SlideShare a Scribd company logo
1 of 20
Download to read offline
Beyond Awareness
ACTIONS IN THREAT AND VIOLENCE RISK MANAGEMENT
February 2018
ATAP DALLAS/FORT WORTH AND HOUSTON FEBRUARY CHAPTER MEETINGS
PART 1
Principles of Behavioral
Threat Assessment
2 HILLARD HEINTZE © 2018 | Protecting What Matters®
AGENDA FOR PART 1
• What We Learned About Attackers
• What We Know About Attack-Related Behavior
• Warning Behaviors
• Mitigation Factors
• Domestic Violence in the Workplace
WHAT WE LEARNED ABOUT ATTACKERS
The Exceptional Case Study Project
U.S. Secret Service and National Institute of Justice five-year study
examined the thinking and behavior of 83 subjects who carried out
74 attacks from 1949 to 1996 and asked 6 principal questions:
1. How did attackers select targets?
2. What were their motives?
3. How did they plan their attacks?
4. Was mental illness a contributing factor?
5. Did they communicate prior to the attack?
6. How did they assess security they faced?
HILLARD HEINTZE © 2018 | Protecting What Matters®3
WHAT WE LEARNED ABOUT ATTACKERS
What is targeted violence?
Any incident of violence where a
known or knowable attacker selects
a particular target prior to their
violent attack.
HILLARD HEINTZE © 2018 | Protecting What Matters®4
WHAT WE LEARNED ABOUT ATTACKERS
MYTH 1
They fit a
distinct profile
FACT 1
Attackers do not fit
one descriptive or
demographic profile
MYTH 2
Mentally ill attackers
are irrational in their
planning
FACT 2
Mentally ill attackers
have developed,
organized and rational
attack plans
MYTH 3
They make a
direct threat
FACT 3
Persons who pose an
actual threat most often
do not make a threat
HILLARD HEINTZE © 2018 | Protecting What Matters®5
WHAT WE KNOW ABOUT ATTACK-RELATED BEHAVIORS
HILLARD HEINTZE © 2018 | Protecting What Matters®6
Targeted violence is the result
of an understandable and often
discernible pre-attack process
of thinking and behavior.
7 HILLARD HEINTZE © 2018 | Protecting What Matters®
WHAT WE KNOW ABOUT ATTACK-RELATED BEHAVIORS
Attack-related behaviors
• Interest or obsession with violence
• Develop attack plan
• Approach or visit site of attack
• Attempted assault or actual attack
• Attempt to penetrate security
• Approach or visit site with weapon
8 HILLARD HEINTZE © 2018 | Protecting What Matters®
WHAT WE KNOW ABOUT ATTACK-RELATED BEHAVIORS
Behavioral Threat Assessment
The process of gathering and assessing
information about persons who may have the
interest, motive, intention and capability of
committing an act of targeted violence.
9 HILLARD HEINTZE © 2018 | Protecting What Matters®
WHAT WE KNOW ABOUT ATTACK-RELATED BEHAVIORS
The Pathway Approach
Threat assessment is not simply assessing a
threat that has been made.
Rather, it is proactively addressing pathway
behaviors and behaviors of concern to mitigate
potential escalation of behaviors and those
behaviors’ potential escalation to violence.
We aren’t predicting, we’re preventing.
10 HILLARD HEINTZE © 2018 | Protecting What Matters®
WHAT WE KNOW ABOUT ATTACK-RELATED BEHAVIORS
Attackers have
motives
• Achieve fame and
notoriety
• Law-enforcement-
assisted suicide
• Bring national
attention to a
perceived problem
Attackers select
targets
• Based on their
motives and
accessibility of
the target
• Often consider
more than one
target
Attackers have common
backgrounds
• Despair, depression,
suicidal thoughts
• History of harassing
or stalking
• Major loss or change in life
• Few arrests for violent
crimes
PRINCIPLES OF BEHAVIORAL THREAT ASSESSMENT
Threat assessment is the approach supported
by the Exceptional Case Study Project
Various approaches to assessing the likelihood
of violence exist. Most are effective in one or
more respects – but ineffective in others.
Profiling Automated
Decision-
Making
Pure Clinical
Judgment
HILLARD HEINTZE © 2018 | Protecting What Matters®11
12 HILLARD HEINTZE © 2018 | Protecting What Matters®
PRINCIPLES OF BEHAVIORAL THREAT ASSESSMENT
Warning behaviors
• Behavioral changes
• Irritability
• Blaming others
• Sleep disturbances
• Withdrawal
• Substance abuse
• Accidents
• Performance decline
• Physical complaints
• Falsely accusing others
• Explosive outburst
• Threatening litigation
• Inappropriate behavior
• Depression
• Aggressive complaints
• Shouting or throwing things
13 HILLARD HEINTZE © 2018 | Protecting What Matters®
PRINCIPLES OF BEHAVIORAL THREAT ASSESSMENT
Mitigating factors
• Close family ties or other positive
personal attachments
• Genuine remorse for making threats
• Positive response to limit-setting efforts
• Professional treatment
• Services offered AND accessed
DOMESTIC VIOLENCE IN THE WORKPLACE
Nearly 33% of women killed in
U.S. workplaces between 2003-
2008 were killed by a current or
former intimate partner.
U.S. Centers for Disease Control and Prevention, 2008
HILLARD HEINTZE © 2018 | Protecting What Matters®14
DOMESTIC VIOLENCE IN THE WORKPLACE
A phone survey of 1,200 full-time American
employees found that 44% had personally
experienced domestic violence’s effect in
their workplaces.
Corporate Alliance to End Public Violence
HILLARD HEINTZE © 2018 | Protecting What Matters®15
DOMESTIC VIOLENCE IN THE WORKPLACE
Basic indicators of domestic violence
• Uncharacteristic lateness, absence,
poor concentration or work-related errors
• Uncharacteristic moodiness, depression
or distraction
• Injuries, especially if the employee tries to conceal
them with clothing or unusual amount of makeup
• Appears to be living in car or not at home
• Frightened when telephone rings
HILLARD HEINTZE © 2018 | Protecting What Matters®16
DOMESTIC VIOLENCE IN THE WORKPLACE
Basic indicators of domestic violence cont.
• Unusual amount of unwanted phone calls, emails or
text messages from a current or former partner
• Caller asking for information about employee’s location
• Abrupt change of address
• Unwelcome visits by employee’s partner to the workplace
• Employee has spoken about break up or court dates
HILLARD HEINTZE © 2018 | Protecting What Matters®17
18 HILLARD HEINTZE © 2018 | Protecting What Matters®
DOMESTIC VIOLENCE IN THE WORKPLACE
Manager’s response
• Respect privacy but offer assistance
• Get help from Human Resources and Security
• Train receptionists and executive assistants to
recognize and report early warning signs
• Use a Calls of Concern Checklist
DOMESTIC VIOLENCE IN THE WORKPLACE
Restraining orders, orders of protection
and physical security
An order of protection is often a signal that an
employee is facing a situation that could
affect the workplace
• Employees must notify Human Resources
• Follow protocol for investigating and managing
the situation
• Ideally request the place of employment be
reflected in the order
• Notify the local police jurisdiction
HILLARD HEINTZE © 2018 | Protecting What Matters®19
HILLARD HEINTZE © 2018 | Protecting What Matters®20
Matthew Doherty
Senior Vice President, Threat + Violence Risk Management
matthew.doherty@hillardheintze.com
JoAnn Ugolini
Director, Threat + Violence Risk Management
joann.ugolini@hillardheintze.com
Mark Brenzinger, Psy.D.
Vice President, Forensic and Clinical Psychologist,
Threat + Violence Risk Management
mark.brenzinger@hillardheintze.com

More Related Content

Similar to Hillard Heintze Presentation to ATAP - Part 1

Styk uclan nov 13
Styk uclan nov 13Styk uclan nov 13
Styk uclan nov 13
thevigor
 
Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2
mojo_5
 
Workplace Violence
Workplace ViolenceWorkplace Violence
Workplace Violence
John Toay
 
08 ppt-workplace violence-final
08 ppt-workplace violence-final08 ppt-workplace violence-final
08 ppt-workplace violence-final
Roger Phillips
 
Workplace Violence Prevention and Domestic Violence in the Workplace Training...
Workplace Violence Prevention and Domestic Violence in the Workplace Training...Workplace Violence Prevention and Domestic Violence in the Workplace Training...
Workplace Violence Prevention and Domestic Violence in the Workplace Training...
Atlantic Training, LLC.
 

Similar to Hillard Heintze Presentation to ATAP - Part 1 (20)

Hillard Heintze ASIS Presentation Active Shooter
Hillard Heintze ASIS Presentation Active ShooterHillard Heintze ASIS Presentation Active Shooter
Hillard Heintze ASIS Presentation Active Shooter
 
Insights on Enhancing the Security of Your Family
Insights on Enhancing the Security of Your FamilyInsights on Enhancing the Security of Your Family
Insights on Enhancing the Security of Your Family
 
Radicalization in the Workplace
Radicalization in the WorkplaceRadicalization in the Workplace
Radicalization in the Workplace
 
Comprehensive Active Shooter Incident Management
Comprehensive Active Shooter Incident ManagementComprehensive Active Shooter Incident Management
Comprehensive Active Shooter Incident Management
 
Step Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsStep Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in Schools
 
CH 4 CRIMINAL ACTS AND INTENTIONAL TORTS
CH 4 CRIMINAL ACTS AND INTENTIONAL TORTSCH 4 CRIMINAL ACTS AND INTENTIONAL TORTS
CH 4 CRIMINAL ACTS AND INTENTIONAL TORTS
 
When Violence Invades Your Family Entertainment Center (FEC)
When Violence Invades Your Family Entertainment Center (FEC)When Violence Invades Your Family Entertainment Center (FEC)
When Violence Invades Your Family Entertainment Center (FEC)
 
Workplace Domestic Violence
Workplace Domestic ViolenceWorkplace Domestic Violence
Workplace Domestic Violence
 
Styk uclan nov 13
Styk uclan nov 13Styk uclan nov 13
Styk uclan nov 13
 
Workplaceviolencetraining
WorkplaceviolencetrainingWorkplaceviolencetraining
Workplaceviolencetraining
 
It hit the fan presentation
It hit the fan presentationIt hit the fan presentation
It hit the fan presentation
 
Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2
 
Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2
 
6 Keys to Preventing and Responding to Workplace Violence
6 Keys to Preventing and Responding to Workplace Violence6 Keys to Preventing and Responding to Workplace Violence
6 Keys to Preventing and Responding to Workplace Violence
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
 
Creating an Enterprise-Wide Workplace Violence & Threat Assessment Team
Creating an Enterprise-Wide Workplace Violence & Threat Assessment TeamCreating an Enterprise-Wide Workplace Violence & Threat Assessment Team
Creating an Enterprise-Wide Workplace Violence & Threat Assessment Team
 
Protecting the Family Office
Protecting the Family OfficeProtecting the Family Office
Protecting the Family Office
 
Workplace Violence
Workplace ViolenceWorkplace Violence
Workplace Violence
 
08 ppt-workplace violence-final
08 ppt-workplace violence-final08 ppt-workplace violence-final
08 ppt-workplace violence-final
 
Workplace Violence Prevention and Domestic Violence in the Workplace Training...
Workplace Violence Prevention and Domestic Violence in the Workplace Training...Workplace Violence Prevention and Domestic Violence in the Workplace Training...
Workplace Violence Prevention and Domestic Violence in the Workplace Training...
 

Recently uploaded

Outreach 2024 Board Presentation Draft 4.pptx
Outreach 2024 Board Presentation Draft  4.pptxOutreach 2024 Board Presentation Draft  4.pptx
Outreach 2024 Board Presentation Draft 4.pptx
dcaves
 
AODA Compliance: Accessibility For Everyone
AODA Compliance: Accessibility For EveryoneAODA Compliance: Accessibility For Everyone
AODA Compliance: Accessibility For Everyone
zenjulia64
 
CARA MENGGUGURKAN KANDUNGAN 1 2 3 4 Minggu janin {1 bulan} cepat selesai dala...
CARA MENGGUGURKAN KANDUNGAN 1 2 3 4 Minggu janin {1 bulan} cepat selesai dala...CARA MENGGUGURKAN KANDUNGAN 1 2 3 4 Minggu janin {1 bulan} cepat selesai dala...
CARA MENGGUGURKAN KANDUNGAN 1 2 3 4 Minggu janin {1 bulan} cepat selesai dala...
Obat Cytotec
 

Recently uploaded (20)

Bolpur HiFi ℂall Girls Phone No 9748763073 Elite ℂall Serviℂe Available 24/7...
Bolpur HiFi ℂall Girls  Phone No 9748763073 Elite ℂall Serviℂe Available 24/7...Bolpur HiFi ℂall Girls  Phone No 9748763073 Elite ℂall Serviℂe Available 24/7...
Bolpur HiFi ℂall Girls Phone No 9748763073 Elite ℂall Serviℂe Available 24/7...
 
Outreach 2024 Board Presentation Draft 4.pptx
Outreach 2024 Board Presentation Draft  4.pptxOutreach 2024 Board Presentation Draft  4.pptx
Outreach 2024 Board Presentation Draft 4.pptx
 
Amil Baba in USA manpasand shadi kala jadu USA manpasand shadi ka taweez blac...
Amil Baba in USA manpasand shadi kala jadu USA manpasand shadi ka taweez blac...Amil Baba in USA manpasand shadi kala jadu USA manpasand shadi ka taweez blac...
Amil Baba in USA manpasand shadi kala jadu USA manpasand shadi ka taweez blac...
 
How to Make Your Last-Mile Delivery Super Easy
How to Make Your Last-Mile Delivery Super EasyHow to Make Your Last-Mile Delivery Super Easy
How to Make Your Last-Mile Delivery Super Easy
 
Best-NO1 kala jadu Love Marriage Black Magic UK Powerful Black Magic Speciali...
Best-NO1 kala jadu Love Marriage Black Magic UK Powerful Black Magic Speciali...Best-NO1 kala jadu Love Marriage Black Magic UK Powerful Black Magic Speciali...
Best-NO1 kala jadu Love Marriage Black Magic UK Powerful Black Magic Speciali...
 
How Do Experts In Edmonton Weigh The Benefits Of Deep Root Fertilization
How Do Experts In Edmonton Weigh The Benefits Of Deep Root FertilizationHow Do Experts In Edmonton Weigh The Benefits Of Deep Root Fertilization
How Do Experts In Edmonton Weigh The Benefits Of Deep Root Fertilization
 
Top & Best bengali Astrologer In New York Black Magic Removal Specialist in N...
Top & Best bengali Astrologer In New York Black Magic Removal Specialist in N...Top & Best bengali Astrologer In New York Black Magic Removal Specialist in N...
Top & Best bengali Astrologer In New York Black Magic Removal Specialist in N...
 
Prince Armahs(Tinky) Brochure, for Funeral service
Prince Armahs(Tinky) Brochure, for Funeral servicePrince Armahs(Tinky) Brochure, for Funeral service
Prince Armahs(Tinky) Brochure, for Funeral service
 
Colby Hobson Exemplifies the True Essence of Generosity, Collaboration, and S...
Colby Hobson Exemplifies the True Essence of Generosity, Collaboration, and S...Colby Hobson Exemplifies the True Essence of Generosity, Collaboration, and S...
Colby Hobson Exemplifies the True Essence of Generosity, Collaboration, and S...
 
Errorfree Translation Services and Dubbing Services, Proof-reading Services, ...
Errorfree Translation Services and Dubbing Services, Proof-reading Services, ...Errorfree Translation Services and Dubbing Services, Proof-reading Services, ...
Errorfree Translation Services and Dubbing Services, Proof-reading Services, ...
 
@in kuwait௹+918133066128....) @abortion pills for sale in Kuwait
@in kuwait௹+918133066128....) @abortion pills for sale in Kuwait@in kuwait௹+918133066128....) @abortion pills for sale in Kuwait
@in kuwait௹+918133066128....) @abortion pills for sale in Kuwait
 
Research call #girl in Ras Al Khaimah 00559736143
Research call #girl in Ras Al Khaimah 00559736143Research call #girl in Ras Al Khaimah 00559736143
Research call #girl in Ras Al Khaimah 00559736143
 
LAWRENCE BANDASOA TABASE funeral brochure
LAWRENCE BANDASOA TABASE funeral brochureLAWRENCE BANDASOA TABASE funeral brochure
LAWRENCE BANDASOA TABASE funeral brochure
 
AODA Compliance: Accessibility For Everyone
AODA Compliance: Accessibility For EveryoneAODA Compliance: Accessibility For Everyone
AODA Compliance: Accessibility For Everyone
 
Black Magic Specialist in United States Black Magic Expert in United kingdom
Black Magic Specialist in United States Black Magic Expert in United kingdomBlack Magic Specialist in United States Black Magic Expert in United kingdom
Black Magic Specialist in United States Black Magic Expert in United kingdom
 
Exploring The Role of Waste Management Dumpster Bags
Exploring The Role of Waste Management Dumpster BagsExploring The Role of Waste Management Dumpster Bags
Exploring The Role of Waste Management Dumpster Bags
 
Introduction to MEAN Stack What it is and How it Works.pptx
Introduction to MEAN Stack What it is and How it Works.pptxIntroduction to MEAN Stack What it is and How it Works.pptx
Introduction to MEAN Stack What it is and How it Works.pptx
 
CARA MENGGUGURKAN KANDUNGAN 1 2 3 4 Minggu janin {1 bulan} cepat selesai dala...
CARA MENGGUGURKAN KANDUNGAN 1 2 3 4 Minggu janin {1 bulan} cepat selesai dala...CARA MENGGUGURKAN KANDUNGAN 1 2 3 4 Minggu janin {1 bulan} cepat selesai dala...
CARA MENGGUGURKAN KANDUNGAN 1 2 3 4 Minggu janin {1 bulan} cepat selesai dala...
 
A Thought Leader in the Technology.pptx
A Thought Leader in the  Technology.pptxA Thought Leader in the  Technology.pptx
A Thought Leader in the Technology.pptx
 
Digital Marketing Lab - Your Partner for Innovative Marketing Solutions
Digital Marketing Lab - Your Partner for Innovative Marketing SolutionsDigital Marketing Lab - Your Partner for Innovative Marketing Solutions
Digital Marketing Lab - Your Partner for Innovative Marketing Solutions
 

Hillard Heintze Presentation to ATAP - Part 1

  • 1. Beyond Awareness ACTIONS IN THREAT AND VIOLENCE RISK MANAGEMENT February 2018 ATAP DALLAS/FORT WORTH AND HOUSTON FEBRUARY CHAPTER MEETINGS PART 1 Principles of Behavioral Threat Assessment
  • 2. 2 HILLARD HEINTZE © 2018 | Protecting What Matters® AGENDA FOR PART 1 • What We Learned About Attackers • What We Know About Attack-Related Behavior • Warning Behaviors • Mitigation Factors • Domestic Violence in the Workplace
  • 3. WHAT WE LEARNED ABOUT ATTACKERS The Exceptional Case Study Project U.S. Secret Service and National Institute of Justice five-year study examined the thinking and behavior of 83 subjects who carried out 74 attacks from 1949 to 1996 and asked 6 principal questions: 1. How did attackers select targets? 2. What were their motives? 3. How did they plan their attacks? 4. Was mental illness a contributing factor? 5. Did they communicate prior to the attack? 6. How did they assess security they faced? HILLARD HEINTZE © 2018 | Protecting What Matters®3
  • 4. WHAT WE LEARNED ABOUT ATTACKERS What is targeted violence? Any incident of violence where a known or knowable attacker selects a particular target prior to their violent attack. HILLARD HEINTZE © 2018 | Protecting What Matters®4
  • 5. WHAT WE LEARNED ABOUT ATTACKERS MYTH 1 They fit a distinct profile FACT 1 Attackers do not fit one descriptive or demographic profile MYTH 2 Mentally ill attackers are irrational in their planning FACT 2 Mentally ill attackers have developed, organized and rational attack plans MYTH 3 They make a direct threat FACT 3 Persons who pose an actual threat most often do not make a threat HILLARD HEINTZE © 2018 | Protecting What Matters®5
  • 6. WHAT WE KNOW ABOUT ATTACK-RELATED BEHAVIORS HILLARD HEINTZE © 2018 | Protecting What Matters®6 Targeted violence is the result of an understandable and often discernible pre-attack process of thinking and behavior.
  • 7. 7 HILLARD HEINTZE © 2018 | Protecting What Matters® WHAT WE KNOW ABOUT ATTACK-RELATED BEHAVIORS Attack-related behaviors • Interest or obsession with violence • Develop attack plan • Approach or visit site of attack • Attempted assault or actual attack • Attempt to penetrate security • Approach or visit site with weapon
  • 8. 8 HILLARD HEINTZE © 2018 | Protecting What Matters® WHAT WE KNOW ABOUT ATTACK-RELATED BEHAVIORS Behavioral Threat Assessment The process of gathering and assessing information about persons who may have the interest, motive, intention and capability of committing an act of targeted violence.
  • 9. 9 HILLARD HEINTZE © 2018 | Protecting What Matters® WHAT WE KNOW ABOUT ATTACK-RELATED BEHAVIORS The Pathway Approach Threat assessment is not simply assessing a threat that has been made. Rather, it is proactively addressing pathway behaviors and behaviors of concern to mitigate potential escalation of behaviors and those behaviors’ potential escalation to violence. We aren’t predicting, we’re preventing.
  • 10. 10 HILLARD HEINTZE © 2018 | Protecting What Matters® WHAT WE KNOW ABOUT ATTACK-RELATED BEHAVIORS Attackers have motives • Achieve fame and notoriety • Law-enforcement- assisted suicide • Bring national attention to a perceived problem Attackers select targets • Based on their motives and accessibility of the target • Often consider more than one target Attackers have common backgrounds • Despair, depression, suicidal thoughts • History of harassing or stalking • Major loss or change in life • Few arrests for violent crimes
  • 11. PRINCIPLES OF BEHAVIORAL THREAT ASSESSMENT Threat assessment is the approach supported by the Exceptional Case Study Project Various approaches to assessing the likelihood of violence exist. Most are effective in one or more respects – but ineffective in others. Profiling Automated Decision- Making Pure Clinical Judgment HILLARD HEINTZE © 2018 | Protecting What Matters®11
  • 12. 12 HILLARD HEINTZE © 2018 | Protecting What Matters® PRINCIPLES OF BEHAVIORAL THREAT ASSESSMENT Warning behaviors • Behavioral changes • Irritability • Blaming others • Sleep disturbances • Withdrawal • Substance abuse • Accidents • Performance decline • Physical complaints • Falsely accusing others • Explosive outburst • Threatening litigation • Inappropriate behavior • Depression • Aggressive complaints • Shouting or throwing things
  • 13. 13 HILLARD HEINTZE © 2018 | Protecting What Matters® PRINCIPLES OF BEHAVIORAL THREAT ASSESSMENT Mitigating factors • Close family ties or other positive personal attachments • Genuine remorse for making threats • Positive response to limit-setting efforts • Professional treatment • Services offered AND accessed
  • 14. DOMESTIC VIOLENCE IN THE WORKPLACE Nearly 33% of women killed in U.S. workplaces between 2003- 2008 were killed by a current or former intimate partner. U.S. Centers for Disease Control and Prevention, 2008 HILLARD HEINTZE © 2018 | Protecting What Matters®14
  • 15. DOMESTIC VIOLENCE IN THE WORKPLACE A phone survey of 1,200 full-time American employees found that 44% had personally experienced domestic violence’s effect in their workplaces. Corporate Alliance to End Public Violence HILLARD HEINTZE © 2018 | Protecting What Matters®15
  • 16. DOMESTIC VIOLENCE IN THE WORKPLACE Basic indicators of domestic violence • Uncharacteristic lateness, absence, poor concentration or work-related errors • Uncharacteristic moodiness, depression or distraction • Injuries, especially if the employee tries to conceal them with clothing or unusual amount of makeup • Appears to be living in car or not at home • Frightened when telephone rings HILLARD HEINTZE © 2018 | Protecting What Matters®16
  • 17. DOMESTIC VIOLENCE IN THE WORKPLACE Basic indicators of domestic violence cont. • Unusual amount of unwanted phone calls, emails or text messages from a current or former partner • Caller asking for information about employee’s location • Abrupt change of address • Unwelcome visits by employee’s partner to the workplace • Employee has spoken about break up or court dates HILLARD HEINTZE © 2018 | Protecting What Matters®17
  • 18. 18 HILLARD HEINTZE © 2018 | Protecting What Matters® DOMESTIC VIOLENCE IN THE WORKPLACE Manager’s response • Respect privacy but offer assistance • Get help from Human Resources and Security • Train receptionists and executive assistants to recognize and report early warning signs • Use a Calls of Concern Checklist
  • 19. DOMESTIC VIOLENCE IN THE WORKPLACE Restraining orders, orders of protection and physical security An order of protection is often a signal that an employee is facing a situation that could affect the workplace • Employees must notify Human Resources • Follow protocol for investigating and managing the situation • Ideally request the place of employment be reflected in the order • Notify the local police jurisdiction HILLARD HEINTZE © 2018 | Protecting What Matters®19
  • 20. HILLARD HEINTZE © 2018 | Protecting What Matters®20 Matthew Doherty Senior Vice President, Threat + Violence Risk Management matthew.doherty@hillardheintze.com JoAnn Ugolini Director, Threat + Violence Risk Management joann.ugolini@hillardheintze.com Mark Brenzinger, Psy.D. Vice President, Forensic and Clinical Psychologist, Threat + Violence Risk Management mark.brenzinger@hillardheintze.com