34. Common Vulnerabilities (cont.) There is no universal list of vulnerabilities that applies to all assets of a particular type within an infrastructure category. “Common” vulnerabilities should be interpreted as having a high likelihood of occurrence, but not as applying to each and every individual facility or asset. Some common vulnerabilities for hotels include: Guest drop-off and pick-up points that may not provide a safe distance in order to mitigate blasts from explosives in vehicles Parking garages that may have open access to the public with little to no screening A limited security force
35.
36. Personnel being questioned off-site about practices pertaining to the facility or the facility’s supporting infrastructure (e.g., electricity and natural gas lines)
44. Contingency Planning -Alternative moves taken when events don’t play out as expected. Safeguard companies and better prepare them to handle crisis situations.
45. Issue Analysis -Alert the decision makers of trends that are occurring in the external environment. This information should be used to maneuver companies into more advantageous waters.
91. Interests in deciding a forum: an adequate access to evidence and relevant sites, to witnesses, adequate enforcement of judgments, and the practicalities and expenses associated with the litigation
92. Case #1: Egypt inadequate forum because of place of attack and strong anti-Americans and anti-Israelis sentiments in the country, and plaintiffs would be unable to testify under Egyptian legal system
93. Case #2: Similar situation with case #1. However, defendants moved for dismissal on the ground of forum claiming information critical to its defense could be obtained only in Egypt and Egyptian court would better apply Egyptian tort law
94.
95. Case #1: Police identified suspected drug dealer entering a motel room. They entered the room with managers consent, found cocaine and arrested criminals. Defendants appealed claiming Fourth Amendment right, refused as they were past c/o time and there was no legitimate expectation of privacy after c/o
96. Case #2: Sheriff conducted random warrant check of the motel via guest registry list and found guest with an arrest warrant
97. “the random check of the motel registry revealing his whereabouts constitutes a violation of his privacy rights under article I, section 7 of the Washington State Constitution”