Menu
Bomb threat procedures

Bomb threat procedures

These are the detailed bomb threat procedures for a U.S.-based non-profit organization that promotes environmental activism and causes. A bomb threat procedure was drafted in 2000 after the organization received a threat

These are the detailed bomb threat procedures for a U.S.-based non-profit organization that promotes environmental activism and causes. A bomb threat procedure was drafted in 2000 after the organization received a threat

REPORTING A BOMB THREAT Remain calm. Do not alarm other employees.

IF THREAT IS BY TELEPHONE: 1.) Keep the caller on the line for as long as possible. Be polite and show interest. 2.) Ask: Location of Bomb Time set to explode Where is the bomb located? What does it look like? What kind of bomb is it? What will make it explode? Did you place the bomb? Yes No Why? What is your name?

3.) Do not hang up, even if the caller does. Not replacing the handset enables the call to be traced.

4.) If possible, write a note to a colleague to call the authorities or, as soon as the caller hangs up, immediately notify authorities yourself.

5.) If your phone has a caller ID display, copy the number and/or letters on the window display.

6.) Note: Caller's voice and accent Background sounds Estimated age of caller Tone of threat

IF A SUSPICIOUS OBJECT OR PACKAGE IS FOUND: 1.) Do not touch 2.) Keep areas clear 3.) Contact authorities 4.) Signs of a suspicious package include: No return address Excessive postage Stains Strange odor Strange sounds Unexpected Delivery Poorly handwritten Misspelled Words Incorrect Titles Foreign Postage Restrictive Notes

IF THREAT IS BY LETTER: 1.) Do not handle more than necessary 2.) Where possible, the item should be placed into a plastic pocket to preserve any physical evidence.

WHEN CONTACTING AUTHORITIES Do not use mobile phones or other electronic equipment that may trigger a device. Turn off mobile phones

SECURITY BOMB THREAT ASSESSMENT Where possible, a threat assessment team shall communicate and consider the information available, assess the legitimacy of the threat and determine the course of action. Where concerns for safety exist police shall be notified and requested to attend, manage the incident and investigate.

EVACUATION (Company name) may through its security management direct the evacuation of any building, area or part thereof and/or request a search of the area be conducted by suitably trained security and/or emergency services personnel. 1.) Employees and visitors should be prepared to evacuate and await further instruction from security. 2.) Evacuate the building as instructed to do so by the emergency personnel. 3.) Persons may be asked to remove all personal belongings, such as bags and briefcases when evacuating.

INCIDENT RECORDING A Security Incident Report will be completed for ALL reported threats.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about ING Australia

Show Comments
[]