Grants and Funding
(Source: Homeland Security Today)
Although a Continuing Resolution was implemented by Congress until 4 March, “funding is still flowing in 2011 at levels that make it relevant to a wide variety of projects and regions,” according to the “ Grants and Funding” article in the Homeland Security Today Magazine for February 2011.
The Emergency Management and Response—Information Sharing and Analysis Center (EMR-ISAC) examined this edifying article at pages 49 to 66. It contains useful, current information for Emergency Services Sector departments and agencies that are considering applying for a grant program.
For example, the article includes guidance regarding the top homeland security funders, funding for critical infrastructure, positioning a 2011 project, working through the bureaucracy, recommendations and analysis, and the numerous available 2011 Homeland Security Grant Programs.
The Department of Homeland Security has a website dedicated to grants opportunities. Additional grants information can be seen at the U.S. Fire Administration website.
Cyber Ethics
(Source: Multi-State ISAC February Cyber Newsletter)
The explosion of social networking and the ubiquitous sharing and posting of so much information online have changed the way individuals and organizations communicate. Consequently, supervisors of those using social networks must ensure that their personnel understand responsibilities (e.g., cyber ethics) for conducting themselves online. Cyber ethics refers to the code of responsible behavior (i.e., ethical practices) on the Internet.
The Emergency Management and Response—Information Sharing and Analysis Center (EMR-ISAC) recognizes that the power of the Internet means anyone can communicate at anytime, with anyone, and anywhere. While this has undeniable benefits, there can also be negative consequences for individuals and their employers. Therefore, to promote ethical cyber practices for individuals, departments, and agencies, the Multi-State ISAC recommends avoidance of the following undesirable activities:
· Doing something that you would consider wrong or illegal in everyday life.
· Using rude or offensive language.
· Being a bully, embarrassing, untruthful, hurtful.
· Copying information and claiming it as yours.
· Ignoring copyright restrictions.
· Using someone else's password.
· Breaking into someone else's computer.
· Making someone else's computer unusable in any way. |
Consult the Microsoft Safety and Security Center for more information.
Incident Rehabilitation Training
(Source: Firefighters Support Foundation)
The Firefighters Support Foundation (FSF) recently released its newest, free online training program, Emergency Incident Rehabilitation. According to the FSF, the program can be used by first responders and Fire Corps members to learn why rehab is important, the basic functions of rehab, and more. “The entire program is at the practical level for front-line responders.”
The Emergency Management and Response—Information Sharing and Analysis Center (EMR-ISAC) ascertained that the FSF is a tax-exempt nonprofit organization dedicated to assisting firefighters and rescue personnel perform their jobs effectively and safely. A portion of funds are dedicated to aid underfunded agencies and assist families of fallen firefighters.
See the U.S. Fire Administration website for more information regarding Emergency Incident Rehabilitation (PDF, 5.6 Mb).
Emergency Responder Field Operations Guide
(Source: Department of Homeland Security)
The Department of Homeland Security National Integration Center has released the Emergency Responder Field Operations Guide (ERFOG) to the Federal Register for public comment until 18 March 2011.
The Emergency Management and Response—Information Sharing and Analysis Center (EMR-ISAC) learned that the ERFOG contains voluntary guidance specifically to assist emergency response personnel. It is intended for use when implementing the Incident Command System (ICS) in response to an incident, regardless of type, size, or location. The Guide provides suggestions for assigned incident personnel and does not replace emergency operations plans, laws, regulations, and ordinances.
It is noteworthy that users may edit ERFOG sections based on their specific needs. Additionally, the document follows the procedures established by the National Incident Management System (NIMS) for the use of plain language and clear text. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DISCLAIMER of ENDORSEMENT
The U.S. Fire Administration/EMR-ISAC does not endorse the organizations sponsoring linked web sites, and does not endorse the views they express or the products/services they offer.
FAIR USE NOTICE
This INFOGRAM may contain copyrighted material that was not specifically authorized by the copyright owner. EMR-ISAC personnel believe this constitutes “fair use” of copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use copyrighted material contained within this document for your own purposes that go beyond “fair use,” you must obtain permission from the copyright owner.
Reporting Notice
DHS and the FBI encourage recipients of this document to report information concerning suspicious or criminal activity to DHS and/or the FBI. The DHS National Operation Center (NOC) can be reached by telephone at 202-282-9685 or by e-mail at NOC.Fusion@dhs.gov
The FBI regional phone numbers can be found online at www.fbi.gov/contact/fo/fo.htm
For information affecting the private sector and critical infrastructure, contact the National Infrastructure Coordinating Center (NICC), a sub-element of the NOC. The NICC can be reached by telephone at 202-282-9201 or by e-mail at NICC@dhs.gov
When available, each report submitted should include the date, time, location, type of activity, number of people and type of equipment used for the activity, the name of the submitting company or organization, and a designated point of contact. |