Upload
alan-hubbard
View
217
Download
1
Embed Size (px)
Citation preview
Threat Assessment Team
Presented By: John Dailey, Jack Moorman, Jon Barnwell, Frank Brinkley
Paul Cousins & Tina Nelson
Legal Disclaimer
• This presentation is based on the process used at North Carolina State University. While similarities exist, every institution has a unique atmosphere along with variances in processes and regulations. These unique qualities and variances may require consideration before a similar program is implemented at other institutions.
Overview
• Foundation at NC State• Current process• Team members & roles• Training• Tracking mechanisms
Foundations
Case Management
• Goal:– Proactively address concerning behaviors among the
University’s student, employee, and non-affiliated populations to ensure the safety of the University
• Identifying those that pose a risk of harm to themselves or others and developing strategies to address risk
Risk Assessment Case Manager
• Administers violence prevention and threat assessment programs
• Triages individuals to appropriate counseling and/or other resources to meet their identified needs
• Oversee and provide training to the Behavior Assessment Team
Behavior Assessment Team
• Students/non affiliates of concern– Risk Assessment Case Manager (Licensed Clinical Social
Worker (LCSW))– Student Affairs
• Counseling Center Psychologist• Office of Student Conduct• Housing
– University Police• As needed:
– Legal Affairs
Behavior Assessment Team
• Employees– Risk Assessment Case Manager (LCSW)– Employee Relations– University Police
• As needed:– Legal Affairs
Behavior Assessment Team
• Student team meets formally weekly / Employee team meets as needed– Subgroup (8:30 Meeting)
• Tools utilized:– Mosaic from Gavin DeBecker– Assessment and Response Grid from James
Cawood (Factor One Inc)• Categorize behaviors into low to high risk
The Day Begins…
Morning Meeting
• New business– Discuss any reports from the previous night or
weekend
Morning Meeting
• Case Management – Review “active cases”– Upcoming court dates– Collateral information
• Mental health history• Disciplinary history• Etc.
The Day Continues…
• Interviews• Training• Research gathering• Referrals• Safety plans• Additional follow up• Options – trespass, restraining orders…
Behavior Assessment Team
Threat Assessment Process
• Initial Report– Faculty/Staff– Residence halls– Family/Friends
• Concerned Behavior Report
Threat Assessment
• Emergency Assessment– Research
• Social networking sites• Admissions• Law enforcement records check• Disciplinary history• Interviews with collaterals
Threat Assessment
• Triage/Classification– Team reviews research– Risk level determined (Low, Moderate, High)
• Spring 2009 – 90 New Cases• Low – 52• Moderate – 31 • High – 7
• Who takes the lead?
SAFETY OF THE COMMUNITY IS
PRIORITY
Threat Assessment
• Management– Monitor– Refer– Reassess risk level– Categorize cases as active or inactive– Maintain periodic contact with victim
Ongoing Monitoring
• How is this accomplished without escalating the situation?
• Resources?• How do we continue monitoring?• Non-Affiliates?
Sample Agenda
Training
• Training available for faculty / staff– Classroom Behavior Management
• Identifying and managing aggressive or disruptive students
• Identifying signs or symptoms that may be indicative of a mental health concern
• Identifying written expressions that could be indicative of violent tendencies
• Knowing who to report concerning behaviors to
Additional Training
• Conflict Resolution• Workplace Violence• Intimate Partner Violence and Response• Others as needed
Collaboration and Networking
• How do we follow up with students that have been hospitalized?– Working with local outpatient and inpatient facilities– Increasing education on University specific issues
and resources– Incorporating resources and/or follow up in treatment
and discharge plans
Tracking Tools
• Maxient• Threat Assessment Database• Behavior Assessment Team Report
9900 Stirling Road
Cooper City, Florida
Threat Assessment Tracking System
Threat Assessment eForm
Reports
• By Date• By Status (Active/Inactive)• By Name• By Behavior• By Affiliation (Student, Employee, etc.)• By Officer• By Group (Gangs, etc.)
Reports
Hyperlink to eFolder
Questions
[email protected][email protected][email protected]@duke.edu