An at-a-glance version of the Federal guides that help school, district, and higher ed emergency management personnel develop and update high-quality, customized emergency operations plans.
Participate through the REMS TA Center or FEMA to promote family and community emergency planning. The 2019 theme is Prepared, Not Scared.
Watch our NEW archived Webinar with the COPS Office, NASRO, Police Foundation, and IACLEA.
Watch our NEW archived Webinar with FEMA's National Exercise Division.
Read our NEW fact sheet on planning for wildfires at education agencies and wildfire preparedness activities.
Watch our NEW archived Webinar with the U.S. Environmental Protection Agencys Office of Ground Water and Drinking Water.
Read the Summer 2019 edition of our newsletter.
Start assessing the safety, security, accessibility, and emergency preparedness of your education agency's buildings and grounds.
A virtual space to collaborate on special projects, share news and resources, discuss trends and ideas, and learn from the experiences of others in the field. Join today!
You are accessing a U.S. Federal Government computer system intended to be solely accessed by individual users expressly authorized to access the system by the U.S. Department of Education. Usage may be monitored, recorded, and/or subject to audit. For security purposes and in order to ensure that the system remains available to all expressly authorized users, the U.S. Department of Education monitors the system to identify unauthorized users. Anyone using this system expressly consents to such monitoring and recording. Unauthorized use of this information system is prohibited and subject to criminal and civil penalties. Except as expressly authorized by the U.S. Department of Education, unauthorized attempts to access, obtain, upload, modify, change, and/or delete information on this system are strictly prohibited and are subject to criminal prosecution under 18 U.S.C. § 1030, and other applicable statutes, which may result in fines and imprisonment. For purposes of this system, unauthorized access includes, but is not limited to: