Security policy

Sample bomb threat procedures

These are the detailed bomb threat procedures for a U.S.-based non-profit organization that promotes environmental activism and causes. A bomb threat procedure was drafted after the organization received a threat.

You are free to use or adapt this sample policy, which was contributed by the security community, for use in your own organization (but not for re-publication or for-profit use).

Want to provide a policy or checklist? Contributions are welcome, as is expert commentary. Send your thoughts to Amy Bennett (abennett@cxo.com).

  

To continue reading this article register now

The 10 most powerful cybersecurity companies