• United States



by CSO staff

Sample bomb threat procedures

Jan 21, 20163 mins
IT LeadershipPhysical SecuritySecurity

These are the detailed bomb threat procedures for a U.S.-based non-profit organization that promotes environmental activism and causes. A bomb threat procedure was drafted after the organization received a threat.

You are free to use or adapt this sample policy, which was contributed by the security community, for use in your own organization (but not for re-publication or for-profit use).

Reporting a bomb threat

Remain calm. Do not alarm other employees.

If threat is by telephone:

  1. Keep the caller on the line for as long as possible. Be polite and show interest.
  2. Ask:
    • Location of bomb
    • Time set to explode
    • Where is the bomb located?
    • What does it look like?
    • What kind of bomb is it?
    • What will make it explode?
    • Did you place the bomb? Yes No
    • Why?
    • What is your name?
  3. Do not hang up, even if the caller does. Not replacing the handset enables the call to be traced.
  4. If possible, write a note to a colleague to call the authorities or, as soon as the caller hangs up, immediately notify authorities yourself.
  5. If your phone has a caller ID display, copy the number and/or letters on the window display.
  6. Note:
  • Caller’s voice and accent
  • Background sounds
  • Estimated age of caller
  • Tone of threat

If a suspicious object or package is found:

  1. Do not touch
  2. Keep areas clear
  3. Contact authorities
  4. Signs of a suspicious package include:
  • No return address
  • Excessive postage
  • Stains
  • Strange odor
  • Strange sounds
  • Unexpected Delivery
  • Poorly handwritten
  • Misspelled Words
  • Incorrect Titles
  • Foreign Postage
  • Restrictive Notes

If threat is by letter:

  1. Do not handle more than necessary
  2. Where possible, the item should be placed into a plastic pocket to preserve any physical evidence.

When contacting authorities:

  • Do not use mobile phones or other electronic equipment that may trigger a device.
  • Turn off mobile phones

Security bomb threat assessment:

Where possible, a threat assessment team shall communicate and consider the information available, assess the legitimacy of the threat and determine the course of action. Where concerns for safety exist police shall be notified and requested to attend, manage the incident and investigate.


(Company name) may through its security management direct the evacuation of any building, area or part thereof and/or request a search of the area be conducted by suitably trained security and/or emergency services personnel.

  1. Employees and visitors should be prepared to evacuate and await further instruction from security.
  2. Evacuate the building as instructed to do so by the emergency personnel.
  3. Persons may be asked to remove all personal belongings, such as bags and briefcases when evacuating.

Incident recording

A Security Incident Report will be completed for ALL reported threats.

Get more sample security policies from CSO.