Anticipating problems can prevent them. In an emergency, first responders will come to help. Eighty percent of Wisconsin's fire departments are staffed with volunteers. Protecting their safety by planning ahead is important. Chain-of-command…
Vulnerability Assessments are a good way to determine what types of security measures meet each wastewater system's needs. Vulnerabilities may consist of flaws in security procedures, software, internal system controls, transmission of data, or the…
OverviewSeptage is defined as the wastewater or contents of septic tanks, holding tanks, dosing chambers, grease interceptors, seepage beds, seepage pits, seepage trenches, privies or portable restrooms (reference s. NR 113.03(55), Wis. Adm. Code).…
The U.S. EPA sponsors workshops on using the VSAT™ (Vulnerability Self-Assessment Tool) computer software program through the Water Environment Federation [exit DNR]. These workshops are free, and wastewater operators who live more than 100 miles…
Brochures Fifteen Ways to Secure Your Municipal Wastewater Treatment Construction Project 10 Steps to Maintain Critical Wastewater Services and Protect Public Health in an Emergency Wastewater Systems Security: Vandalism Prevention Design…
Vulnerability Assessments help identify and prioritize the best security measures for each wastewater system. Physical wastewater security measures include:
No federal or state regulations currently exist that require wastewater treatment plants to conduct a vulnerability assessment. The DNR encourages municipalities to voluntarily complete a vulnerability assessment for the following reasons:
Are you planning a wastewater treatment plant modification or major upgrade? If so, consider planning for the future by including security measures as part of your construction project. The most cost-effective time to install security equipment is…
Wastewater utilities are required to develop emergency response protocols for spill reporting under ch. 292, Wis. Stats. An Emergency Response Plan (ERP) is a comprehensive document that accounts for actions that occur before, during and after…
Supervisory Control and Data Acquisition (SCADA) systems can integrate data from motion sensors, security lights, window/door alarms, surveillance cameras and other security equipment alarms. Should you program your SCADA system to monitor and…