failure to comply with these legal requirements can lead to legal consequences and jeopardize the safety of the workforce.

5. How can businesses in Texas effectively train employees on emergency procedures?

1. Develop a Comprehensive Emergency Response Plan: The first step in effectively training employees on emergency procedures is to establish a detailed emergency response plan tailored to the specific risks and hazards faced by the business in Texas. This plan should outline roles and responsibilities, evacuation procedures, communication protocols, and emergency contacts.

2. Provide Regular Training Sessions: Conduct regular training sessions to familiarize employees with the emergency response plan and ensure they understand their roles during an emergency. These training sessions can include drills, tabletop exercises, and scenario-based simulations to test employees’ knowledge and readiness.

3. Utilize Multiple Training Methods: People learn in different ways, so it’s important to use a variety of training methods to effectively communicate emergency procedures to employees. This can include hands-on training, online courses, videos, and written materials to cater to different learning styles.

4. Designate Emergency Response Teams: Establish designated emergency response teams within the organization and provide specialized training to these individuals. These teams can be responsible for coordinating emergency responses, guiding others to safety, and providing first aid if necessary.

5. Review and Update Training Regularly: Emergency procedures and best practices can evolve over time, so it’s crucial to review and update training materials regularly. Conducting frequent refresher courses and incorporating lessons learned from past emergencies can help ensure employees are well-prepared to respond effectively in a crisis.

6. What are the essential steps for conducting a security assessment of a facility in Texas?

Conducting a security assessment of a facility in Texas involves several essential steps to ensure the safety and protection of the people and assets within the premises. These steps include:

1. Identify and assess potential threats and vulnerabilities specific to the facility’s location in Texas, such as natural disasters, crime rates, and geopolitical factors.

2. Review the existing security measures and protocols in place, including access control systems, surveillance cameras, alarm systems, and security personnel.

3. Conduct a physical inspection of the facility to evaluate its layout, entry points, perimeter security, and areas of concern.

4. Perform a risk analysis to prioritize potential security risks based on likelihood and impact, taking into account the facility’s critical assets and operations.

5. Develop a comprehensive security plan that includes recommendations for new security measures, enhancements to existing systems, and personnel training.

6. Regularly review and update the security assessment to adapt to changing threats and ensure the ongoing effectiveness of the security measures in place.

7. How can businesses in Texas prepare for and respond to natural disasters such as hurricanes and tornadoes?

Businesses in Texas can prepare for and respond to natural disasters such as hurricanes and tornadoes by implementing the following measures:

1. Develop a comprehensive emergency preparedness plan that outlines specific procedures for different types of natural disasters, including hurricanes and tornadoes. This plan should address evacuation routes, shelter locations, communication protocols, and responsibilities of employees during an emergency.

2. Conduct regular training and drills to ensure that employees are familiar with emergency procedures and know how to respond effectively during a disaster. This can help to minimize confusion and panic in a crisis situation.

3. Establish partnerships with local emergency response agencies and other businesses in the community to coordinate resources and support during a natural disaster. Collaborating with others can help businesses access additional help and resources when needed.

4. Invest in technology and tools that can help businesses monitor weather conditions and receive real-time alerts about potential natural disasters. This can provide valuable lead time for businesses to take necessary precautions and ensure the safety of employees and assets.

5. Protect critical infrastructure and important documents by backing up data, securing physical assets, and implementing measures to prevent damage from severe weather events. This can help businesses to recover more quickly in the aftermath of a natural disaster.

6. Review and update emergency preparedness plans regularly to account for changes in the business environment, new technologies, and lessons learned from past disasters. Continuous improvement is key to ensuring that businesses are ready to respond effectively to any emergency situation.

By taking proactive steps to prepare for natural disasters and respond effectively when they occur, businesses in Texas can help protect their employees, assets, and operations from the potential impact of hurricanes, tornadoes, and other severe weather events.

8. What are the critical communication protocols during an emergency situation in Texas?

During an emergency situation in Texas, critical communication protocols play a vital role in ensuring the safety and coordination of response efforts. Some key communication protocols to be followed include:

1. Alert Systems: Utilize the appropriate emergency alert systems to notify the public and relevant authorities about the situation, such as the Emergency Alert System (EAS) or Wireless Emergency Alerts (WEA).

2. Emergency Response Teams: Establish clear lines of communication between emergency response teams, including first responders, law enforcement, fire departments, and medical professionals. Ensure they have access to reliable communication channels like radios or dedicated communication networks.

3. Emergency Contact Information: Ensure that all individuals involved in the response effort have access to up-to-date contact information for key stakeholders, including emergency management officials, local authorities, and relevant agencies.

4. Public Communication: Provide timely and accurate information to the public through official channels, such as press releases, social media updates, and press conferences. It is essential to prevent the spread of misinformation during a crisis.

5. Interagency Coordination: Foster close coordination and communication between different agencies involved in the emergency response, such as local, state, and federal authorities, to ensure a cohesive and effective response.

6. Community Engagement: Involve the community in emergency communication efforts through community meetings, town hall sessions, and regular updates. Promote public awareness and preparedness to enhance overall response effectiveness.

7. Regular Updates: Provide regular updates on the evolving situation, including any changes in the threat level, safety recommendations, evacuation orders, and assistance available to those affected by the emergency.

8. After-Action Reporting: Conduct a thorough evaluation of the communication protocols used during the emergency response to identify any gaps or areas for improvement. Implement lessons learned to enhance future communication efforts.

By following these critical communication protocols during an emergency situation in Texas, authorities can effectively manage the crisis, minimize risks, and ensure the safety and well-being of the community.

9. How can businesses in Texas prevent and respond to cyber threats and data breaches?

Businesses in Texas can implement several measures to prevent and respond to cyber threats and data breaches:

1. Conduct Regular Risk Assessments: Regularly assess the organization’s cybersecurity risks to identify potential vulnerabilities and threats.

2. Implement Robust Security Measures: Ensure the use of antivirus software, firewalls, encryption, and intrusion detection systems to protect sensitive data.

3. Provide Employee Training: Educate employees on cybersecurity best practices, such as avoiding phishing scams, creating strong passwords, and recognizing potential threats.

4. Establish a Cyber Incident Response Plan: Develop a comprehensive plan outlining steps to take in the event of a cyber attack or data breach, including communication protocols and legal requirements.

5. Keep Software Updated: Regularly update software and systems to patch any known vulnerabilities that cybercriminals could exploit.

6. Secure Network Access: Implement secure access controls, such as multi-factor authentication, to limit unauthorized access to sensitive data.

7. Monitor Systems and Networks: Continuously monitor systems and networks for any signs of suspicious activity or unauthorized access.

8. Back Up Data Regularly: Implement regular data backups to ensure that critical information can be restored in the event of a data breach or cyber attack.

9. Collaborate with Cybersecurity Experts: Consider partnering with cybersecurity firms or consultants to strengthen the organization’s overall cybersecurity posture and response capabilities.

10. What are the recommended security measures for protecting sensitive information in Texas?

1. Encryption: Encrypting sensitive information is essential to protect it from unauthorized access. This includes data at rest and in transit, such as emails, files, and databases. Utilizing strong encryption algorithms can help ensure the confidentiality and integrity of the information.

2. Access Control: Implementing robust access control measures is crucial in safeguarding sensitive information. This includes using strong passwords, multi-factor authentication, role-based access controls, and regular user access reviews to prevent unauthorized individuals from accessing the data.

3. Secure Network Connections: Ensuring secure network connections, such as using virtual private networks (VPNs) and secure socket layer (SSL) protocols, can enhance the security of data transmitted over networks. This is particularly important when sharing sensitive information between locations or with external parties.

4. Employee Training: Educating employees on security best practices and the importance of safeguarding sensitive information is vital in preventing security incidents. Regular training sessions can help raise awareness about potential threats, such as phishing attacks and social engineering tactics.

5. Data Backup and Recovery: Implementing regular data backups and establishing effective recovery procedures can help mitigate the impact of data breaches or loss of sensitive information. Storing backup data in secure offsite locations can ensure the continuity of operations in case of emergencies.

6. Security Monitoring: Employing robust security monitoring tools and processes can help detect and respond to security incidents in a timely manner. Monitoring network activity, logging security events, and conducting regular security audits can help identify potential vulnerabilities and threats to sensitive information.

7. Physical Security: Implementing physical security measures, such as restricting access to data centers and server rooms, installing surveillance cameras, and using access control systems for sensitive areas, can help prevent unauthorized physical access to sensitive information.

8. Regulatory Compliance: Ensuring compliance with relevant privacy regulations, such as the Texas Identity Theft Enforcement and Protection Act and the Texas Identity Theft Statute, is critical for protecting sensitive information. Adhering to legal requirements can help mitigate legal risks and reputational damage associated with data breaches.

By implementing a comprehensive security strategy that incorporates these recommended measures, organizations in Texas can better protect their sensitive information from unauthorized access and potential security threats.

11. How can security personnel in Texas effectively collaborate with law enforcement during emergencies?

Security personnel in Texas can effectively collaborate with law enforcement during emergencies through the following ways:

1. Establishing clear lines of communication: Maintaining open and direct lines of communication between security personnel and law enforcement is crucial during emergencies. This can be achieved through the use of radios, phones, and designated communication channels to quickly relay information and updates.

2. Training and coordination exercises: Regular training sessions and coordination exercises should be conducted between security personnel and law enforcement to ensure that both parties are familiar with each other’s roles, responsibilities, and protocols during emergencies. This can help streamline response efforts and improve overall effectiveness.

3. Sharing information and intelligence: Security personnel can provide law enforcement with relevant information and intelligence gathered during their routine duties, which can aid in emergency response and decision-making. Likewise, law enforcement agencies can share information with security personnel to enhance situational awareness and response capabilities.

4. Establishing mutual aid agreements: Security personnel and law enforcement agencies can formalize mutual aid agreements to outline how they will cooperate and support each other during emergencies. These agreements can specify roles, responsibilities, resource sharing, and communication protocols to ensure seamless collaboration.

5. Coordinating response efforts: During emergencies, security personnel should work closely with law enforcement to coordinate response efforts, such as securing the scene, managing crowds, directing traffic, and assisting with evacuations. Effective coordination can help prevent chaos and ensure a more orderly and efficient response.

By implementing these strategies, security personnel in Texas can enhance their collaboration with law enforcement during emergencies, leading to better coordinated and more effective response efforts to protect lives and property.

12. What resources are available to businesses in Texas for enhancing security and emergency preparedness?

Businesses in Texas have access to various resources to enhance their security and emergency preparedness. Some of these resources include:

1. Texas Department of Public Safety (DPS): The DPS provides guidance and resources related to security and emergency preparedness for businesses. They offer training programs, workshops, and informational materials to help businesses improve their security protocols.

2. Texas Division of Emergency Management (TDEM): TDEM offers resources for businesses to develop and implement emergency plans, conduct risk assessments, and navigate emergency response procedures. They also provide information on accessing state and federal resources during emergencies.

3. Local law enforcement agencies: Businesses can reach out to local police departments and sheriff’s offices for guidance on security measures, threat assessments, and emergency response planning tailored to their specific location and circumstances.

4. Texas A&M Engineering Extension Service (TEEX): TEEX offers training programs and consultation services to help businesses enhance their emergency preparedness, including courses on incident command systems, emergency response planning, and hazard mitigation.

5. Texas Association of Business Continuity Professionals (TABCP): TABCP is a professional organization that provides networking opportunities, educational resources, and best practices for businesses looking to improve their resilience to emergencies and disasters.

By utilizing these resources and actively engaging in training and planning efforts, businesses in Texas can bolster their security measures and effectively respond to various emergency situations.

13. How should businesses in Texas handle evacuation procedures in the event of a fire or other emergency?

Businesses in Texas should adhere to the following guidelines when establishing evacuation procedures for fire or other emergencies:

1. Develop a comprehensive emergency evacuation plan that includes clear evacuation routes, designated assembly points, and communication protocols.
2. Ensure that all employees are trained on the emergency evacuation procedures regularly and conduct drills periodically to practice the actions required during an evacuation.
3. Assign specific roles and responsibilities to designated employees who will coordinate the evacuation process and assist others during the emergency.
4. Keep emergency exits clear at all times and ensure that they are properly marked and well-lit for easy identification during an evacuation.
5. Install and maintain fire safety equipment such as smoke detectors, fire alarms, fire extinguishers, and sprinkler systems to help prevent and mitigate the effects of fires.
6. Establish a system for accounting for all employees and visitors during an evacuation to ensure that everyone has safely evacuated the building.
7. Consider the needs of employees with disabilities and plan for accommodations to assist them during an emergency evacuation.
8. Stay informed about local emergency response procedures and coordinate with local authorities to ensure a timely and effective response during an emergency situation.
9. Regularly review and update the emergency evacuation plan based on feedback from drills, incidents, or changes in the workplace environment.

By following these guidelines, businesses in Texas can effectively handle evacuation procedures in the event of a fire or other emergency, ensuring the safety and well-being of their employees and visitors.

14. What are the essential elements of a business continuity plan for Texas-based organizations?

1. Risk Assessment: Conduct a comprehensive risk assessment to identify potential threats and vulnerabilities specific to Texas-based organizations. This should include natural disasters like hurricanes and floods, as well as man-made incidents such as cyber-attacks or infrastructure failures.

2. Business Impact Analysis: Determine the potential impact of these identified risks on different aspects of the organization, such as operations, finances, reputation, and legal compliance. This will help prioritize recovery efforts and resource allocation.

3. Critical Functions Identification: Identify the key business functions that are essential for the organization’s continued operation during a crisis. This includes key personnel, critical infrastructure, and vital resources.

4. Continuity Strategies: Develop strategies and plans to ensure the continuity of critical functions in the event of a disruption. This may involve establishing alternate work locations, implementing redundant systems, or securing backup suppliers.

5. Communications Plan: Establish a clear communication plan to ensure timely and effective communication with employees, stakeholders, customers, and the public during a crisis. This should include contact information, communication channels, and protocols for information dissemination.

6. Training and Testing: Train employees on their roles and responsibilities in the business continuity plan and conduct regular exercises and drills to test the effectiveness of the plan. This will help identify gaps and areas for improvement.

7. Documentation and Maintenance: Maintain detailed documentation of the business continuity plan, including policies, procedures, contact lists, and recovery strategies. Regularly review and update the plan to ensure its relevance and effectiveness.

By incorporating these essential elements into a comprehensive business continuity plan, Texas-based organizations can better prepare for and respond to potential disruptions, ultimately minimizing the impact on their operations and maintaining resilience in the face of adversity.

15. How can businesses in Texas ensure the safety of employees who work remotely or travel frequently?

Businesses in Texas can ensure the safety of employees who work remotely or travel frequently through the following measures:

1. Implementing clear remote work policies: Businesses should establish guidelines for remote work that outline expectations for security measures, communication protocols, and emergency procedures.

2. Providing cybersecurity training: Employees should be educated on best practices for securing their remote work environment, such as using virtual private networks (VPNs), strong passwords, and avoiding public Wi-Fi networks.

3. Using secure technology: Businesses should provide employees with secure devices and software for remote work, including encryption tools and antivirus software to protect against cyber threats.

4. Enforcing travel safety protocols: For employees who travel frequently, businesses should require them to adhere to safety protocols, such as sharing their itineraries, staying in reputable accommodations, and avoiding risky areas.

5. Offering emergency assistance: Businesses should have a system in place to provide employees with assistance in case of emergencies while they are working remotely or traveling, such as a 24/7 emergency hotline or access to local resources.

By implementing these measures, businesses in Texas can help ensure the safety of their employees who work remotely or travel frequently, ultimately protecting their well-being and the company’s interests.

16. What are the guidelines for implementing access control measures at a facility in Texas?

In Texas, guidelines for implementing access control measures at a facility are crucial to ensure the security and safety of the premises. Here are some key steps to consider:

1. Conduct a thorough security assessment to identify vulnerabilities and access points that need to be controlled.
2. Develop a comprehensive access control policy that outlines who has permission to enter different areas of the facility.
3. Implement physical access control measures such as key cards, security guards, surveillance cameras, and barriers to restrict entry.
4. Utilize technology like biometric systems or keypad entry for enhanced security.
5. Regularly review and update access control procedures to adapt to changing security threats or needs.
6. Provide training to staff on access control policies and procedures to ensure compliance.
7. Monitor access logs and investigate any unauthorized access attempts promptly to prevent security breaches.

By following these guidelines, facilities in Texas can establish effective access control measures to protect their assets, people, and information.

17. How can businesses in Texas address potential security vulnerabilities in their supply chain?

Businesses in Texas can address potential security vulnerabilities in their supply chain by implementing the following measures:

1. Conduct a thorough risk assessment: Businesses should first identify and assess potential security vulnerabilities within their supply chain, including physical risks, cyber threats, and geopolitical risks.

2. Establish strong partnerships: Building strong relationships with suppliers, logistics providers, and other partners can help in addressing security vulnerabilities. Screening and vetting these partners is crucial to ensure they meet security standards.

3. Implement security protocols: Developing and enforcing security protocols and standards throughout the supply chain can help mitigate risks. This may include access controls, data encryption, monitoring systems, and regular security audits.

4. Train employees: Providing security awareness training to employees involved in the supply chain can help them recognize and respond to security threats effectively.

5. Create a response plan: Developing a comprehensive security incident response plan is essential to quickly address and mitigate any security breaches or threats that may occur within the supply chain.

By implementing these strategies, businesses in Texas can enhance the security of their supply chain and minimize potential vulnerabilities.

18. What role do security cameras and surveillance systems play in enhancing security in Texas?

Security cameras and surveillance systems play a crucial role in enhancing security in Texas in several ways:

1. Deterrence: The presence of visible security cameras can act as a deterrent to potential criminals, as they are less likely to commit unlawful activities if they know they are being recorded.

2. Monitoring and Recording: Security cameras allow for continuous monitoring of a property or area, capturing any suspicious or criminal activities in real-time. The recorded footage can be used as evidence in investigations and court proceedings.

3. Quick Response: Surveillance systems enable security personnel to respond quickly to security incidents by providing real-time visual information about the situation, allowing for prompt action to be taken.

4. Crime Investigation: In the event of a security breach or crime, security cameras provide valuable visual evidence that can help in identifying suspects, understanding the sequence of events, and aiding in the investigation process.

Overall, security cameras and surveillance systems play a vital role in enhancing security in Texas by providing a proactive approach to crime prevention, aiding in investigations, and ensuring a rapid response to security threats.

19. What are the key considerations for selecting a security provider in Texas?

When selecting a security provider in Texas, several key considerations should be taken into account to ensure the safety and security of your premises. Some of these considerations include:

1. Licensing and certification: Ensure that the security provider is properly licensed and certified to operate in Texas. This ensures that they have met the legal requirements and standards set by the state.

2. Reputation and experience: Look for a security provider with a good reputation and significant experience in the industry. This can give you confidence in their ability to effectively protect your property.

3. Services offered: Consider the specific security services that the provider offers and whether they align with your security needs. This could include services such as patrol monitoring, access control, alarm response, and more.

4. Technology and equipment: Evaluate the technology and equipment that the security provider utilizes to enhance security measures. This could include CCTV cameras, alarms, and other surveillance systems.

5. Response times: Inquire about the provider’s response times in case of emergencies or security breaches. A prompt response is essential in handling security incidents effectively.

6. Cost: Compare the costs of different security providers and ensure that the services offered align with your budget. However, prioritize quality and effectiveness over cost when it comes to security services.

By considering these key factors when selecting a security provider in Texas, you can make an informed decision that meets your security needs effectively.

20. How can businesses in Texas stay informed about potential security threats and emergencies in the region?

Businesses in Texas can stay informed about potential security threats and emergencies in the region by taking the following steps:

1. Monitoring local news sources: Businesses can stay informed by regularly monitoring local news outlets, such as TV stations, radio channels, and newspapers, for updates on any security threats or emergencies in the region.

2. Signing up for emergency alerts: Businesses can register to receive emergency alerts from local authorities, such as the Texas Division of Emergency Management or local law enforcement agencies. These alerts can provide timely information about potential threats and recommended actions.

3. Utilizing social media: Following official social media accounts of relevant agencies, such as the Texas Department of Public Safety or the Federal Emergency Management Agency (FEMA), can also help businesses stay informed about security threats and emergencies in Texas.

4. Participating in training and drills: Businesses can enhance their preparedness by participating in security training sessions and emergency drills. These exercises can help businesses identify potential risks and develop effective response plans.

By proactively staying informed and prepared, businesses in Texas can better protect their employees, assets, and operations in the event of a security threat or emergency.