top of page

BIT/CARE TEAM TRAINING

DPrep Safety has been contracted to provide training for your BIT, CARE or Threat team. We are committed to making all of our trainings relevant to the work you do and tailored to the needs of your institution. To that end, we ask that you complete this short survey to allow us to take your needs into consideration while building the program.

A checklist on a chalkboard
A diverse team working together
A group of people putting large puzzle pieces together
Two people working together across a desk
A diverse team working together

Consider the following areas below and rate them based on how important the subject is to cover.​

​

1 = Not needed, 2 = Somewhat needed, 3 = Useful if time allows, 4 = Very needed, 5 = Critical area

Team Foundations

Naming and marketing the team
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Team membership (primary and secondary members)
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Documentation best practices: dos and don’ts
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Faculty and staff discussed as BIT cases
Not neededSomewhat neededUseful if time allowsVery neededCritical area
How threat assessment fits into a BIT/CARE model on a college campus
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Using triage tools and assessments consistently at each meeting
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Information sharing within the BIT (FERPA, HIPAA, and state confidentiality laws)
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Sharing information outside the team with faculty and staff
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Setting up a successful, effective, and efficacious team process for meetings
Not neededSomewhat neededUseful if time allowsVery neededCritical area

Advanced/Practical Team Concepts

End-of-semester and end-of-year reports
Not neededSomewhat neededUseful if time allowsVery neededCritical area
When (and how) to close a case
Not neededSomewhat neededUseful if time allowsVery neededCritical area
The risks and benefits of enlisting parents or guardians
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Common legal pitfalls for a team
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Successful interventions for students who are non-compliant with BIT requests
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Mandated assessment and treatment
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Addressing student alcohol and drug use via the BIT/CARE
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Bias and how it impacts our decision-making on assessments and interventions
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Office safety and the involvement of law enforcement during the interview
Not neededSomewhat neededUseful if time allowsVery neededCritical area

BIT/CARE Working with Campus Departments

Case management and the BIT/CARE model
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Managing chronic behaviors related to mental illness
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Addressing faculty, staff, and students who feel threatened
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Understanding student conduct and BIT intersections
Not neededSomewhat neededUseful if time allowsVery neededCritical area
The role (and limitations) of clinical counselors on the BIT
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Intersectionality between BIT and Title IX processes
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Best practices in conducting a welfare check with law enforcement
Not neededSomewhat neededUseful if time allowsVery neededCritical area
How to talk to faculty about the difference between feeling threatened vs. being threatened
Not neededSomewhat neededUseful if time allowsVery neededCritical area

Violence Risk and Threat Assessment

The difference between substantive and transient threats
Not neededSomewhat neededUseful if time allowsVery neededCritical area
A review of targeted/mission-oriented vs. instrumental/affective violence
Not neededSomewhat neededUseful if time allowsVery neededCritical area
The difference between mandated assessment and mandated treatment
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Violence risk assessment and foundational concepts of threats
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Violence risk assessment with a focus on social media and written content
Not neededSomewhat neededUseful if time allowsVery neededCritical area
The difference between a psychological assessment and violence risk/threat assessment
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Using a checklist to guide information gathering and decision-making
Not neededSomewhat neededUseful if time allowsVery neededCritical area
A review of protective, anchor, and stabilizing factors
Not neededSomewhat neededUseful if time allowsVery neededCritical area
A guided path on how to become more knowledgeable in violence risk and threat assessment (courses, books, articles, and materials)
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Building a threat mitigation plan after the violence risk assessment is completed
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Working with third-party agencies like fusion centers, FBI, ATF, DHS, and local police
Not neededSomewhat neededUseful if time allowsVery neededCritical area
Common forms of implicit bias that impact information gathering and risk assignment
Not neededSomewhat neededUseful if time allowsVery neededCritical area
bottom of page