Docstoc

Behavioral Intervention Team Procedures

Document Sample
Behavioral Intervention Team Procedures Powered By Docstoc
					Behavioral Intervention Team (BIT)
Procedures
INSTRUCTIONS FOR REPORTING INCIDENTS TO THE BIT

  □ All employees may reach the BIT on-call staff at 662-329-7129 during regular
    business hours. After hours, call 662-241-7777. Emergencies should ALWAYS
    be reported to 911. They will dispatch BIT if needed
        o Students are encouraged to report concerns about peers to the BIT
  □ All incidents or red flags are to be reported to BIT by ALL employees except
    those covered by confidentiality at the time of receiving the report or becoming
    aware of the incident. Reports from staff covered by confidentiality may be
    shared anonymously or confidentially, unless the report indicates a threat for
    which confidentiality may be breached (imminent threat to self or other identified
    individuals)
        o anonymously refers to omitting from the report the name of the person
            who holds the privilege (or the names of any other person about whom the
            reporter gains information via a confidential relationship)
        o confidentially refers to the option for the reporting employee to withhold
            their identity from the report
  □ Employees who fail to follow the mandated reporting policy will face appropriate
    consequences
        o Incident reports of red flags are to be uploaded to the database (or
            otherwise reported to BIT) by employees within 24 hours of first
            becoming aware of the incident (if not sooner)
        o As much detail should be included as you have (downloadable form, web
            form, etc)
        o Here is a list of the types of behaviors or actions that should be reported,
            though the list is not exhaustive. Reporters are expected to use their
            judgment as to what is reportable, erring on the side of over-reporting if in
            doubt. For example, if an incident may seem minor, but other similar
            incidents occur in close proximity, they may indicate a pattern not visible
            to the witness of a single incident:
                    Extreme rudeness or insubordination to university officials, staff,
                    faculty or administrators
                    Classroom disruption
                    All violations of residence hall rules
                    All violations of the student code of conduct
                    Drunkenness in the classroom
                    Threatening words or actions
                    Writings that convey clear intentions to harm self or others
                    Observed self-injurious behavior, such as cutting, burning, etc.
                    Online postings in Facebook, MySpace, RateMyProfessor that are
                    threatening
                    Excessive class absenteeism
          Suicidality, including threats (I am going to kill myself), gestures
          (erasing one’s hard drive), ideation (I’ve always thought about
          killing myself by jumping off a cliff), or attempts (further clues to
          suicide are posted at:
          http://www.smhca.org/clues_to_suicide.aspx, if you wish to
          include them here)
          Acts motivated by hatred or discrimination, or paranoia that a
          student groundlessly believes they are being targeted
          Stalking
          Relationship violence (even if the victim doesn’t want you to tell,
          unless the information is conveyed to you in a confidential
          relationship)
          Hazing
          Flat affect or extreme lack of responsiveness
          “Accidental” overdose
          Disappearances, kidnappings or missing persons
          Harassment
          Alarming references to bombs, ammunition or ordnance
          Alarming infatuation with fire or firearms
o Reporters should classify their report by the following risk or alert scale.
  Incidents receiving Severe or Extreme classification require not just
  uploading to the database, but a call to the on-call BIT member as well.
  Ultimately, BIT will classify the incident, but here is guidance for both
  reporters and BIT on the category criteria:
          Mild risk
               • Likely the result of some disruption. Student not
                  distressed.
               • No threat made or present.
          Moderate risk
               • Likely the result of more involved or repeated disruption or
                  low level of distress.
               • Possible threat made or present
               • Threat is vague and indirect
               • Information about threat or threat itself is inconsistent,
                  implausible or lacks detail
               • Threat lacks realism
               • Content of threat suggests threatener is unlikely to carry it
                  out.
                   Elevated risk
                        • Seriously disruptive incident(s)
                        • Student exhibiting clear distress
                        • Threat made or present
                        • Threat is vague and indirect, but may be repeated or shared
                           with multiple reporters
                        • Information about threat or threat itself is inconsistent,
                           implausible or lacks detail
                        • Threat lacks realism, or is repeated with variations
                        • Content of threat suggests threatener is unlikely to carry it
                           out.
                   Severe risk
                        • Student is not merely disruptive or distressed, but is
                           disturbed
                        • Threat made or present
                        • Threat is vague, but direct, or specific but indirect
                        • Likely to be repeated or shared with multiple reporters
                        • Information about threat or threat itself is consistent,
                           plausible or includes increasing detail of a plan (time,
                           place, etc)
                        • Threat is plausible, or is repeated with consistency (may try
                           to convince listener they are serious)
                        • Content of threat suggests threatener may carry it out.
                   Extreme risk
                        • Student is dysregulated (way off baseline)
                        • Threat made or present
                        • Threat is concrete (specific or direct)
                        • Likely to be repeated or shared with multiple reporters
                        • Information about threat or threat itself is consistent,
                           plausible or includes specific detail of a plan (time, place,
                           etc), often with steps already taken
                        • Threat is plausible, or is repeated with consistency
                        • Content of threat suggests threatener will carry it out
                           (reference to weapons, means).
                        • Threatener may appear detached
□   BIT must receive notification of all behavioral contracts formed between staff and
    students
□   Faculty must report all classroom and other disruption incidents to the database,
    and potentially to the VPSS
□   Staff must report all operational disruption and other incidents of concern to the
    database, and potentially to the VPSS
□   Residence life personnel must report residence hall disruptive behaviors to the
    database, and potentially to the VPSS if they reach a threshold of severity that
    removes them from the residential life conduct process
  □ Campus law enforcement must coordinate police log entry with BIT database
    entry requirements

INSTRUCTIONS FOR BIT FOLLOW-UP WITH INDIVIDUAL

  □ BIT will determine when members can/should/must meet with the individual
  □ BIT should reference existing policy for imposition of interim suspension and/or
    trespass orders
  □ BIT should reference existing criteria for mandating psychological assessment for
    an individual
        o On campus?
        o Off-campus?
        o Social worker, Psychologist, LPC or Psychiatrist
        o How soon?
        o How will results be communicated to BIT?
                    Either by mandate of BIT or
                        • Only objective evaluative criteria and findings will be
                            shared
                    Tarasoff-level disclosure by off-site provider
                        • As much information will be shared as needed to avert the
                            expected harm
        o What will happen if individual fails to complete assessment in time?
                    Possible grant of extension for good cause
                    Conduct code response for failure to comply (likely suspension)
                    Human resources fitness for duty determination
                    Provost-level response
  □ BIT will determine the procedure for custodial holding of individual while
    interim suspension is being determined, or when interim suspension is imposed,
    but a gap in transition is in place until the individual relocates, parents arrive, etc.
        o Detail on how quickly an individual must vacate campus,
        o Notice to roommates, faculty, staff
        o Re-keying locks

INSTRUCTIONS FOR BIT FOLLOW-UP WITH RESOURCES

  □ BIT will use a feedback loop (within the database) to confirm to reporting
    employees/students that red flags are being acted upon
  □ BIT will reference existing procedures with the VPSS for purposes of imposing
    campus-based no-contact orders
  □ BIT will reference existing procedures whereby campus hearing outcomes for acts
    of violence, disruption, threats and other pertinent offenses will be shared by the
    VPSS with the BIT
        o BIT will utilize notification procedures for contacting parents, guardians,
            roommates, friends, faculty, coaches, etc. Part of this protocol is an
            assessment of whether such notifications are legally permitted, and
            whether such notifications could be helpful or harmful to the intervention
            and helpful or harmful to risk management priorities.
        o Assessment in suicide threats/ideation/attempts of whether involving
            parents would exacerbate situation. Determine who has
            custody/guardianship/who is emergency contact. Often,
            friends/roommates will have insight into the relationship of the individual
            with their parents.
□   BIT will coordinate with the VPSS and/or Campus Police to determine if reports
    should be pursued despite having an unwilling complainant, anonymous report or
    reluctant witness
□   BIT will coordinate with academic support services on tracking excessive
    absenteeism
□   BIT will assure continuity of therapeutic care for a student who leaves campus
    voluntarily or involuntarily under this protocol, when that student is treating with
    campus mental health resources at the time
□   BIT will coordinate responding to a individual who returns from the emergency
    room or community in-patient mental health facility following a potentially
    suicidal situation
□   BIT will implement procedure for voluntary/involuntary psychological/medical
    withdrawal
        o Is the individual qualified as a person with a disability?
        o Direct threat determination procedures under Section 504
        o Accommodations under ADA
        o Conditions for return
                    BIT will establish return criteria or do so in conjunction with a
                    conduct code action;
                    BIT is authorized to consider all return applications, to place
                    appropriate conditions upon return, or to determine return timeline
                        • The only legal restriction on BIT is that Section 504 of the
                           Rehabilitation Act holds that it may not require cessation of
                           the underlying disability as a condition for return.
                        • However, BIT may order re-assessment to determine
                           whether a student continues to be a direct threat, and is
                           therefore ineligible to return, or is no longer a direct threat,
                           and may return subject to appropriate conditions,
                           restrictions or agreements.
□   BIT will coordinate procedure for college or university personnel on responding
    to hospitalization
        o Who will go?
        o Transport for student to return
□   BIT will coordinate management of custody of a student who may be an
    imminent threat of harm
INSTRUCTIONS FOR BIT COOPERATION WITH UNIVERSITY
EMERGENCY RESPONSE TASK FORCE

    □ The Chair activates campus warning systems (text, email, webpage, etc)
      according to existing policy.
          o Coordination with Clery Act timely warning requirements
    □ Detailed instructions for the role of the Chair when campus emergency
      management protocols are activated should be included within those independent
      protocols (BIT should take a back seat to crisis response at that time)
    □ The Chair should elevate reporting beyond BIT to vice presidents, president,
      campus law enforcement, local law enforcement, FBI, Homeland Security, etc.
      according to existing policy
          o Who calls whom, at what number – phone chain clearly established
    □ Chair assures coordination with local ambulance, hospital, mental health,
      advocacy and other resources
    □ All emergency protocols must be coordinated to ensure consistency, integration
      and jurisdiction

•   Coordinating Team operation with current crisis response protocols, campus CISDT
    models and ERP/EOC procedures

    On many campuses, emergency responses and crisis response protocols have been
developed and tested. There are Emergency Response Protocols (ERPs), Emergency
Operation Command (EOC) procedures, Critical Incident Stress Debriefing Teams
(CISDT) and other models. As you add BIT functionality, it is important to integrate
existing or concurrently created protocols to ensure parallel functionality, cooperation,
information sharing, liaison, and jurisdictional clarity. We don’t need turf battles over
who gets to help, when, and where. BIT members need to know about each of these
protocols, who governs them, and how to activate them, if needed. Each of these
protocols needs to reference how and when to contact the BIT Chair. Just recently, a
student threatening to jump from a building was talked down based on information that
the campus intervention team was able to share with the rescue team about the
background of the student who was threatening suicide, creating a very effective
collaboration.

				
DOCUMENT INFO