{"id":638,"date":"2022-09-08T14:06:18","date_gmt":"2022-09-08T14:06:18","guid":{"rendered":"https:\/\/www.voxghostwriting.com\/blog\/?p=638"},"modified":"2024-02-26T11:21:47","modified_gmt":"2024-02-26T11:21:47","slug":"which-nims-component-includes-the-incident-command-system","status":"publish","type":"post","link":"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/","title":{"rendered":"Which NIMS Component Includes the Incident Command System"},"content":{"rendered":"<p><span data-offset-key=\"92o7d-22-0\">The<\/span><a href=\"https:\/\/www.voxghostwriting.com\/blog\/how-many-nims-management-characteristics-are-there\/\"><span data-offset-key=\"92o7d-23-0\"> National<\/span><span data-offset-key=\"92o7d-24-0\"> Incident<\/span><span data-offset-key=\"92o7d-25-0\"> Management<\/span><span data-offset-key=\"92o7d-26-0\"> System<\/span><span data-offset-key=\"92o7d-27-0\"> (<\/span><span data-offset-key=\"92o7d-28-0\">N<\/span><span data-offset-key=\"92o7d-29-0\">IM<\/span><span data-offset-key=\"92o7d-30-0\">S<\/span><span data-offset-key=\"92o7d-31-0\">)<\/span><\/a><span data-offset-key=\"92o7d-32-0\"> is<\/span><span data-offset-key=\"92o7d-33-0\"> a<\/span><span data-offset-key=\"92o7d-34-0\"> comprehensive<\/span><span data-offset-key=\"92o7d-35-0\">,<\/span><span data-offset-key=\"92o7d-36-0\"> nationwide<\/span><span data-offset-key=\"92o7d-37-0\">,<\/span><span data-offset-key=\"92o7d-38-0\"> all<\/span><span data-offset-key=\"92o7d-39-0\">&#8211;<\/span><span data-offset-key=\"92o7d-40-0\">h<\/span><span data-offset-key=\"92o7d-41-0\">az<\/span><span data-offset-key=\"92o7d-42-0\">ards<\/span><span data-offset-key=\"92o7d-43-0\"> approach<\/span><span data-offset-key=\"92o7d-44-0\"> to<\/span><span data-offset-key=\"92o7d-45-0\"> incident<\/span><span data-offset-key=\"92o7d-46-0\"> management<\/span><span data-offset-key=\"92o7d-47-0\"> that<\/span><span data-offset-key=\"92o7d-48-0\"> is<\/span><span data-offset-key=\"92o7d-49-0\"> used<\/span><span data-offset-key=\"92o7d-50-0\"> by<\/span><span data-offset-key=\"92o7d-51-0\"> emergency<\/span><span data-offset-key=\"92o7d-52-0\"> response<\/span><span data-offset-key=\"92o7d-53-0\"> personnel<\/span><span data-offset-key=\"92o7d-54-0\"> to<\/span><span data-offset-key=\"92o7d-55-0\"> effectively<\/span><span data-offset-key=\"92o7d-56-0\"> and<\/span><span data-offset-key=\"92o7d-57-0\"> efficiently<\/span><span data-offset-key=\"92o7d-58-0\"> respond<\/span><span data-offset-key=\"92o7d-59-0\"> to<\/span><span data-offset-key=\"92o7d-60-0\"> incidents<\/span><span data-offset-key=\"92o7d-61-0\">.<\/span><span data-offset-key=\"92o7d-62-0\"> N<\/span><span data-offset-key=\"92o7d-63-0\">IM<\/span><span data-offset-key=\"92o7d-64-0\">S<\/span><span data-offset-key=\"92o7d-65-0\"> includes<\/span><span data-offset-key=\"92o7d-66-0\"> the<\/span><span data-offset-key=\"92o7d-67-0\"> Incident<\/span><span data-offset-key=\"92o7d-68-0\"> Command<\/span><span data-offset-key=\"92o7d-69-0\"> System<\/span><span data-offset-key=\"92o7d-70-0\"> (<\/span><span data-offset-key=\"92o7d-71-0\">ICS<\/span><span data-offset-key=\"92o7d-72-0\">),<\/span><span data-offset-key=\"92o7d-73-0\"> which<\/span><span data-offset-key=\"92o7d-74-0\"> is<\/span><span data-offset-key=\"92o7d-75-0\"> a<\/span><span data-offset-key=\"92o7d-76-0\"> standardized<\/span><span data-offset-key=\"92o7d-77-0\"> approach<\/span><span data-offset-key=\"92o7d-78-0\"> to<\/span><span data-offset-key=\"92o7d-79-0\"> the<\/span><span data-offset-key=\"92o7d-80-0\"> command<\/span><span data-offset-key=\"92o7d-81-0\">,<\/span><span data-offset-key=\"92o7d-82-0\"> control<\/span><span data-offset-key=\"92o7d-83-0\">,<\/span><span data-offset-key=\"92o7d-84-0\"> and<\/span><span data-offset-key=\"92o7d-85-0\"> coordination<\/span><span data-offset-key=\"92o7d-86-0\"> of<\/span><span data-offset-key=\"92o7d-87-0\"> emergency<\/span><span data-offset-key=\"92o7d-88-0\"> response<\/span><span data-offset-key=\"92o7d-89-0\">.<\/span><span data-offset-key=\"92o7d-90-0\"> I<\/span><span data-offset-key=\"92o7d-91-0\">CS<\/span><span data-offset-key=\"92o7d-92-0\"> is<\/span><span data-offset-key=\"92o7d-93-0\"> used<\/span><span data-offset-key=\"92o7d-94-0\"> by<\/span><span data-offset-key=\"92o7d-95-0\"> emergency<\/span><span data-offset-key=\"92o7d-96-0\"> response<\/span><span data-offset-key=\"92o7d-97-0\"> personnel<\/span><span data-offset-key=\"92o7d-98-0\"> to<\/span><span data-offset-key=\"92o7d-99-0\"> manage<\/span><span data-offset-key=\"92o7d-100-0\"> incidents<\/span><span data-offset-key=\"92o7d-101-0\"> of<\/span><span data-offset-key=\"92o7d-102-0\"> all<\/span><span data-offset-key=\"92o7d-103-0\"> sizes<\/span><span data-offset-key=\"92o7d-104-0\">,<\/span><span data-offset-key=\"92o7d-105-0\"> from<\/span><span data-offset-key=\"92o7d-106-0\"> small<\/span><span data-offset-key=\"92o7d-107-0\">,<\/span><span data-offset-key=\"92o7d-108-0\"> localized<\/span><span data-offset-key=\"92o7d-109-0\"> events<\/span><span data-offset-key=\"92o7d-110-0\"> to<\/span><span data-offset-key=\"92o7d-111-0\"> large<\/span><span data-offset-key=\"92o7d-112-0\">&#8211;<\/span><span data-offset-key=\"92o7d-113-0\">scale<\/span><span data-offset-key=\"92o7d-114-0\">,<\/span><span data-offset-key=\"92o7d-115-0\"> multi<\/span><span data-offset-key=\"92o7d-116-0\">&#8211;<\/span><span data-offset-key=\"92o7d-117-0\">j<\/span><span data-offset-key=\"92o7d-118-0\">ur<\/span><span data-offset-key=\"92o7d-119-0\">isd<\/span><span data-offset-key=\"92o7d-120-0\">ictional<\/span><span data-offset-key=\"92o7d-121-0\"> disasters<\/span><span data-offset-key=\"92o7d-122-0\">.<\/span><span data-offset-key=\"92o7d-123-0\"> I<\/span><span data-offset-key=\"92o7d-124-0\">CS<\/span><span data-offset-key=\"92o7d-125-0\"> is<\/span><span data-offset-key=\"92o7d-126-0\"> a<\/span><span data-offset-key=\"92o7d-127-0\"> scalable<\/span><span data-offset-key=\"92o7d-128-0\">,<\/span><span data-offset-key=\"92o7d-129-0\"> flexible<\/span><span data-offset-key=\"92o7d-130-0\">,<\/span><span data-offset-key=\"92o7d-131-0\"> and<\/span><span data-offset-key=\"92o7d-132-0\"> adapt<\/span><span data-offset-key=\"92o7d-133-0\">able<\/span><span data-offset-key=\"92o7d-134-0\"> system<\/span><span data-offset-key=\"92o7d-135-0\"> that<\/span><span data-offset-key=\"92o7d-136-0\"> can<\/span><span data-offset-key=\"92o7d-137-0\"> be<\/span><span data-offset-key=\"92o7d-138-0\"> used<\/span><span data-offset-key=\"92o7d-139-0\"> in<\/span><span data-offset-key=\"92o7d-140-0\"> a<\/span><span data-offset-key=\"92o7d-141-0\"> variety<\/span><span data-offset-key=\"92o7d-142-0\"> of<\/span><span data-offset-key=\"92o7d-143-0\"> incident<\/span><span data-offset-key=\"92o7d-144-0\"> scenarios<\/span><span data-offset-key=\"92o7d-145-0\">.<\/span><\/p>\n<p style=\"text-align: center;\"><a class=\"cta-button\" style=\"display: inline-block; padding: 15px 30px; background-color: #3498db; color: #ffffff; text-decoration: none; font-weight: bold; font-size: 16px; border-radius: 20px; border: 2px solid #2980b9; box-shadow: 0 4px 6px rgba(0, 0, 0, 0.1); transition: background-color 0.3s;\" href=\"https:\/\/www.voxghostwriting.com\/blog\/which-ics-function-is-responsible-for-documentation-of-mutual-aid-agreements\/\" target=\"_blank\" rel=\"noopener noreferrer\">ICS Function is for Documentation of Mutual aid Agreements?<\/a><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_75 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/#Introduction\" >Introduction:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/#Overview_of_NIMS_Components\" >Overview of NIMS Components:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/#Introduction_to_the_Incident_Command_System_ICS\" >Introduction to the Incident Command System (ICS):<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/#Key_Principles_of_ICS\" >Key Principles of ICS:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/#Structure_of_the_Incident_Command_System\" >Structure of the Incident Command System:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/#Integration_with_Other_NIMS_Components\" >Integration with Other NIMS Components:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/#Scalability_and_Flexibility_of_ICS\" >Scalability and Flexibility of ICS:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/#Training_and_Implementation\" >Training and Implementation:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/#Conclusion\" >Conclusion:<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Introduction\"><\/span><strong>Introduction:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The National Incident Management System (NIMS) stands as a cornerstone in the realm of emergency management, providing a comprehensive framework to streamline responses to incidents of varying scale and complexity. At the heart of NIMS lies the Incident Command System (ICS), a vital component designed to ensure effective incident management and coordination. This article delves into the intricacies of ICS and its pivotal role within the broader NIMS structure.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Overview_of_NIMS_Components\"><\/span><strong>Overview of NIMS Components:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>NIMS comprises several key components, each playing a crucial role in the efficient management of incidents. These components include Command and Management, Preparedness, Resource Management, Communications and Information Management, and Ongoing Management and Maintenance. Together, they form a cohesive system to address emergencies comprehensively.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Introduction_to_the_Incident_Command_System_ICS\"><\/span><strong>Introduction to the Incident Command System (ICS):<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The Incident Command System (ICS) emerges as a linchpin within NIMS, offering a standardized and scalable approach to incident management. At its core, ICS is a management system designed to facilitate coordination and communication during emergencies, ensuring a cohesive and effective response.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Key_Principles_of_ICS\"><\/span><strong>Key Principles of ICS:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The success of ICS lies in its adherence to key principles. These include establishing a clear chain of command, adopting a modular organizational structure, promoting unified command, and facilitating integrated communication. These principles provide a solid foundation for managing incidents efficiently and collaboratively.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Structure_of_the_Incident_Command_System\"><\/span><strong>Structure of the Incident Command System:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Breaking down the organizational structure of ICS is essential to understanding its functionality. The system is organized into key roles, including the Incident Commander, Command Staff, General Staff, and specific functions such as Operations, Planning, Logistics, and Finance\/Administration. This hierarchical structure ensures clarity and effectiveness in managing incidents.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Integration_with_Other_NIMS_Components\"><\/span><strong>Integration with Other NIMS Components:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>ICS seamlessly integrates with other NIMS components, enhancing its capabilities. It plays a vital role in coordinating resources, managing information, and facilitating communication across various agencies and jurisdictions. This integration ensures a unified and cohesive response to incidents, regardless of their nature or scope.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Scalability_and_Flexibility_of_ICS\"><\/span><strong>Scalability and Flexibility of ICS:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>One of the remarkable features of ICS is its scalability and flexibility. It can adapt to incidents of varying complexity and magnitude, making it a valuable tool for emergency management. From routine incidents to large-scale disasters, ICS remains a versatile and adaptable system.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Training_and_Implementation\"><\/span><strong>Training and Implementation:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Effective implementation of ICS requires training and preparedness. Personnel involved in incident management must undergo training to familiarize themselves with ICS principles. Regular drills and exercises ensure that teams are well-prepared to apply ICS in real-world scenarios, fostering a culture of readiness.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><strong>Conclusion:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In conclusion, the Incident Command System within the National Incident Management System serves as a linchpin for effective incident response. Its principles, organizational structure, and seamless integration with other NIMS components make it a versatile and powerful tool in emergency management. Understanding and implementing ICS principles are critical steps toward building a resilient and coordinated response system, ensuring the safety and well-being of communities in the face of adversity. As we navigate the complexities of emergency management, the Incident Command System remains a beacon of efficiency and collaboration in safeguarding our communities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The National Incident Management System (NIMS) is a comprehensive, nationwide, all&#8211;hazards approach to incident management that is used by emergency response personnel to effectively and efficiently respond to incidents. NIMS includes the Incident Command System (ICS), which is a standardized approach to the command, control, and coordination of emergency response. ICS is used by emergency [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-638","post","type-post","status-publish","format-standard","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Which NIMS Component Includes the Incident Command System<\/title>\n<meta name=\"description\" content=\"Which NIMS Component Includes the Incident Command System\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Which NIMS Component Includes the Incident Command System\" \/>\n<meta property=\"og:description\" content=\"Which NIMS Component Includes the Incident Command System\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Vox Ghostwriting\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-08T14:06:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-26T11:21:47+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.voxghostwriting.com\\\/blog\\\/which-nims-component-includes-the-incident-command-system\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.voxghostwriting.com\\\/blog\\\/which-nims-component-includes-the-incident-command-system\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.voxghostwriting.com\\\/blog\\\/#\\\/schema\\\/person\\\/5d1cfce7e5b78143fc232c42e92ea757\"},\"headline\":\"Which NIMS Component Includes the Incident Command System\",\"datePublished\":\"2022-09-08T14:06:18+00:00\",\"dateModified\":\"2024-02-26T11:21:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.voxghostwriting.com\\\/blog\\\/which-nims-component-includes-the-incident-command-system\\\/\"},\"wordCount\":628,\"commentCount\":0,\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.voxghostwriting.com\\\/blog\\\/which-nims-component-includes-the-incident-command-system\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.voxghostwriting.com\\\/blog\\\/which-nims-component-includes-the-incident-command-system\\\/\",\"url\":\"https:\\\/\\\/www.voxghostwriting.com\\\/blog\\\/which-nims-component-includes-the-incident-command-system\\\/\",\"name\":\"Which NIMS Component Includes the Incident Command System\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.voxghostwriting.com\\\/blog\\\/#website\"},\"datePublished\":\"2022-09-08T14:06:18+00:00\",\"dateModified\":\"2024-02-26T11:21:47+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.voxghostwriting.com\\\/blog\\\/#\\\/schema\\\/person\\\/5d1cfce7e5b78143fc232c42e92ea757\"},\"description\":\"Which NIMS Component Includes the Incident Command System\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.voxghostwriting.com\\\/blog\\\/which-nims-component-includes-the-incident-command-system\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.voxghostwriting.com\\\/blog\\\/which-nims-component-includes-the-incident-command-system\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.voxghostwriting.com\\\/blog\\\/which-nims-component-includes-the-incident-command-system\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.voxghostwriting.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Which NIMS Component Includes the Incident Command System\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.voxghostwriting.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.voxghostwriting.com\\\/blog\\\/\",\"name\":\"Vox Ghostwriting\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.voxghostwriting.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.voxghostwriting.com\\\/blog\\\/#\\\/schema\\\/person\\\/5d1cfce7e5b78143fc232c42e92ea757\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/545421ce95e134df1d0f0d69945801914883cf820f7e0af382692f8203e51e6a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/545421ce95e134df1d0f0d69945801914883cf820f7e0af382692f8203e51e6a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/545421ce95e134df1d0f0d69945801914883cf820f7e0af382692f8203e51e6a?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/www.voxghostwriting.com\\\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Which NIMS Component Includes the Incident Command System","description":"Which NIMS Component Includes the Incident Command System","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/","og_locale":"en_US","og_type":"article","og_title":"Which NIMS Component Includes the Incident Command System","og_description":"Which NIMS Component Includes the Incident Command System","og_url":"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/","og_site_name":"Vox Ghostwriting","article_published_time":"2022-09-08T14:06:18+00:00","article_modified_time":"2024-02-26T11:21:47+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/#article","isPartOf":{"@id":"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/"},"author":{"name":"admin","@id":"https:\/\/www.voxghostwriting.com\/blog\/#\/schema\/person\/5d1cfce7e5b78143fc232c42e92ea757"},"headline":"Which NIMS Component Includes the Incident Command System","datePublished":"2022-09-08T14:06:18+00:00","dateModified":"2024-02-26T11:21:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/"},"wordCount":628,"commentCount":0,"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/","url":"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/","name":"Which NIMS Component Includes the Incident Command System","isPartOf":{"@id":"https:\/\/www.voxghostwriting.com\/blog\/#website"},"datePublished":"2022-09-08T14:06:18+00:00","dateModified":"2024-02-26T11:21:47+00:00","author":{"@id":"https:\/\/www.voxghostwriting.com\/blog\/#\/schema\/person\/5d1cfce7e5b78143fc232c42e92ea757"},"description":"Which NIMS Component Includes the Incident Command System","breadcrumb":{"@id":"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.voxghostwriting.com\/blog\/which-nims-component-includes-the-incident-command-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.voxghostwriting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Which NIMS Component Includes the Incident Command System"}]},{"@type":"WebSite","@id":"https:\/\/www.voxghostwriting.com\/blog\/#website","url":"https:\/\/www.voxghostwriting.com\/blog\/","name":"Vox Ghostwriting","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.voxghostwriting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.voxghostwriting.com\/blog\/#\/schema\/person\/5d1cfce7e5b78143fc232c42e92ea757","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/545421ce95e134df1d0f0d69945801914883cf820f7e0af382692f8203e51e6a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/545421ce95e134df1d0f0d69945801914883cf820f7e0af382692f8203e51e6a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/545421ce95e134df1d0f0d69945801914883cf820f7e0af382692f8203e51e6a?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/www.voxghostwriting.com\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/www.voxghostwriting.com\/blog\/wp-json\/wp\/v2\/posts\/638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.voxghostwriting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.voxghostwriting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.voxghostwriting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.voxghostwriting.com\/blog\/wp-json\/wp\/v2\/comments?post=638"}],"version-history":[{"count":5,"href":"https:\/\/www.voxghostwriting.com\/blog\/wp-json\/wp\/v2\/posts\/638\/revisions"}],"predecessor-version":[{"id":989,"href":"https:\/\/www.voxghostwriting.com\/blog\/wp-json\/wp\/v2\/posts\/638\/revisions\/989"}],"wp:attachment":[{"href":"https:\/\/www.voxghostwriting.com\/blog\/wp-json\/wp\/v2\/media?parent=638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.voxghostwriting.com\/blog\/wp-json\/wp\/v2\/categories?post=638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.voxghostwriting.com\/blog\/wp-json\/wp\/v2\/tags?post=638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}