Earlier this year, OSHA updated its electronic reporting rule after concerns that reports on workplace injuries and illnesses contain employees’ personal information. The agency also explained that under the original rule, it was possible for this information to be disclosed publicly through a Freedom of Information Act request or OSHA’s Injury Tracking Application.
The new final rule only requires certain establishments to submit data from OSHA Form 300A, and became effective on Feb. 25. Previously, establishments with 250 or more employees were also required to submit forms 300 and 301. While this requirement was removed before the March 2 deadline to submit data, OSHA stated that it’s likely that many employers automatically submitted data from all three forms, and using software to remove personal details won’t be 100 percent effective.
Some organizations believe the final rule will negatively affect workplace safety, and six states filed a lawsuit against OSHA in an attempt to reinstate the original electronic reporting requirements. However, others believe that the final rule still allows the agency to collect a summary of workplace injuries and illnesses without revealing potentially harmful personal information.
9 months ago ·
by Erin Carlson ·
Each year, thousands of businesses, schools and other establishments are mailed suspicious items (e.g., unmarked packages) or are the target of bomb threats. These threats can be made via phone calls, letters, social media channels, emails or other similar means.
Bomb threats and suspicious items are often used to cause alarm, panic, disruption or, in extreme cases, direct harm. However these threats are made, organizations of all kinds need to take them seriously and know how to respond appropriately.
What to Do If You Receive a Bomb Threat
Businesses often wrongly assume they aren’t at risk of a bomb threat. However, the truth is that no organization is 100 percent safe from malicious attacks or threats, making proper preparation all the more important. In the event that your organization receives a bomb threat – whether it be over the phone, via email or another means – follow these procedures.
Threats Made Over the Phone
- Remain calm. Keep the caller on the line for as long as possible, and don’t hang up even if the caller does.
- Signal or pass a note to another staff member, instructing them to notify the authorities. If this isn’t possible, call 911 from another phone after the caller hangs up.
- Document as much information about the call as possible. Details related to a caller ID number, the wording of the threat, the time of the call, background noises on the caller’s end, and the tone and inflection of the caller can all aid investigators. If possible, ask questions to infer specific details about the threat itself, including:
- Who is making the threat and where they are calling from
- The type of device and when it might go off
- What the device looks like
- Where the device is located
- Who the target is
- Record the call if possible.
- Be available for interviews.
- Follow any instructions from facility supervisors and local authorities. These individuals will also provide specific guidance related to facility lockdowns, searches or evacuations.
Threats Made Via Email, Online Platforms, the Mail or Other Source
- Call 911.
- Preserve the threat. If the threat is made online, take a screenshot. If the threat is made through the mail, store it in a safe place and handle it as minimally as possible.
- Note where the threat was found, who found it and when they found it.
- Wait for further instructions from the proper authorities.
In the event of a threat, staff members should avoid using two-way radios, cellular phones or any other electronics, as signals from these devices could potentially detonate a bomb. In addition, you should avoid activating alarms or evacuating the building until the proper authorities evaluate the threat. Law enforcement officials will direct the evacuation if one is necessary.
What to Do If You Find or Receive a Suspicious Item
In general, a suspicious item is any item – like a bag or package – that is believed to contain explosives, improvised explosive devices or hazardous materials. When it comes to identifying these items, you should watch out for unexplainable or unusual wires, electronics, sounds, vapors, mists or odors.
It is not uncommon for establishments to find or receive suspicious items and, while they may end up being harmless, it’s good practice to be overly cautious. As a good rule of thumb, any item that is Hidden, Obviously suspicious and not Typical (HOT) should be deemed suspicious.
In the event that your organization finds or receives a suspicious item, you should:
- Remain calm.
- Avoid touching, tampering or moving the item.
- Notify the proper authorities and your facility supervisor. Follow any and all of their instructions carefully.
Plan Ahead and Stay Safe
When it comes to bomb threats and suspicious items, every situation is unique. Typically, facility supervisors and law enforcement officials will be in the best position assess the situation, determine if a real risk is present and provide instruction on how to respond.
For even more protection, businesses should review guidance provided by the Department of Homeland Security and the Department of Justice. Doing so can help you better prepare for potential threats. For more workplace safety advice and risk mitigation tips, contact Scurich Insurance today.
Public Wi-Fi allows your team to stay connected on the go. You have to be careful, though, because public Wi-Fi is notoriously unsecure. Cybercriminals could also log into the free network you use and access data on your devices, such as your login information or confidential client files. Exercise caution and stay safe in several ways as you use your laptop, tablet or smartphone on public Wi-Fi networks.
Verify the Network Name
Before logging in, research the network. Only log into Wi-Fi that originates from a legitimate source as you avoid a man-in-the-middle attack. For example, cybercriminals may name their network “Free Wi-Fi” or mimic the establishment’s name as a way to attract users. Ask the barista, librarian or other staff member to verify the name of their public Wi-Fi network before you log in.
Turn off File Sharing
Your team relies on file sharing, but this feature is lucrative for cybercriminals, too. That’s why you want to turn off file sharing when you use public Wi-Fi. This step protects your files and data you don’t want criminals to access.
Use a VPN
A virtual private network (VPN) encrypts data as it travels between your device and the server. Research free and paid VPN options, then add one to your devices for protection when you need it on the go.
Check for HTTPS
If you see a lock symbol and HTTPS in front of the website address in the status bar, you’re browsing a secure site. You can also use an HTTPS extension for extra protection.
Enable Two-Factor Authentication
With two-factor authentication, you add an extra layer of protection to your online browsing. Even if cybercriminals gain access to your password, they probably cannot get into your account since they need to enter a unique authentication code also.
Browser and software patches can improve security. Make it a habit to install these patches when you’re connected to a trusted network. Never update software when you’re connected to public Wi-Fi.
Forget the Network
After your public Wi-Fi session ends, log off all the websites you were signed into and tell your device to forget the network. This step prevents cybercriminals from connecting to your device automatically the next time you’re in the network area.
Limit your Activity
It’s tempting to think that cybercrime couldn’t happen to you or that you can afford to be careless because you have cybercrime and business liability insurance. However, always use caution. Save sensitive or confidential work for when you’re on a trusted network.
Your company may utilize public Wi-Fi often to stay connected and get work done. Encourage your employees to use caution and follow these steps as they stay safe.
Over 700,000 people were estimated to have been admitted to the hospital during the 2017-18 flu season, according to the Centers for Disease Control and Prevention’s (CDC) Influenza Hospitalization Surveillance Network. What’s even more alarming is the fact that epidemic levels of influenza or pneumonia persisted for 16 consecutive weeks. Using the CDC’s new methodology, the 2017-18 flu season was the first flu season to be classified as high severity across all age groups.
Due to last year’s deadly consequences and prevalence, the CDC is urging everyone to take extra precautions for the upcoming flu season, including getting vaccinated against the flu by the end of October.
When is flu season?
Flu season typically runs from October to May. However, most flu cases occur between December and February. The vast majority of those who were hospitalized for the seasonal influenza last season weren’t vaccinated. That’s why the CDC is strongly recommending that you get vaccinated as early as possible.
What vaccinations are available?
Each year, the Food and Drug Administration works with the World Health Organization to create a vaccination that contains three or four different strains of the flu. Most of the shots available this year provide protection against four different flu strains. For the 2018-19 season, the nasal vaccination, FluMist, will be available again after not being recommended for use for the previous two flu seasons.
Who should get vaccinated?
The CDC recommends that everyone older than 6 months should get the flu vaccine.
Where can you get vaccinated?
You can get vaccinated against the flu at your doctor’s office, in a clinic or pharmacy, and sometimes, at your employer. Some urgent care clinics or local health departments will provide flu vaccines as well. Visit the HealthMap Vaccine Finder to locate where you can get a flu vaccine.
According to a recent study, the average person checks their cellphone 100 times a day. While there is a time and a place for cellphones, using it at the job site can be extremely dangerous.
If you’re distracted for just a second while operating a power tool, working on a roof or driving a forklift, you can injure yourself or a co-worker. You can also face civil or criminal liability for damages you cause by operating a motorized vehicle while using a cellphone.
It isn’t only operators of machinery who need to be mindful of the dangers of cellphone use on the job site. Simply looking down at your cellphone and not paying attention to your surroundings could put your life in danger.
Cellphone Safety Tips When On-site
The Occupational Safety and Health Administration (OSHA) prohibits cellphone use by operators of cranes and similar equipment. Most organizations prohibit any kind of cellphone use on the job site—not just for crane operators. It is your responsibility to know how your company’s rules apply to you and follow them accordingly.
If you struggle with the temptation to check your phone while working on a job site, consider the following safety tips:
- Get in the habit of sending and receiving text messages before or after your shift, or during one of your breaks.
- Remind family and friends that you may not be able to respond to their messages right away. Provide them with your workplace contact information in case of emergencies.
- Turn off push notifications so you’re not distracted by any apps.
- Don’t carry your cellphone on you if the temptation to check it is too much. Instead, leave it in a safe place where it won’t distract you from your job.
- Follow your workplace policy for cellphone use at work and on the job site. Be aware of any cellphone-free zones.
Besides creating enormous safety risks, employees who are texting at work are not doing what they are getting paid to do. For this reason, these workers may be subject to disciplinary action.
If you have questions about ’s workplace cellphone policy, or if you notice inappropriate cellphone use on the job site, don’t hesitate to discuss it with your supervisor or HR.
With some farmers struggling to find reliable farm labor, it is important to invest some thought in the hiring process. Here are some tips for finding the right help:
Examine your needs. You might have a general idea in your head of what work needs to be done, but it’s best to be specific. Narrow down broad processes into specific jobs so you can determine how much help you truly need.
Think about desired traits. Do you need someone to fill a temporary need, or are you hoping that person can go on to fill a managerial role? You’ll have to determine whether people skills are more important than manual labor or machinery skills, and list those traits in your job description.
Consider hiring for a trial period. If you’re hesitant about a candidate but need immediate help, consider hiring them for a short-term trial period. This saves you from high employee turnover while buying you time to recognize your needs. It allows both you and the worker to communicate any frustrations and expectations after the trial period before considering whether the working relationship is worth investing in long term.