Assessing Violence Potential: Community Protocol for Violence Threat/Risk Assessment (VTRA) and Intervention, 9 th Edition.

Slides:



Advertisements
Similar presentations
Assessing Violence Potential:
Advertisements

Purpose/Function To guide the VTRA Stage I team members through the initial process of data collection To Assist the VTRA Stage II team to understand what.
Integrating the NASP Practice Model Into Presentations: Resource Slides Referencing the NASP Practice Model in professional development presentations helps.
What is a School Psychologist? ©2008, National Association of School Psychologists A Guide for Teachers-in-Training.
Government of the Republic of Serbia Ministry of Labor and Social Policy GENERAL AND SPECIAL PROTOCOL ON CHILD PROTECTION FROM ABUSE AND NEGLECT.
Joint Investigation Protocols Convening Presented by: Theresa Costello, MA Emily Hutchinson, MSSW The National Resource Center for Child Protective Services.
Areas of Research Specific issues. Clinical Trials Phase I First use in humans of an experimental drug or treatment In a small group of healthy volunteers.
Illinois Department of Children and Family Services, Pathways to Strengthening and Supporting Families Program April 6, 2010 Division of Service Support,
Illinois Department of Children and Family Services, Pathways to Strengthening and Supporting Families Program April 15, 2010 Division of Service Support,
Illinois Department of Children and Family Services, Pathways to Strengthening and Supporting Families Program April Division of Service Support,
Barnardo’s Core Presentation Slide No. 1
[Your District's] Comprehensive Guidance Program: Linking School Success with Life Success 1 [Your District’s] Comprehensive Guidance Program Responsive.
Council of Europe, Seminar, One in five Campaign and Strategic Action plan, the 9 th February 2012 The key to uncovering child sexual abuse: the child-friendly.
Site Safety Plans PFN ME 35B.
Engagement in Human Research & Multi-Site Studies K. Lynn Cates, M.D. Assistant Chief Research & Development Officer Director, PRIDE May 30, 2012.
To Halton Youth Service 
Indianapolis, Indiana Offender Notification Meetings.
Harassment, Intimidation and Bullying NJ State Board of Education February
LEVEL TWO – ERASE STRATEGY
1 Preventing Youth Suicide Creating Emotional Safety for our Students School District of Volusia.
Visual 3.1 Delegation of Authority & Management by Objectives Unit 3: Delegation of Authority & Management by Objectives.
1 Phase III: Planning Action Developing Improvement Plans.
USDOE Restraint and Seclusion: Resource Document, May 2012.
SCHOOL PSYCHOLOGISTS Helping children achieve their best. In school. At home. In life. National Association of School Psychologists.
Engaging Patients and Other Stakeholders in Clinical Research
Abuse Prevention and Response Protocol.
Assessment and eligibility
12/5/2007 This is a PowerPoint show – click your mouse to move to the next slide.
Safeguarding Adults in Bath & North East Somerset Awareness Session
Respect aging Respect Aging: Preventing Violence against Older Persons 1. RECOGNITION 2. PREVENTION 3. INTERVENTION Violence Prevention Initiative.
Threat Assessment Stafford County Public Schools
Duty to Report Child Abuse, Neglect, and Dependency in North Carolina Janet Mason Institute of Government The University of North Carolina at Chapel Hill.
Successful Solutions Professional Development LLC A Basic Approach to Child Safety Chapter 4 Mandated Reporting Law.
1 Disclosing Student Personal Information to the Queensland Police Service 1-2 July 2008 RED/EDS Business Meeting.
Disciplining Students with Disabilities Kristina Krampe, 2005 EDS 513: Legal Issues in Special Education.
Workplace Violence Research has identified factors that may increase the risk of violence at worksites. Such factors include working with the public or.
DRM PPANI TRAINING. What is the purpose of a LAPPP The collection, analysis and interpretation of all relevant available facts and information to assess.
Clinical Trials. What is a clinical trial? Clinical trials are research studies involving people Used to find better ways to prevent, detect, and treat.
Child Protection Conferences Caroline Alexander Service Coordinator for Child Protection.
NSW Interagency Guidelines for Child Protection Intervention 2006 Briefing Information Session Child Protection Senior Officers Group.
The Bullying Prevention and Intervention Plan Presentation to School Committee December 20, 2010.
“How to Enhance Assistance to Victims of Human Trafficking”, Helsinki, March 2014 Children exposed to exploitation, trafficking and at risk in transnational.
Foundations of Effective Threat Assessment in Schools Claire Cunningham Lead Deputy County Counsel, County of San Mateo Nancy Magee Administrator,
Sutton Public Schools Anti-Bullying Law Overview.
Colorado Children and Youth Information Sharing (CCYIS) Educational Stability Summit April 10, 2015.
GEORGIA CRISIS RESPONSE SYSTEM- DEVELOPMENTAL DISABILITIES Charles Ringling DBHDD Region 5 Coordinator/ RC Team Leader.
204: Assessing Safety in Out-of-Home Care Updates.
1 Multi-disciplinary Seminar on How to Improve the Child Protection System in Hong Kong 13 July 2004 Duke of Windsor Social Services Building, Wanchai,
Accountability Presented by Mollie Schaffer August 13 th, 2014.
Practice Area 1: Arrest, Identification, & Detention Practice Area 2: Decision Making Regarding Charges Practice Area 3: Case Assignment, Assessment &
Annual Ethics Training Presbytery assembly October 13, 2015
Alternatives to Arrest for School Based Law Enforcement Instructor.
KEEPING CHILDREN SAFE Key reminders from the document Keeping Children Safe Part 1 FOR FURTHER INFORMATION PLEASE SEE CUMBRIA LSCB WEBSITE NSPCC LINKS.
Practical Approaches for Engaging Youth Serving Organizations and Schools in Child Sexual Abuse Prevention.
Standard Circular 57 The purpose of this circular is to clearly set out the responsibility of educational establishments and services in the matter of.
VIOLENCE PREVENTION & RESPONSE TASK FORCE JANUARY XX, 2016.
Unit 4 Seminar. Key Terms  Confidentiality  Privileged communication  Privacy.
BREAKING THE SCHOOL TO PRISON PIPELINE J. Corpening.
Opens up Where THE WORLD Welcome to Violence/Threat Risk Assessment Overview & Case Study Spring 2014.
Education Queensland SMS-PR-021: Safe, Supportive and Disciplined School Environment pr/students/smspr021/
Our Club: SUPPORTS Kids Is SAFE for Kids Is FUN for Kids.
Child Safe Standards How effective is your leadership team in promoting a child safe culture in your organisation? 2 June 2016.
Safeguarding Adults Lincolnshire County Council April 2010.
Sutton Public Schools Anti-Bullying Law Overview
Confidential Records and Protected Disclosures
MANAGING THREATS IN OUR SCHOOLS
Management of Allegations Against Adults who work with Children Linda Evans (Head of Quality Assurance for Safeguarding) and Majella O’Hagan (Local Authority.
GREATER ESSEX COUNTY PARENT INVOLVEMENT COMMITTEE
GREATER ESSEX COUNTY special education advisory committee
Toronto Child & Youth Advocacy Centre (CYAC)
Presentation transcript:

Assessing Violence Potential: Community Protocol for Violence Threat/Risk Assessment (VTRA) and Intervention, 9 th Edition

Introduction Background: In 2000, the Lethbridge College and the Canadian Threat Assessment Training Board collaborated in the development of a Threat Assessment Training program initiative to train multi- disciplinary teams. Limitations: Need for Training Importance of Safe School Culture: (Pg. 3 – Protocol)

Introduction Key benefits of having a protocol: The parents, staff, and students know that high risk behaviors will be dealt with, which reduces anxiety in all Assessments may help to identify undiagnosed clinical disorders or other significant issues which can then be dealt with more effectively

Introduction Appropriate Intervention equals Threat Management: There is no one tool or strategy designed to manage threats Threat management is simply an appropriate intervention at the appropriate time

Violence Threat/Risk Assessment (VTRA) Model Synthesis of two bodies of Research and Assessments I. Early Secret Service Research around School-based Threat Assessment. II. General Violence Risk Assessment work that clinicians and therapists have been doing for years. (Pg. 4 – Protocol)

Violence Threat/Risk Assessment (VTRA) Model Three Stage VTRA Model Stage I Data Collection and Immediate Risk Reducing Interventions Stage II Multidisciplinary Risk Evaluation Stage III Formal Development and Implementation of a Comprehensive Intervention (Pg. 6 – Protocol)

Composition of Violence Threat/Risk Assessment (VTRA) Committee & Teams VTRA Committee and Protocol Development: Every school/community jurisdiction has unique factors that may require modifications to VTRA Membership. These may include community resources, student population size, rural or urban, etc. Phase I: VTRA Committees and Protocol Development. Phase II: VTRA Team Development. Phase III: VTRA Team and Protocol Maintenance. (Pg. 7, 8 – Protocol)

Composition of a Violence Threat/Risk Assessment (VTRA) Committee & Teams Application of VTRA: School – Based Stage I teams Division/District Based Stage I Teams Training for upper-administrative personnel in the VTRA model Activation of the Stage II Team Stage I VTRA Team Leadership and Team Activation: Principal or Designate (Pg. 8, 9 – Protocol)

Composition of a Violence Threat/Risk Assessment (VTRA) Committee & Teams Stage I: (Initial Response) Primary Function: Data collection Immediate Risk Reducing Intervention Members: School Principal and/or their designate Clinician (e.g. Psychologist, Therapist, Counsellor, etc.) Police of Jurisdiction (e.g. School Resource Officer, local police, R.C.M.P.) Others: Probation, Child Protection Workers, Mental Health Workers, etc. (Pg. 10– Protocol)

Composition of a Violence Threat/Risk Assessment (VTRA) Committee & Teams Stage II: (Comprehensive Risk Evaluation) Primary Function: Risk Evaluation (Low, Moderate, High) Further Data Collection beyond Stage I Members: Mental Health Workers, Child Protection Workers, Psychologists, Psychiatrists Additional Resources: Criminal Profilers, Forensic Psychologists (Pg. 11 – Protocol)

Composition of a Violence Threat/Risk Assessment (VTRA) Committee & Teams Stage III: (Longer Term Treatment Planning) Primary Function: The development and implementation of a comprehensive multidisciplinary intervention. The establishment of a review date. (Pg. 11 – Protocol)

Determining When To Activate a Violence Threat/Risk Assessment In practice, V-TRA team members often consult with each other on situations of concern but formal action is only taken when particular criteria are met At times, it may be difficult to decide whether or not to activate the formal VTRA process. The following are guidelines for four main areas. It is important to carefully consider each case on its own merits. I. Immediate Risk Situations: II. Early Elementary Students: III. Worrisome Behaviors: IV. Non School Hour Cases: (Pg. 12, 13 – Protocol)

Determining When To Activate a Violence Threat/Risk Assessment The following is a list (Not a complete list) of behaviors that Warrant Automatic activation of a Formal Threat/Risk Assessment. Serious violence with intent to harm or kill Verbal/written threats to kill others (Clear, Direct, and Plausible) Internet website/MSN threats to kill others Possession of weapons, including replicas Bomb threats (Making and/or detonating explosive devices) Fire setting Sexual intimidation or assault Gang related intimidation and violence (Pg. 14– Protocol)

Determining When To Activate a Violence Threat/Risk Assessment What is a Threat? It is an expression of intent to do harm or act out violently against someone or something. Types of Threats: I. Direct threat: II. Indirect threat: III. Veiled threat: IV. Conditional threat: (Pg. 15 – Protocol)

Determining When To Activate a Violence Threat/Risk Assessment Violence: When there is violence that occurs, there are some guidelines to help determine if it is a disciplinary matter, or it should be dealt with as a violence/threat risk assessment case: (Pg. 15– Protocol)

Determining When To Activate a Violence Threat/Risk Assessment Consult with a V-TRA team member if: Activate Violence Threat/Risk Assessment (V-TRA) team if: (Pg. 15– Protocol)

Working with Members of Ethnic Minorities The Potential for Cultural Bias is Has been well documented in psychological literature. We need to always be cognizant of this fact when conducting a VTRA (Pg. 16– Protocol)

Students With Special Needs and VTRA Typical threat-making or aggressive behaviors for the students baseline will not warrant the activation of the V-TRA team However, if the student moves beyond their baseline, the V-TRA team would be activated Once activated, the V-TRA process is not modified other than to ensure the appropriate interviewing strategies with the student with special needs Note of Caution: Be cautious not to assume that the behaviors are caused or a result of the diagnosis, neglecting the possibility that the student may be moving along a pathway of Justification. (Pg. 17– Protocol)

VTRA Reminders Threat Assessment Trumps Suspension Threat Assessment is not a Disciplinary Measure (Pg. 18– Protocol)

Fair Notice Fair Notice : Notice is given that violence and threats of violence will not be tolerated. This will ensure that a consistent message is given regarding the protocol to all Zero Tolerance: Zero tolerance for not responding to serious violence or threat- making behaviors (Pg. 18– Protocol)

Create an Expectation for Responsible Reporting Social Responsibility Vs. Ratting or Snitching (Pg. 19– Protocol)

Responsible Sharing of Information Provinces and States all have legislation that permits the sharing of information under circumstances where there is imminent danger. It is important to review this legislation in your own Province or State to ensure adherence while providing for school safety. (Pg. 19– 27, – Protocol)

Responsible Sharing of Information Supreme Court of Canada (1998) Report of the Review Panel – Virginia Tech Shootings Ontario and B.C. Privacy Commissioners – Shootings at Carlton University (Pg. 19– 27, – Protocol)

Responsible Sharing of Information Saskatchewan Initiatives Alberta Initiatives (Pg. 19– 27, – Protocol)

Responsible Sharing of Information Ontario Initiatives British Columbia Initiatives (Pg. 19– 27, – Protocol)

Responsible Sharing of Information Yukon Initiatives Special Note: The remainder of this section was adapted, with consent, from the Yukon Department of Educations Yukon Threat Assessment Program (Y-TAP) policy and procedure manual. Sharing Youth Justice Information: Youth Criminal Justice Act I nformation in a YCJA record may be shared with any professional or other person engaged in the supervision or care of a young person – including a representative of any school board or school or any other educational or training institution – for a range of reasons, including safety of staff, students or other persons (Pg. 19– 27, – Protocol)

Responsible Sharing of Information Childrens Act Records: Most provincial acts enable the Director to consent to the disclosure of records maintained under the act. There is no time period limiting this. Student Records; Providing consent on behalf of another: Individuals (of authority) may consent for disclosure for another, provided it is not an unreasonable invasion of privacy. (Pg. 19– 27, – Protocol)

Responsible Sharing of Information Student Records; Childrens Consent: (Factors to Consider) Governing legislation The age of the child The childs level of maturity. (Is the child able to understand the requirements of the consent) The sensitivity of the information and consequences of releasing it (Pg. 19– 27, – Protocol)

Involving Parents in Threat/Risk Assessments Parent (Caregiver) Notification – Threat Maker: Parent (Caregiver) Notification – Target: Reasons to Delay Notification of Parents: (Pg. 27– 29 – Protocol)

Assessing Violence and Threats Data Collection The Interviewer: An investigative, Skeptical, inquisitive mindset is central to successful application of the threat assessment process (Pg. 30 – Protocol)

Assessing Violence and Threats Data Collection Who are the candidates for being interviewed? Teachers/School Staff Students Target(s) Threat Maker(s) Parents/Guardians/Caregivers Any others with potential information (Pg. 31 – Protocol)

Assessing Violence and Threats Data Collection The Interviewed: There are four questions that need to be asked and answered before any interviews are conducted. I. How much time do we have: II. Who will be Interviewed: III. What order will we interview them in: IV. Who will interview whom: (Pg. 31– Protocol)

Assessing Violence and Threats Data Collection The Strategic Interview: The following aspects or areas of the threat makers life need to be explored through the data collection process. Contextual data may be obtained from multiple sources including those sources (interview candidates) already listed Refer to Appendix C for a more thorough guide to the type of data to be collected (Pg. 32– Protocol)

Assessing Violence and Threats Data Collection Series I – Details of the Incident; Series II – Attack-Related Behaviors: Series III – Threat Maker Typology: Series IV – Empty Vessel: Series V – Target Typology: (Pg. 32– Protocol)

Assessing Violence and Threats Data Collection Series VI – Peer Dynamics and Structure: Series VII – Contextual Factors (Triggers): Series VIII – School Dynamics and Structure: Series IX – Family Dynamics and Structure: Series X – Baseline Overview: (Pg – Protocol)

Assessing Violence and Threats Data Collection Threat/Risk Assessment: Evaluation: Following the thorough assessment of all contextual data, risk factors, responsible information sharing and careful consideration of data provided by the family, the TAT makes an evaluation of the threat/risk level posed by the individual (Low, Medium, High) It is important to determine level so that the interventions are consistent and responsive to the level of risk (Pg. 33– Protocol)

Violence Threat/Risk Assessment: Intervention and Management Guidelines for Re-entry into School: Supportive Services: Supporting Targeted or Victimized Students or Staff: Key Point: There may be cases where the recipient of the threats has been engaged in high risk behaviors as well, leading to the threats in the first instance In these situations the recipient of the threats may need to be assessed for high risk behaviors as well (Pg. 34– Protocol)

Anonymous Threats: Assessment and Intervention Note: As of the writing of this protocol, there are no known cases in North America where an un-authored threat to kill was issued and a homicide occurred on the day the threat stated Although they may be credible in the world of terrorism, in the field of school-based threat assessment, the lack of ownership (Authorship) denotes lack of commitment. Never the less, there are steps that should be followed (Pg. 35– Protocol)

Anonymous Threats: Assessment and Intervention I. Assess the un-authored threat: In determining the initial level of risk, V-TRA teams should consider the language of commitment in the letter II.Identifying the Threat Maker: In many cases the author is never found, but steps can be taken to identify who the author(s) are Note: Contra-Indicators III.Avoid or Minimize the crises/trauma response: (Pg. 35 – 36 – Protocol)

Post Vention: Crisis/Trauma Management Low Risk Moderate to High Risk (Pg. 37 – Protocol)

Post Vention: Crisis/Trauma Management Communicating with the Media and Parents: When a case draws media attention, any communication should be a collaborative response between the jurisdiction and the police. Information that is communicated to parents/caregivers should be for the purpose of modeling openness, promoting credibility, and reducing/mitigating any increase in system anxiety. (Pg. 38– Protocol)

Bedroom/Locker Dynamic Throughout the development of the VTRA Model, evidence of this Dynamic has been identified in hundreds of cases across Canada. Unfortunately, in a few cases such as the 1999 School shooting in Taber, this is found too late. Supreme Court of Canada (1998) set a legal precedent Its one thing to make a threat. It is another to engage in behavior consistent with the threat. (Pg. 39 – 41 – Protocol)

Conclusion The materials and information in this manual are intended as an informed guide to assessing, intervening with and managing high-risk, violent, and threat making behaviors. No two cases are the same Each incident must be treated as unique The strengths of this model lies in the use of multi-disciplinary teams that investigate and evaluate all factors and contexts of the students life and the specific incident of concern

Assessing Violence Potential: Community Protocol for Violence Threat/Risk Assessment (VTRA) and Intervention, 9 th Edition Case Study

Assessing Violence Potential: Community Protocol for Violence Threat/Risk Assessment (VTRA) and Intervention, 9 th Edition