NIMS Management Characteristics Flashcards

1
Q

What are the 14 proven management characteristics?

A
  1. Common Terminology
  2. Modular Organization
  3. Management by Objectives
  4. Incident Action Planning
  5. Manageable Span of Control
  6. Incident Facilities and Location
  7. Comprehensive Resource Management
  8. Integrated Communications
  9. Establishment and Transfer of Command
  10. Unified Command
  11. Chain of Command and Unity of Command
  12. Accountability
  13. Dispatch and Deployment
  14. Information and Intelligence Management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Common Terminology cover?

A
  • Organizational Functions
  • Resource Descriptions
  • Incident Facilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When it comes to terminology, communications should use what?

A

Common Terms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When it comes to terminology, what should organizations avoid?

A

Radio codes, agency codes, acronyms, or jargon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the goal of Common Terminology?

A

To promote understand amongst parties involved in the incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does the ICS organization structure develop?

A

In a modular fashion based on the incident’s size and complexity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The responsibility for establishment and expansion of the ICS modular organization rests with whom?

A

The Incident Commander.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

As the incident grows more complex, what change might the ICS organization make?

A

It may expand as functional responsibilities are delegated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who establishes incident objectives that drive incident operations?

A

The Incident Commander or Unified Command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does Management by Objectives inlcude?

A
  • Establishing specific, measurable incident objectives.
  • Establishing strategies, tactics, tasks, and activities to achieve the objectives.
  • Developing and issuing assignments, plans, procedures, and protocols to accomplish identified tasks.
  • Documenting results for the incident objectives.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does Incident Action Planning do?

A

It guides effective incident management activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Incident Action Plan (IAP)?

A

It is a concise, coherent means of capturing and communicating overall incident priorities, objectives, strategies, tactics, and assignments in the context of both operational and support activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does “IAP” stand for?

A

Incident Action Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What should the Incident Action Plan (IAP) focus on?

A

Addressing the needs of future time frames (called Operation Periods).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To be effective, the Incident Action Plan (IAP) should do what?

A
  • Cover a specific time frame.
  • Be proactive.
  • Specify the incident objectives.
  • State the activities to be completed.
  • Assign responsibilities.
  • Identify needed resources.
  • Specify communication protocols.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

For smaller or less complex incidents, the Incident Action Plan (IAP) may be in what form?

A

Oral or written, except for hazardous material incidents, which require a written IAP.

Note: FEMA has developed a series of ICS Forms for use in developing a written IAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does Span of Control refer to?

A

The number of individuals or resources that one supervisor can manage during an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the optimal Span of Control?

A

One supervisor to five subordinates (1:5).

19
Q

What may happen if too much responsibility is given to a supervisor?

A

The supervisor’s span of control may become unmanageable.

20
Q

A manageable Span of Control may vary depending on what factors?

A
  • Type of incident.
  • Nature of tasks.
  • Hazards and safety factors.
  • Distances between personnel and resources.
21
Q

Maintain a manageable Span of Control is particularly important where?

A

At incidents where safety and accountability are a top priority.

22
Q

Incident Facilities and Locations typically include what?

A
  • Incident Command Post (ICP).
  • Incident base, staging areas, and camps.
  • Mass casualty triage areas.
  • Point-of-distribution.
  • Emergency shelters.
23
Q

What does ICP stand for?

A

Incident Command Post

24
Q

What does Comprehensive Resource Management do?

A

Describes standard mechanisms to:

|--------------------------->| 
|                                 |
|               Identify requirements
|                                 | 
|                  Order and Acquire
|                                 |
|                          Mobilize
|                                 |
|                  Track and Report
|                                 |
|                        Demobilize
|                                 |
|      Reimburse and restock resources 
|     such as personnel, |teams, facilities, 
|             equipment, and supplies.
|                                 |
|
25
Q

Key resource management activities include what?

A
  • Resource Identification and Tying.
  • Qualification, Certification, and Credentialing personnel.
  • Planning for resources.
  • Acquiring, Storing, and Inventorying Resources.
26
Q

Incident Communications are facilitated through what?

A

Development and use of a common communications and interoperable communication processes and systems that include voice and data links.

27
Q

Integrated Communications are necessary in order to do what?

A
  • Maintain Connectivity
  • Achieve Situational Awareness
  • Facilitate Information Sharing
28
Q

Who has primary responsibility for designating the Incident Commander and the process for transferring command?

A

The jurisdiction or organization with primary responsibility for the incident.

29
Q

When command is transferred, the process should include what?

A

A briefing that captures all essential information for continuing safe and effective operations.

30
Q

How does the Unified Command manage the incident?

A

There is no ‘one” Incident Commander. Unified Command manages the incident through jointly-approved objectives.

31
Q

How are organizations represented in a Unified Command determined?

A

On a case by case basis, and may include law enforcement, fire, public health, public works, and other entities.

32
Q

What is Chain of Command?

A

An orderly line that details how authority flows through the hierarchy of the incident management organization.

33
Q

What allows an incident commander to direct and control the actions of all personnel on the incident?

A

Chain of command.

34
Q

How does chain of command avoid confusion?

A

By requiring that orders flow from supervisors.

35
Q

Does chain of command prevent personnel from directly communicating with each other to ask or share information?

A

No. While formal direction and control follow the chain of command, informal information sharing throughout the ICS structure.

36
Q

What does Unity of Command deal with?

A

The fact that all individuals have a single designated supervisor they report to.

37
Q

Based on Unity of Command, you will do what?

A
  • Report to only one Incident Command System (ICS) supervisor.
  • Receive work assignments only from your ICS supervisor.
38
Q

When you are assigned to an incident, do you sill report to your day-to-day supervisor?

A

No.

39
Q

As part of the Incident Command System (ICS), you will need to abide by what?

A

Agency policy and guidelines, and any applicable local, tribal, state, or federal rules and regulations.

40
Q

As part of the Incident Command System (ICS), what principles of Accountability will you need to adhere to?

A
  • Check-in/Check-out. All responders must report in to receive an assignment. Checking-out is just as critical as checking-in.
  • Incident Action Planning. Response operations must be coordinated as outlined in the Incident Action Plan (IAP).
  • Unity of Command. Each individual will be assigned to only one supervisor.
  • Personal responsibility. ICS relies on each individual taking personal accountability for their own actions.
  • Span of Control. Supervisors must be able to adequately supervise and control their subordinates, as well as communicate with and manage all resources under their supervision.
  • Resource Tracking. Supervisors must record and report resource status changes as they occur. Accountability starts as soon as a resource is requested through the time that resource returns to home base safely.
41
Q

When should resources be deployed?

A

Only when requested or when dispatched by an appropriate authority through established resource management systems. Resources not requested should refrain from self-dispatching to avoid overburdening the incident command.

42
Q

In the National Incident Management System (NIMS) “intelligence” refers exclusively to what?

A

Threat-related information developed by law enforcement, medical surveillance, and other investigative organizations.

43
Q

What is it called when incident command must establish a process for gathering, analyzing, assessing, sharing, and managing incident-related information and intelligence?

A

Information and Intelligence Management

44
Q

What are some typical sources used to gather information and intelligence?

A
  • 911 calls.
  • Radio, video, and data communications among responders.
  • Situation Reports (SITREPS).
  • Technical specialists from organizations such as the national Weather service.
  • Reports from field observers.
  • Geospatial products, such as GIS.
  • Print, online, broadcast, and social media.
  • Risk assessments.
  • Terroristic or violent threats.
  • Surveillance of disease outbreaks.
  • Structural plans and vulnerabilities.