SlideShare uma empresa Scribd logo
1 de 19
Integrated Safety and Security Management System   Viyya Technologies The Right Information.  To the Right People.  At the Right Time.  Presents the
About Us ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],The Problem
Crisis A sudden, generally unanticipated event that profoundly and negatively affects a significant segment of the population and often involves serious injury or death.
A Crisis Can Happen to Anyone – Anytime, Anywhere! Safety and Security Planning Must be Integrated with Timely Communication to be Effective
It’s A Fact ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Now is Too Late! ,[object Object],[object Object],[object Object],[object Object],What to do when the media hits the fan . . .
The Solution ,[object Object]
Building Blocks of Safety and Security
Mass Notification Alone Cannot Create a Culture of Preparedness! ,[object Object],[object Object],[object Object],[object Object]
What Does the SSMS Do? The SSMS Will Integrate the Essential Elements of Safety and Security Management Planning for Any Organization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Features of VIYYA Integrated System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SSMS Supports Multiple Devices
Emergency Preparedness VRED has taken steps to ensure that organizations continue to function in the event of an emergency. The resources and information contained on this page are designed to help you cope with an emergency situation and protect yourself and your colleagues should the region experience an incident. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Alerts No Active Alerts In the event of an alert, important safety and security information will be displayed here Emergency Procedures Explosions Fire Evacuations Medical Emergencies Gas Leaks Hazardous Materials Bomb Threats Awareness Bulletin Robberies Evacuations Safety Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Vertical Markets Government VIYYA Technologies Web Services - API Commercial Defense and Military K-12 and Higher Education Client Communication Via phones, web, email
Benefits of the SSMS Communication ,[object Object],[object Object],[object Object],[object Object],[object Object],Continuity ,[object Object],[object Object],[object Object],[object Object],Regulatory Compliance ,[object Object],[object Object],[object Object],Community Health & Safety ,[object Object],[object Object],[object Object],[object Object],Planning and Preparation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Organizational Outcomes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary  How Well You Respond — Depends on How Well You are Prepared!

Mais conteúdo relacionado

Mais procurados

Mandatory requirements for physical security 2
Mandatory requirements for  physical security 2Mandatory requirements for  physical security 2
Mandatory requirements for physical security 2Robin Patras
 
Crisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityCrisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityAtlantic Training, LLC.
 
Zlatibor risk based balancing of organizational and technical controls for ...
Zlatibor   risk based balancing of organizational and technical controls for ...Zlatibor   risk based balancing of organizational and technical controls for ...
Zlatibor risk based balancing of organizational and technical controls for ...Dejan Jeremic
 
The Physical Security_&_Risk_Management_book
The Physical Security_&_Risk_Management_bookThe Physical Security_&_Risk_Management_book
The Physical Security_&_Risk_Management_bookJAMES E. McDONALD, PSNA
 
Don't Overthink Risk Management by Suzanne Hartin
Don't Overthink Risk Management by Suzanne HartinDon't Overthink Risk Management by Suzanne Hartin
Don't Overthink Risk Management by Suzanne HartinSuzanne Hartin
 
Risk based approach
Risk based approach Risk based approach
Risk based approach Robin Patras
 
Catastrophic incident planning by design jim greer
Catastrophic incident planning by design   jim greerCatastrophic incident planning by design   jim greer
Catastrophic incident planning by design jim greerAbramsLearning-ALIS
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk ManagementDeepak Bansal, CPA CISSP
 
Managing Risk and Compliance - 14th October 2020
Managing Risk and Compliance - 14th October 2020Managing Risk and Compliance - 14th October 2020
Managing Risk and Compliance - 14th October 2020Morlai Kargbo, FCCA
 
Risk Analysis and Assessment - Tools (English)
Risk Analysis and Assessment - Tools (English)Risk Analysis and Assessment - Tools (English)
Risk Analysis and Assessment - Tools (English)Waqas I. YOUSAFZAI
 
Acsc threat report_2016
Acsc threat report_2016Acsc threat report_2016
Acsc threat report_2016Stefanie Vogt
 
How to embed emerging risk identification and management IRMindia Affiliate
How to embed emerging risk identification and management IRMindia AffiliateHow to embed emerging risk identification and management IRMindia Affiliate
How to embed emerging risk identification and management IRMindia AffiliateIRM India Affiliate
 
Wvi Operations Management Presentation Dha
Wvi Operations Management Presentation DhaWvi Operations Management Presentation Dha
Wvi Operations Management Presentation Dhaguest5c8420
 
Using ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and GovernanceUsing ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and GovernancePECB
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk managementAnu Damodaran
 
Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...Doreen Loeber
 
Challenges for the Disaster and Crisis Management – Identification of dimensi...
Challenges for the Disaster and Crisis Management – Identification of dimensi...Challenges for the Disaster and Crisis Management – Identification of dimensi...
Challenges for the Disaster and Crisis Management – Identification of dimensi...Global Risk Forum GRFDavos
 
Cyber Risk Management IRM India Affiliate
Cyber Risk Management IRM India AffiliateCyber Risk Management IRM India Affiliate
Cyber Risk Management IRM India AffiliateIRM India Affiliate
 

Mais procurados (20)

Mandatory requirements for physical security 2
Mandatory requirements for  physical security 2Mandatory requirements for  physical security 2
Mandatory requirements for physical security 2
 
Crisis Management Training by Iowa State University
Crisis Management Training by Iowa State UniversityCrisis Management Training by Iowa State University
Crisis Management Training by Iowa State University
 
Zlatibor risk based balancing of organizational and technical controls for ...
Zlatibor   risk based balancing of organizational and technical controls for ...Zlatibor   risk based balancing of organizational and technical controls for ...
Zlatibor risk based balancing of organizational and technical controls for ...
 
The Physical Security_&_Risk_Management_book
The Physical Security_&_Risk_Management_bookThe Physical Security_&_Risk_Management_book
The Physical Security_&_Risk_Management_book
 
Don't Overthink Risk Management by Suzanne Hartin
Don't Overthink Risk Management by Suzanne HartinDon't Overthink Risk Management by Suzanne Hartin
Don't Overthink Risk Management by Suzanne Hartin
 
Risk based approach
Risk based approach Risk based approach
Risk based approach
 
Catastrophic incident planning by design jim greer
Catastrophic incident planning by design   jim greerCatastrophic incident planning by design   jim greer
Catastrophic incident planning by design jim greer
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk Management
 
IT Policy, RISK MANAGEMENT
IT Policy, RISK MANAGEMENTIT Policy, RISK MANAGEMENT
IT Policy, RISK MANAGEMENT
 
Managing Risk and Compliance - 14th October 2020
Managing Risk and Compliance - 14th October 2020Managing Risk and Compliance - 14th October 2020
Managing Risk and Compliance - 14th October 2020
 
Risk Analysis and Assessment - Tools (English)
Risk Analysis and Assessment - Tools (English)Risk Analysis and Assessment - Tools (English)
Risk Analysis and Assessment - Tools (English)
 
Acsc threat report_2016
Acsc threat report_2016Acsc threat report_2016
Acsc threat report_2016
 
How to embed emerging risk identification and management IRMindia Affiliate
How to embed emerging risk identification and management IRMindia AffiliateHow to embed emerging risk identification and management IRMindia Affiliate
How to embed emerging risk identification and management IRMindia Affiliate
 
Wvi Operations Management Presentation Dha
Wvi Operations Management Presentation DhaWvi Operations Management Presentation Dha
Wvi Operations Management Presentation Dha
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Using ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and GovernanceUsing ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and Governance
 
Enterprise risk management
Enterprise risk managementEnterprise risk management
Enterprise risk management
 
Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...
 
Challenges for the Disaster and Crisis Management – Identification of dimensi...
Challenges for the Disaster and Crisis Management – Identification of dimensi...Challenges for the Disaster and Crisis Management – Identification of dimensi...
Challenges for the Disaster and Crisis Management – Identification of dimensi...
 
Cyber Risk Management IRM India Affiliate
Cyber Risk Management IRM India AffiliateCyber Risk Management IRM India Affiliate
Cyber Risk Management IRM India Affiliate
 

Destaque

Intelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital BusinessIntelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital Businessaccenture
 
120229 Fm Tec Intelligent Security Containers Quick Info 2012
120229 Fm Tec Intelligent Security Containers Quick Info 2012120229 Fm Tec Intelligent Security Containers Quick Info 2012
120229 Fm Tec Intelligent Security Containers Quick Info 2012Bindner
 
Abb85fb57f02f7b85c8eba91f28b7c99 (1)
Abb85fb57f02f7b85c8eba91f28b7c99 (1)Abb85fb57f02f7b85c8eba91f28b7c99 (1)
Abb85fb57f02f7b85c8eba91f28b7c99 (1)Galina Yaceiko
 

Destaque (6)

Intelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital BusinessIntelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital Business
 
International Conference on Building Security Capacity
International Conference on Building Security CapacityInternational Conference on Building Security Capacity
International Conference on Building Security Capacity
 
120229 Fm Tec Intelligent Security Containers Quick Info 2012
120229 Fm Tec Intelligent Security Containers Quick Info 2012120229 Fm Tec Intelligent Security Containers Quick Info 2012
120229 Fm Tec Intelligent Security Containers Quick Info 2012
 
Its & complex safety
Its & complex safetyIts & complex safety
Its & complex safety
 
Seminar ppt...; )
Seminar ppt...; )Seminar ppt...; )
Seminar ppt...; )
 
Abb85fb57f02f7b85c8eba91f28b7c99 (1)
Abb85fb57f02f7b85c8eba91f28b7c99 (1)Abb85fb57f02f7b85c8eba91f28b7c99 (1)
Abb85fb57f02f7b85c8eba91f28b7c99 (1)
 

Semelhante a Viyya Ssms Overview 2009

U.S. Federal Department Of Homeland Security
U.S. Federal Department Of Homeland SecurityU.S. Federal Department Of Homeland Security
U.S. Federal Department Of Homeland SecurityMegan Espinoza
 
Crisis Mgt Presentation
Crisis Mgt PresentationCrisis Mgt Presentation
Crisis Mgt Presentationwbesse
 
Design of Emergency Response Management Information Systems
Design of Emergency Response Management Information SystemsDesign of Emergency Response Management Information Systems
Design of Emergency Response Management Information Systemsglobal
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Jisc
 
Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Monica Rivera
 
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTHIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTDavid Sweigert
 
Cda disaster presentation 2010
Cda disaster presentation 2010Cda disaster presentation 2010
Cda disaster presentation 2010Vernon Turner
 
Physical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentPhysical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentVidSys, Inc.
 
Crisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareCrisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareI-Pix Technologies
 
Situation Awareness with IT for Regional Disaster Mangement Workshop
Situation Awareness with IT for Regional Disaster Mangement WorkshopSituation Awareness with IT for Regional Disaster Mangement Workshop
Situation Awareness with IT for Regional Disaster Mangement WorkshopChamindra de Silva
 
Bearing solutions healthcare security ver 0.1
Bearing solutions healthcare security ver 0.1Bearing solutions healthcare security ver 0.1
Bearing solutions healthcare security ver 0.1Lennart Bredberg
 
Healthcare Security by Senior Security Consultant Lennart Bredberg
Healthcare Security by Senior Security Consultant Lennart BredbergHealthcare Security by Senior Security Consultant Lennart Bredberg
Healthcare Security by Senior Security Consultant Lennart BredbergLennart Bredberg
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Cyber Incident Response Plan- Safety Net Against Cyber Threats.pdf
Cyber Incident Response Plan- Safety Net Against Cyber Threats.pdfCyber Incident Response Plan- Safety Net Against Cyber Threats.pdf
Cyber Incident Response Plan- Safety Net Against Cyber Threats.pdfAhad
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEOMicheal Axelsen
 
Risk insights Planning and Managing Events
Risk insights Planning and Managing EventsRisk insights Planning and Managing Events
Risk insights Planning and Managing EventsMark Bennett
 
ICT and Disaster Risk Reduction
ICT and Disaster Risk ReductionICT and Disaster Risk Reduction
ICT and Disaster Risk ReductionGisli Olafsson
 
Summerschool presentation - Annas
Summerschool presentation - AnnasSummerschool presentation - Annas
Summerschool presentation - AnnasAnnaGry
 

Semelhante a Viyya Ssms Overview 2009 (20)

U.S. Federal Department Of Homeland Security
U.S. Federal Department Of Homeland SecurityU.S. Federal Department Of Homeland Security
U.S. Federal Department Of Homeland Security
 
Crisis Mgt Presentation
Crisis Mgt PresentationCrisis Mgt Presentation
Crisis Mgt Presentation
 
Design of Emergency Response Management Information Systems
Design of Emergency Response Management Information SystemsDesign of Emergency Response Management Information Systems
Design of Emergency Response Management Information Systems
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Wasn't expecting that! Now what?
Wasn't expecting that! Now what?
 
Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )Vulnerability Assessment ( Va )
Vulnerability Assessment ( Va )
 
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTHIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
 
Cda disaster presentation 2010
Cda disaster presentation 2010Cda disaster presentation 2010
Cda disaster presentation 2010
 
Physical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentPhysical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the Government
 
Crisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareCrisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced Software
 
Situation Awareness with IT for Regional Disaster Mangement Workshop
Situation Awareness with IT for Regional Disaster Mangement WorkshopSituation Awareness with IT for Regional Disaster Mangement Workshop
Situation Awareness with IT for Regional Disaster Mangement Workshop
 
Bearing solutions healthcare security ver 0.1
Bearing solutions healthcare security ver 0.1Bearing solutions healthcare security ver 0.1
Bearing solutions healthcare security ver 0.1
 
Healthcare Security by Senior Security Consultant Lennart Bredberg
Healthcare Security by Senior Security Consultant Lennart BredbergHealthcare Security by Senior Security Consultant Lennart Bredberg
Healthcare Security by Senior Security Consultant Lennart Bredberg
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Cyber Incident Response Plan- Safety Net Against Cyber Threats.pdf
Cyber Incident Response Plan- Safety Net Against Cyber Threats.pdfCyber Incident Response Plan- Safety Net Against Cyber Threats.pdf
Cyber Incident Response Plan- Safety Net Against Cyber Threats.pdf
 
Titas Global Ltd
Titas Global LtdTitas Global Ltd
Titas Global Ltd
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEO
 
Risk insights Planning and Managing Events
Risk insights Planning and Managing EventsRisk insights Planning and Managing Events
Risk insights Planning and Managing Events
 
ICT and Disaster Risk Reduction
ICT and Disaster Risk ReductionICT and Disaster Risk Reduction
ICT and Disaster Risk Reduction
 
Summerschool presentation - Annas
Summerschool presentation - AnnasSummerschool presentation - Annas
Summerschool presentation - Annas
 

Último

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 

Último (20)

FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 

Viyya Ssms Overview 2009

  • 1. Integrated Safety and Security Management System Viyya Technologies The Right Information. To the Right People. At the Right Time. Presents the
  • 2.
  • 3.
  • 4. Crisis A sudden, generally unanticipated event that profoundly and negatively affects a significant segment of the population and often involves serious injury or death.
  • 5. A Crisis Can Happen to Anyone – Anytime, Anywhere! Safety and Security Planning Must be Integrated with Timely Communication to be Effective
  • 6.
  • 7.  
  • 8.
  • 9.
  • 10. Building Blocks of Safety and Security
  • 11.
  • 12.
  • 13.
  • 15.
  • 16. Vertical Markets Government VIYYA Technologies Web Services - API Commercial Defense and Military K-12 and Higher Education Client Communication Via phones, web, email
  • 17.
  • 18.
  • 19. Summary How Well You Respond — Depends on How Well You are Prepared!