Learn How a Team Can Help Properly Assess & Respond to Threats of Violence
Whether spelled out explicitly or implied, it’s clear that the OHS laws require employers to protect workers from violence on the job.
For example, in many jurisdictions, employers must assess their workplace to determine the general risk of violence and then implement policies and procedures to minimize that risk. (Go to the Workplace Violence Compliance Centre for more information on the workplace violence requirements under the OHS laws and how to comply with them.)
Employers have gotten much better at the above steps. But many still struggle when an actual threat of violence is made—whether by an outsider such as a client, spouse or customer against an employee or by one employee against another, such as a worker against a supervisor.
That’s where threat assessment teams can be very valuable. As discussed in this feature article, the purpose of a threat assessment team is to evaluate any targeted threats of violence to determine:
- The risk level the threat poses; and
- The appropriate steps to take based on that risk level.
To learn more about threat assessment teams (TATs) and how you can use them in your workplace, attend this Feb. 20, 2013 webinar in which Glenn French, President and CEO of the Canadian Initiative on Workplace Violence, will walk you through using a TAT to assess specific, targeted threats at your workplace.
French will explain how using a well-coordinated team approach once a threat has been made can deter potentially violent situations and maximize your ability to ensure the welfare, safety and security of everyone in the workplace.
This webinar will provide participants with an overview of what to consider when developing and implementing a TAT. Specifically, French will cover:
- The difference between organizational risk and individual threat assessments
- The role and mandate of the TAT
- Choosing TAT members, including their training and responsibilities
- Incident reporting procedures
- Required documentation and reports
- How to conduct your investigation, including gathering records and archival information
- The core components of a comprehensive risk assessment
- The importance of risk abatement planning
- Balancing individual privacy with the “duty to warn”
- Interventions and much needed supports for the target of the threat
- Post-incident review.