Online Training | 800‑258‑3837
Back to Course List

Identifying Types Of Violence In The Workplace

Preview video
Preview Video
Product ID
tqueitvi_vod
Training Time ?
9 to 12 minutes
Language(s)
English
Video Format
High Definition
Required Plugins
None
Number of Lessons
7
Quiz Questions
3
Question Feedback
Wrong Answer Remediation
Lesson Bookmarking
Downloadable Resources
Course screen Course screen Course screen
Overview

Identifying Types Of Violence In The Workplace

Even though millions of workers across America are victims of workplace assault each year, 19% of HR professionals are unsure of the steps to take when a violent incident occurs. This translates to 55% of workers being unaware of their company’s workplace violence prevention policy or plan.

Designed to significantly reduce those statistics, this course defines the types of workplace violence and discusses the strategy to minimize the risk of each one. Focusing on the pivotal role HR policy training and policy play in mitigating employee-related workplace violence, the topics in this are followed by the presentation of two key workplace threat scenarios. Employees will learn the role of policies, HR, and top management in violence risk mitigation.

Use this course to teach employees the importance of a workplace violence prevention policy and empower them to know how to respond in the event of an actual workplace violence incident.

Video on Demand   This course is in the Video On Demand format, to read about Video On Demand features click here.

  • Install on any SCORM LMS
  • Full-screen video presentation
  • Print certificate and wallet card
  • You have 30 days to complete the course
Audience

Small business owners, Compliance and HR professionals, and organizational employees in all departments and positions

Topics
The course presents the following topical areas:
  • Introduction
  • The Threat
  • Compliance Requirements
  • What Should Organizations And Smaller Business Do?
  • Role Of Policies
  • Role Of HR And Top Management In Violence Risk Mitigation
  • Summary

© Mastery Technologies, Inc.