Presentation is loading. Please wait.

Presentation is loading. Please wait.

Workplace Violence Avoidance FINDLAY THE UNIVERSITY OF FINDLAY.

Similar presentations


Presentation on theme: "Workplace Violence Avoidance FINDLAY THE UNIVERSITY OF FINDLAY."— Presentation transcript:

1 Workplace Violence Avoidance FINDLAY THE UNIVERSITY OF FINDLAY

2 SEEM -- Three Primary Programs Academic Programs Academic Programs Environmental Resource Training Center (ERTC) Environmental Resource Training Center (ERTC) Center for Terrorism Preparedness (CTP) Center for Terrorism Preparedness (CTP)

3 Accomplishments Since 1986 Graduated over 1,000 students from Academic Programs Graduated over 1,000 students from Academic Programs Trained over 90,000 people: Trained over 90,000 people: –80% customized & conducted at client’s location

4 Recent Projects ABC News ABC News University of Michigan University of Michigan U.S. Marines Quantico, VA U.S. Marines Quantico, VA ALERT Webcasting ALERT Webcasting School Safety and Security School Safety and Security

5 Objectives of this Presentation Format -- Informal Format -- Informal What we want you to learn What we want you to learn –WPV Overview –Behavioral characteristics of perpetrator –Domestic violence spillover –Describe the Threat Continuum –How can you establish a TAM Team –Training Ideas

6 Definition of WPV NIOSH; Violent acts, including physical assault and the threat thereof, directed towards persons at work or on duty. NIOSH; Violent acts, including physical assault and the threat thereof, directed towards persons at work or on duty. Industry; Any verbal or behavioral threat or direct action that causes or has the intent to cause physical or psychological harm, including harassment and intimidation. Industry; Any verbal or behavioral threat or direct action that causes or has the intent to cause physical or psychological harm, including harassment and intimidation.

7 Facts Each week, 20 workers are murdered Each week, 20 workers are murdered And 18,000 are assaulted And 18,000 are assaulted Homicide is the 2 nd leading cause of occupational death Homicide is the 2 nd leading cause of occupational death About 75% of workplace homicides are robbery-related compared to 9% in the general population About 75% of workplace homicides are robbery-related compared to 9% in the general population

8 Facts Continued 56% of workplace homicides occur in the retail trade and service industries 56% of workplace homicides occur in the retail trade and service industries 26% of shooters are former employees who return 26% of shooters are former employees who return Leading cause of death in finance, real estate and insurance professions. Leading cause of death in finance, real estate and insurance professions. Homicide is the leading cause of death for women in the workplace Homicide is the leading cause of death for women in the workplace

9 Facts Continued Average age of generic killer is 29 Average age of generic killer is 29 Average age of WV killer is 38 Average age of WV killer is 38 92% of WV perps are male 92% of WV perps are male 70% of WV perps are white 70% of WV perps are white Single biggest controllable attribute is depression; which can usually be mitigated successfully in about six weeks Park Dietz, MD, PhD Single biggest controllable attribute is depression; which can usually be mitigated successfully in about six weeks Park Dietz, MD, PhD

10 Is their a Federal Law or Regulation that Requires an Employer to Establish a Workplace Violence Avoidance Program?

11 How about OSHA? OSHA General Duty Clause OSHA General Duty Clause –“Each employer -- shall furnish to each of his employees employment and a place of employment which are free from recognized hazards that are causing or are likely to cause death or serious physical harm to his employees” Legal Interpretation/Precedent Legal Interpretation/Precedent

12 Can WPV be Avoided?

13 YES!! YES!! The potential perpetrator will tell you – all you have to do is listen The potential perpetrator will tell you – all you have to do is listen Teach employees and supervisors what to listen for, and who to contact Teach employees and supervisors what to listen for, and who to contact

14 25 to 42 – primarily male 25 to 42 – primarily male Is a complainer Is a complainer Easily frustrated Easily frustrated Socially withdrawn Socially withdrawn Always an outsider Always an outsider Behavioral Characteristics -- Does this person work for you?

15 Behavioral Characteristics Cont. Looking for attention Looking for attention Was the kid that was bullied – not the bullier Was the kid that was bullied – not the bullier Likes guns and power Likes guns and power –Less than 10% were former military Doesn’t have great communication skills Doesn’t have great communication skills

16 Behavioral Characteristics Cont. Knows company policies extensively, but acts like he doesn’t Knows company policies extensively, but acts like he doesn’t Anti Management – promotes us vs. them Anti Management – promotes us vs. them Good at pitting people against each other Good at pitting people against each other Affixes to a personality that you either respect or fear Affixes to a personality that you either respect or fear Boasts about “get even” plans Boasts about “get even” plans

17 Behavioral Characteristics Cont. Generally a good worker Generally a good worker Comes early / stays late Comes early / stays late Rarely takes sick leave or all of Vacation Rarely takes sick leave or all of Vacation Hard time accepting criticism Hard time accepting criticism –Doesn’t respond well to info shock on performance appraisal Job is the core of his identity Job is the core of his identity

18 A Related Threat from the Outside -- Domestic Violence Spill Over 1 in 9 working women report being a victim of domestic violence 1 in 9 working women report being a victim of domestic violence Partners & boyfriends commit an average of 13,000 acts of violence against women in the workplace/yr Partners & boyfriends commit an average of 13,000 acts of violence against women in the workplace/yr

19 Battered Workers 96% experience problems due to abuse 96% experience problems due to abuse 74% are harassed by abuser 74% are harassed by abuser 60% are late for work 60% are late for work 28% leave work early 28% leave work early 54% miss entire day of work 54% miss entire day of work 60% are reprimanded for abuse-associated problems 60% are reprimanded for abuse-associated problems 30% lose their jobs 30% lose their jobs

20 What Can You Do About Domestic Violence Spillover? Actively communicate all Domestic Violence Services to employees Actively communicate all Domestic Violence Services to employees –Your company EAP –Local Services Best way to do this? Best way to do this?

21 Signposts People do not switch instantly from non-violent to violent People do not switch instantly from non-violent to violent The path toward violence is evolutionary The path toward violence is evolutionary Observable behaviors include threats, brooding, fantasies of destruction or revenge in conversations, writings or other actions Observable behaviors include threats, brooding, fantasies of destruction or revenge in conversations, writings or other actions TROUBLE DANGER Confusion

22 Targeted Violence – Guiding Principles 1.There is a difference between making a threat and posing a threat 2.Individuals or groups who commit acts of targeted violence go through an understandable and often discernible process of thinking and behavior.

23 Targeted Violence – Guiding Principles 3.Targeted violence moves along a continuum of probability and stems from an interaction of the potential attacker(s), past events, the current situation and the target(s). 4.There is a direct relationship between motive and the target 5.Persons or groups who commit acts of targeted violence, perceive the attack as a means to a goal

24 The Targeted Violence Continuum The Individual progresses through the following steps: Ideation Ideation Planning Planning Preparation Preparation Implementation Implementation

25 What Can You Do Today to Avoid WPV? Establish a Threat Assessment Management Program

26 Threat Assessment Management Developed by US Secret Service Developed by US Secret Service Behavior based techniques they use to identify threats to their protectees Behavior based techniques they use to identify threats to their protectees

27 Threat Assessment Management (TAM) Program What is it -- Ongoing intelligence gathering, analysis, and mitigation / intervention program

28 How do you establish a TAM Program? Step 1 -- Establish TAM Team Corp. Exec in charge of security Corp. Exec in charge of security Lead security person Lead security person HR person in charge of personnel HR person in charge of personnel Corp Legal Counsel Corp Legal Counsel Mental Health Professional (inside or out) Mental Health Professional (inside or out) Local Law Enforcement Local Law Enforcement Others as warranted Others as warranted

29 Threat Assessment Management A Systemized Approach to Case Management protocol A Systemized Approach to Case Management protocol –Full & proper reporting –Central clearing house of information –Assessment and screening protocol –Case-management protocol

30 TAM Development – Step 2 Develop a WPV Policy What is acceptable behavior in the workplace and what isn’t? What is acceptable behavior in the workplace and what isn’t? Employee & supervisor responsibilities Employee & supervisor responsibilities Who is in charge? Who is in charge? What are the penalties going to be? What are the penalties going to be? How are you going to enforce this? How are you going to enforce this?

31 TAM Development – Step 3 Establish Ongoing Intelligence Collection System Train Employees on what should be reported & to whom Train Employees on what should be reported & to whom Employees role Employees role Supervisors role Supervisors role Role of Outside Sources Role of Outside Sources Documentation Documentation

32 TAM Development – Step 4 Analysis and Action Routinely collect and analyze intelligence Routinely collect and analyze intelligence Develop a scoring system to determine the level of the threat Develop a scoring system to determine the level of the threat –Ideation (1 – 3) –Planning (4 – 6) –Preparation (7 – 9) –Implementation (10)

33 What is Your Next Step? Contact US Secret Service for Information Contact US Secret Service for Information Or, Contact UF or others for assistance Or, Contact UF or others for assistance –TAM Implementation Training –Customized Program Development –AstraZeneca Example Above All – Make sure you do something!!! Above All – Make sure you do something!!!

34 ALWAYS REMEMBER The potential perpetrator will tell you – all you have to do is listen The potential perpetrator will tell you – all you have to do is listen Your Goal is to Teach employees and supervisors what to listen for, and who to contact Your Goal is to Teach employees and supervisors what to listen for, and who to contact

35 Contact Information J. Randal Van Dyne Executive Director/ Assistant V.P. School of Environmental and Emergency Management 800-521-1292 email : vandyne@findlay.edu Web Site: http://seem.findlay.edu http://seem.findlay.edu


Download ppt "Workplace Violence Avoidance FINDLAY THE UNIVERSITY OF FINDLAY."

Similar presentations


Ads by Google