Incident Command

Masters
Essay
Technology
Pages 10 (2510 words)
Download 0
The series of explosions and subsequent fire that caused widespread damage at the Buncefield oil storage and transfer depot, Hemel Hempstead, on 11 December 2005 conspicuously reveals the need for an incident command system (ICS) to be in place in the depot.

Introduction

Also, fire that followed the explosion lasted five days and razed most of the site "emitting a large plume of smoke into the atmosphere that dispersed over South England and beyond" (Assignment Brief).
Hence, the available information provides enough evidence to prove that it was a major incident in a large area and it was sheer providence that only 43 people were injured and none of them seriously although 2000 people had to be evacuated from the location of the fire to safer places (Assignment Brief).
The need for ICS at the Buncefield depot cannot be overstated. The devastating effects of not having ICS were already felt at the depot in 2005 when a series of explosions ripped through the depot. It is therefore primarily important to have an ICS in place at the Buncefield depot. Having a relevant ICS will help limit damages arising from situation like the one that occurred in 2005. Indeed, it must be made statutorily compulsory for organizations such as the Buncefield oil storage and transfer depot to keep in place an ICS (Freeman, John; 2006).
The ICS is time tested to effectively avert and counter disasters that could otherwise lead to destruction to lives and properties on a mass scale.
...
Download paper
Not exactly what you need?

Related papers

Heteregeneous Networks
Since its introduction in 1999, SFU plays a key position that supports heterogeneous networks like Windows and UNIX systems to functionally integrate. SFU has kept up with the changing times, it has extended and substantially improved the tools and bi-directional integration of the solution and improved functional performance.…
Java programs
The application then turns to user mode. It asks the number of tickets purchased. Based on the number entered it asks for the ticket numbers. Another file called 'UserFile.txt' is created that holds all the numbers entered by the user. The numbers are then checked against the winning number and appropriate results are announced. The application then asks if another user wants to try his own. The…
Incident Command
Also, fire that followed the explosion lasted five days and razed most of the site "emitting a large plume of smoke into the atmosphere that dispersed over South England and beyond" (Assignment Brief).…
Information, Security & Control
They embarked on a R&D program to develop a suite of Internet based enterprise application software. These applications would work perfectly with Oracle databases. This eradicated the need to hold large numbers of databases on a client/server architecture since the delivery could be achieved through an Internet browser. Having developed the tools, Ellison took another of his great strategic…
The Role of Mobiles in Disasters
ame out of the trying experience traumatised but with a will to start life all over again. Today's disasters taught humanity to respond and prepare to that moment when nature on a mad rampage delivers once again its deathly whipping that normally results to a gnashing of teeth. Today governments and the private sector or various non-government organisations exert gargantuan efforts to resist these…
IT Project Management
This document is intended to be a living document. As implements the components of this assessment, and to facilitate the every changing state-of-the-art, the (ISN) CRA process may need to be refined. Consequently, the final version of this document should itself be placed under change management and the respective changes managed accordingly.…
Systems Programming
If you have not completed the work by the due date please hand in whatever you have done.…