Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The following protocols should be used if:

A suspicious package or letter is received

A threat is received regarding a bomb and/or any other device