Violence threats dating
It is crucial to contact university police (if the university has sworn law enforcement) or external law enforcement in all situations that appear to involve an imminent risk of harm.
We’d like to cite three of them and make the following suggestions as to how institutions can best address them. In fact, following the mass shooting at Virginia Tech in 2007, many colleges and universities created threat assessment and management, or TAM, teams to assess and manage situations involving individuals who may pose a threat to others. Effective TAM teams educate their communities regarding the existence and purpose of the team; encourage reporting of and receive information regarding behavior and statements of concern; efficiently investigate surrounding circumstances to determine, among other things, the person of concern’s motivations, capacity to do harm and status on a potential pathway to violence; and develop strategies to manage the threats that are posed.It is worth noting that one of reasons a California court ruled in December to advance a student-on-student violence case toward a jury trial was that there was at least an issue of fact as to whether the university should have referred a student assailant’s case to its violence prevention team.According to the court, that team “could have then conducted a formal threat assessment and recommended interventions that would have mitigated the threat [the alleged perpetrator] posed to students.” Colleges have the opportunity to encourage widespread knowledge of and reporting to their threat assessment and management teams. No one reported information about the Mc Cluskey matter to the university’s Office of Equal Opportunity and Affirmative Action, which handles sexual assault, IPV and stalking cases.Many of those representatives are also members of the university’s TAM team.So if it appears -- based on an initial or updated report regarding a sexual assault, dating violence or stalking case -- that a risk of harm might be posed to anyone, a threat assessment process can be initiated seamlessly and immediately.