Behavioral Intervention Team (BIT) Procedures INSTRUCTIONS FOR REPORTING INCIDENTS TO THE BIT □ All employees may reach the BIT on-call staff at 662-329-7129 during regular business hours. After hours, call 662-241-7777. Emergencies should ALWAYS be reported to 911. They will dispatch BIT if needed o Students are encouraged to report concerns about peers to the BIT □ All incidents or red flags are to be reported to BIT by ALL employees except those covered by confidentiality at the time of receiving the report or becoming aware of the incident. Reports from staff covered by confidentiality may be shared anonymously or confidentially, unless the report indicates a threat for which confidentiality may be breached (imminent threat to self or other identified individuals) o anonymously refers to omitting from the report the name of the person who holds the privilege (or the names of any other person about whom the reporter gains information via a confidential relationship) o confidentially refers to the option for the reporting employee to withhold their identity from the report □ Employees who fail to follow the mandated reporting policy will face appropriate consequences o Incident reports of red flags are to be uploaded to the database (or otherwise reported to BIT) by employees within 24 hours of first becoming aware of the incident (if not sooner) o As much detail should be included as you have (downloadable form, web form, etc) o Here is a list of the types of behaviors or actions that should be reported, though the list is not exhaustive. Reporters are expected to use their judgment as to what is reportable, erring on the side of over-reporting if in doubt. For example, if an incident may seem minor, but other similar incidents occur in close proximity, they may indicate a pattern not visible to the witness of a single incident: Extreme rudeness or insubordination to university officials, staff, faculty or administrators Classroom disruption All violations of residence hall rules All violations of the student code of conduct Drunkenness in the classroom Threatening words or actions Writings that convey clear intentions to harm self or others Observed self-injurious behavior, such as cutting, burning, etc. Online postings in Facebook, MySpace, RateMyProfessor that are threatening Excessive class absenteeism Suicidality, including threats (I am going to kill myself), gestures (erasing one’s hard drive), ideation (I’ve always thought about killing myself by jumping off a cliff), or attempts (further clues to suicide are posted at: http://www.smhca.org/clues_to_suicide.aspx, if you wish to include them here) Acts motivated by hatred or discrimination, or paranoia that a student groundlessly believes they are being targeted Stalking Relationship violence (even if the victim doesn’t want you to tell, unless the information is conveyed to you in a confidential relationship) Hazing Flat affect or extreme lack of responsiveness “Accidental” overdose Disappearances, kidnappings or missing persons Harassment Alarming references to bombs, ammunition or ordnance Alarming infatuation with fire or firearms o Reporters should classify their report by the following risk or alert scale. Incidents receiving Severe or Extreme classification require not just uploading to the database, but a call to the on-call BIT member as well. Ultimately, BIT will classify the incident, but here is guidance for both reporters and BIT on the category criteria: Mild risk • Likely the result of some disruption. Student not distressed. • No threat made or present. Moderate risk • Likely the result of more involved or repeated disruption or low level of distress. • Possible threat made or present • Threat is vague and indirect • Information about threat or threat itself is inconsistent, implausible or lacks detail • Threat lacks realism • Content of threat suggests threatener is unlikely to carry it out. Elevated risk • Seriously disruptive incident(s) • Student exhibiting clear distress • Threat made or present • Threat is vague and indirect, but may be repeated or shared with multiple reporters • Information about threat or threat itself is inconsistent, implausible or lacks detail • Threat lacks realism, or is repeated with variations • Content of threat suggests threatener is unlikely to carry it out. Severe risk • Student is not merely disruptive or distressed, but is disturbed • Threat made or present • Threat is vague, but direct, or specific but indirect • Likely to be repeated or shared with multiple reporters • Information about threat or threat itself is consistent, plausible or includes increasing detail of a plan (time, place, etc) • Threat is plausible, or is repeated with consistency (may try to convince listener they are serious) • Content of threat suggests threatener may carry it out. Extreme risk • Student is dysregulated (way off baseline) • Threat made or present • Threat is concrete (specific or direct) • Likely to be repeated or shared with multiple reporters • Information about threat or threat itself is consistent, plausible or includes specific detail of a plan (time, place, etc), often with steps already taken • Threat is plausible, or is repeated with consistency • Content of threat suggests threatener will carry it out (reference to weapons, means). • Threatener may appear detached □ BIT must receive notification of all behavioral contracts formed between staff and students □ Faculty must report all classroom and other disruption incidents to the database, and potentially to the VPSS □ Staff must report all operational disruption and other incidents of concern to the database, and potentially to the VPSS □ Residence life personnel must report residence hall disruptive behaviors to the database, and potentially to the VPSS if they reach a threshold of severity that removes them from the residential life conduct process □ Campus law enforcement must coordinate police log entry with BIT database entry requirements INSTRUCTIONS FOR BIT FOLLOW-UP WITH INDIVIDUAL □ BIT will determine when members can/should/must meet with the individual □ BIT should reference existing policy for imposition of interim suspension and/or trespass orders □ BIT should reference existing criteria for mandating psychological assessment for an individual o On campus? o Off-campus? o Social worker, Psychologist, LPC or Psychiatrist o How soon? o How will results be communicated to BIT? Either by mandate of BIT or • Only objective evaluative criteria and findings will be shared Tarasoff-level disclosure by off-site provider • As much information will be shared as needed to avert the expected harm o What will happen if individual fails to complete assessment in time? Possible grant of extension for good cause Conduct code response for failure to comply (likely suspension) Human resources fitness for duty determination Provost-level response □ BIT will determine the procedure for custodial holding of individual while interim suspension is being determined, or when interim suspension is imposed, but a gap in transition is in place until the individual relocates, parents arrive, etc. o Detail on how quickly an individual must vacate campus, o Notice to roommates, faculty, staff o Re-keying locks INSTRUCTIONS FOR BIT FOLLOW-UP WITH RESOURCES □ BIT will use a feedback loop (within the database) to confirm to reporting employees/students that red flags are being acted upon □ BIT will reference existing procedures with the VPSS for purposes of imposing campus-based no-contact orders □ BIT will reference existing procedures whereby campus hearing outcomes for acts of violence, disruption, threats and other pertinent offenses will be shared by the VPSS with the BIT o BIT will utilize notification procedures for contacting parents, guardians, roommates, friends, faculty, coaches, etc. Part of this protocol is an assessment of whether such notifications are legally permitted, and whether such notifications could be helpful or harmful to the intervention and helpful or harmful to risk management priorities. o Assessment in suicide threats/ideation/attempts of whether involving parents would exacerbate situation. Determine who has custody/guardianship/who is emergency contact. Often, friends/roommates will have insight into the relationship of the individual with their parents. □ BIT will coordinate with the VPSS and/or Campus Police to determine if reports should be pursued despite having an unwilling complainant, anonymous report or reluctant witness □ BIT will coordinate with academic support services on tracking excessive absenteeism □ BIT will assure continuity of therapeutic care for a student who leaves campus voluntarily or involuntarily under this protocol, when that student is treating with campus mental health resources at the time □ BIT will coordinate responding to a individual who returns from the emergency room or community in-patient mental health facility following a potentially suicidal situation □ BIT will implement procedure for voluntary/involuntary psychological/medical withdrawal o Is the individual qualified as a person with a disability? o Direct threat determination procedures under Section 504 o Accommodations under ADA o Conditions for return BIT will establish return criteria or do so in conjunction with a conduct code action; BIT is authorized to consider all return applications, to place appropriate conditions upon return, or to determine return timeline • The only legal restriction on BIT is that Section 504 of the Rehabilitation Act holds that it may not require cessation of the underlying disability as a condition for return. • However, BIT may order re-assessment to determine whether a student continues to be a direct threat, and is therefore ineligible to return, or is no longer a direct threat, and may return subject to appropriate conditions, restrictions or agreements. □ BIT will coordinate procedure for college or university personnel on responding to hospitalization o Who will go? o Transport for student to return □ BIT will coordinate management of custody of a student who may be an imminent threat of harm INSTRUCTIONS FOR BIT COOPERATION WITH UNIVERSITY EMERGENCY RESPONSE TASK FORCE □ The Chair activates campus warning systems (text, email, webpage, etc) according to existing policy. o Coordination with Clery Act timely warning requirements □ Detailed instructions for the role of the Chair when campus emergency management protocols are activated should be included within those independent protocols (BIT should take a back seat to crisis response at that time) □ The Chair should elevate reporting beyond BIT to vice presidents, president, campus law enforcement, local law enforcement, FBI, Homeland Security, etc. according to existing policy o Who calls whom, at what number – phone chain clearly established □ Chair assures coordination with local ambulance, hospital, mental health, advocacy and other resources □ All emergency protocols must be coordinated to ensure consistency, integration and jurisdiction • Coordinating Team operation with current crisis response protocols, campus CISDT models and ERP/EOC procedures On many campuses, emergency responses and crisis response protocols have been developed and tested. There are Emergency Response Protocols (ERPs), Emergency Operation Command (EOC) procedures, Critical Incident Stress Debriefing Teams (CISDT) and other models. As you add BIT functionality, it is important to integrate existing or concurrently created protocols to ensure parallel functionality, cooperation, information sharing, liaison, and jurisdictional clarity. We don’t need turf battles over who gets to help, when, and where. BIT members need to know about each of these protocols, who governs them, and how to activate them, if needed. Each of these protocols needs to reference how and when to contact the BIT Chair. Just recently, a student threatening to jump from a building was talked down based on information that the campus intervention team was able to share with the rescue team about the background of the student who was threatening suicide, creating a very effective collaboration.