HR Management & Compliance

Getting Ahead of the Safety Curve—Addressing Active Threats

In Yesterday’s Advisor security expert Jay Hart provided advice for employers on building an effective “active threat” plan. Today we present more tips from Hart on these important preparations that every workplace must consider.

Hart, director of Force Training Institute, leads a team of first responders and antiterrorism, cybersecurity, defensive tactics, and crisis management specialists with vast cumulative experience and expertise in safety and security. Hart is also a police sergeant for one of the largest municipal police departments in Los Angeles County.

Proactive Response Plans

A fortunate trend stemming from unfortunate roots is a movement for companies to get ahead of the curve of active threat response. For better or worse, the increased exposure of violence in the workplace means it is no longer an abstract concept but rather an issue thrust into the forefront.

A strategy based on hoping nothing happens and performing damage control is a folly that can irreparably destroy a brand in addition to the obvious harm inflicted upon person and property.

An effective response plan doesn’t begin when the incident occurs, but as soon as training can be conducted. Empowering employees with tools on how to identify and communicate to leadership possible high-risk indicators—such as signs of growing anger, depression, or erratic behavior—can be just as if not more effective than decisive action during an active threat.



Your one-stop safety management resource, available 24/7. Go here to take a no-cost site tour or here to try it in your own office!


Clear Communication Plans

A cohesive “one-team” mindset supported by a response plan based on fundamentals and foresight cannot take place without clear communication before, during, and after a critical incident.

The language plays a critical role in an active threat response program, and can dictate the program’s success or failure. Such language should be consistent with current policies and procedures so the program is both effective and legally defensible.

Each company will need to tailor its active threat response plan to fit its culture and workplace environment. Thankfully, a simple concept utilized by premier agencies already exists, so organizations may build a clear and coherent plan: “Run, Hide, Defend.”


Great news! BLR’s renowned Safety.BLR.com® website now has even more time-saving features. Take our no-cost site tour! Or better yet, try it at no cost or obligation for a full 2 weeks.


Customer Service

Communication during a critical incident is by no means limited to employees, but extends to customer interaction as well. How companies communicate around and with customers during an active threat incident can play a vital role in minimizing harm and mitigating supplemental harm as a result of panic.

Every active threat mitigation plan should include an emergency communication strategy that may contain one or two common components. First is the use of a code like “Code Adam,” alerting employees to a specific issue while customers and vendors remain unaware of any possible issues.

The second option is to use “plain English” so that everyone quickly gains situational awareness. For example, instead of using “Code Red” for an active shooter incident, the alert would announce there is an active shooter situation in progress so employees, customers, and vendors can take decisive actions to seek safety.

Every active threat situation will unfold differently, especially since external factors such as the weather, type of environment, and other variables can present unpredictable outcomes.

By being proactive about what that can be controlled, such as by implementing sound training strategies, companies can be prepared for and respond to an active threat to the best of their ability. Through the empowerment of its most valuable assets—its people—companies can mitigate risks and protect the safety of their employees, customers, and community.

Leave a Reply

Your email address will not be published. Required fields are marked *