top of page
Ivy Tech logo

Resources

That password is incorrect. Please try again.

BIT/CARE Webinar Series

Join the Zoom

CASE Processing
CASE Processing Worksheet
BU Leave of Absence Guide
Case One
25:58
Case Two
12:42
Case Three
11:53
Case Five
13:49
Types of Threat
Faculty Guide to Managing Mental Illness and Disruptions in the Classroom
Working with Disruptive Students
Guide to Classroom Civility
Transtheoretical Change Theory
Classroom Management 101
Classroom Management Roundtable
15 Critical Questions Faculty Need to Ask

BIT/CARE Framework

Team Development

BIT Team Standards
CARE Audit Tool
elephant.png
A Guide to Terminology in Risk/Threat Analysis
Documentation and Case Notes
BIT/CARE Team Development Checklist
Marketing Your Team
BIT/CARE Team Guide Template
The CASE Process
Building the Team - Conduct
Working with Students with Disabilities

Threat Assessment Basics

An Exploration of the Risk, Protective, and Mobilization Factors Related to Violent Extremism in College Populations
The Evolving Nature of Threat and Violence Risk Assessment in College Counseling Centers
Behavioral Threat Assessment Units
The Role of Warning Behaviors in Threat Assessment: An Exploration and Suggested Typology
Beyond the Red Flags
Threat Assessment Glossary
Social Media Basics
Types of Threat

Intake and Interviewing

Advanced Interview Skills
How Trauma Impacts the Brain
Adverse Childhood Experiences
Impression Management
Bias Mitigation
Safety in the Title IX Environment
Establishing Rapport
Trauma Reactions

Interventions

Adverse Childhood Experiences Questionnaire
Common Challenges for Minorites Accessing Mental Health Treatment
Referral Checklist and Service Audit
Boston University's Leave of Absence Guide
Creating Intervention Plans
Working with Resistant and Difficult Students
Bystander Empowerment
Helping Student Veterans

Our Team

Chris Taylor, PhD

Chris Taylor, PhD

InterACTT

Amy Murphy, PhD

Amy Murphy, PhD

Angelo State University

Allison Frost

Allison Frost

Affiliated Consultant

Bethany Smith

Bethany Smith

Director of Safety

Brian Van Brunt, EdD

Brian Van Brunt, EdD

Director of Behavior & Threat Management

AWARE TEAM TRAINING SURVEY

DPrep Safety has been contracted to provide training for Ivy Tech's Aware Teams. We are committed to making all of our training relevant to the work you do and tailored to the needs of your institution. To that end, we ask that you complete this short survey to allow us to take your needs into consideration while building the program.

A checklist on a chalkboard
A diverse team working together
A group of people putting large puzzle pieces together
Two people working together across a desk
A diverse team working together

Consider the following areas below and rate them based on how important the subject is to cover.

1 = Not needed, 2 = Somewhat needed, 3 = Useful if time allows, 4 = Very needed, 5 = Critical area

Your Role:

Team Foundations

Marketing the team
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Documentation best practices: dos and don’ts
Not neededSomewhat neededUseful if time allowsVery neededCritical area
How threat assessment fits into a BIT/CARE model on a college campus
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Using triage tools and assessments consistently at each meeting
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Information sharing within the BIT (FERPA, HIPAA, and state confidentiality laws)
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Sharing information outside the team with faculty and staff
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Setting up a successful, effective, and efficacious team process for meetings
Not neededSomewhat neededUseful if time allowsVery neededCritical area

Advanced/Practical Team Concepts

End-of-semester and end-of-year reports
Not neededSomewhat neededUseful if time allowsVery neededCritical area
When (and how) to close a case
Not neededSomewhat neededUseful if time allowsVery neededCritical area
The risks and benefits of enlisting parents or guardians
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Common legal pitfalls for a team
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Successful interventions for students who are non-compliant with BIT requests
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Mandated assessment and treatment
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Addressing student alcohol and drug use via the BIT/CARE
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Bias and how it impacts our decision-making on assessments and interventions
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Office safety and the involvement of law enforcement during the interview
Not neededSomewhat neededUseful if time allowsVery neededCritical area

BIT/CARE Working with Campus Departments

Case management and the BIT/CARE model
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Managing chronic behaviors related to mental illness
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Addressing faculty, staff, and students who feel threatened
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Understanding student conduct and BIT intersections
Not neededSomewhat neededUseful if time allowsVery neededCritical area
The role (and limitations) of clinical counselors on the BIT
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Intersectionality between BIT and Title IX processes
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Best practices in conducting a welfare check with law enforcement
Not neededSomewhat neededUseful if time allowsVery neededCritical area
How to talk to faculty about the difference between feeling threatened vs. being threatened
Not neededSomewhat neededUseful if time allowsVery neededCritical area

Violence Risk and Threat Assessment

The difference between substantive and transient threats
Not neededSomewhat neededUseful if time allowsVery neededCritical area
A review of targeted/mission-oriented vs. instrumental/affective violence
Not neededSomewhat neededUseful if time allowsVery neededCritical area
The difference between mandated assessment and mandated treatment
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Violence risk assessment and foundational concepts of threats
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Violence risk assessment with a focus on social media and written content
Not neededSomewhat neededUseful if time allowsVery neededCritical area
The difference between a psychological assessment and violence risk/threat assessment
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Using a checklist to guide information gathering and decision-making
Not neededSomewhat neededUseful if time allowsVery neededCritical area
A review of protective, anchor, and stabilizing factors
Not neededSomewhat neededUseful if time allowsVery neededCritical area
A guided path on how to become more knowledgeable in violence risk and threat assessment (courses, books, articles, and materials)
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Building a threat mitigation plan after the violence risk assessment is completed
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Working with third-party agencies like fusion centers, FBI, ATF, DHS, and local police
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Common forms of implicit bias that impact information gathering and risk assignment
Not neededSomewhat neededUseful if time allowsVery neededCritical area
bottom of page