Skip to content

Evaluation of Risk for Sexual Violence: RSVP & SVR-20 V2

Presented By Stephen D. Hart, PhD
Stephen D. Hart, PhD

30 hours | 30 CEs

This on-demand professional training program on the Evaluation of Risk for Sexual Violence using the Risk for Sexual Violence Protocol (RSVP) and the Sexual Violence Risk-20 Version 2 (SVR-20 V2) is presented by Stephen D. Hart, PhD, in partnership with Protect International Risk and Safety Services.

Sexual violence—and, in particular, the diversity of both sexual violence and the people who commit sexual violence—presents tremendous challenges for professionals responsible for Assessment and treatment. Actuarial risk assessment methods, which focus on identifying risk levels based on statistical profiles, do little to assist in the identification of critical risk factors or the development of management plans in a given case.

In this program, Dr. Hart discusses the use of structured professional judgment (SPJ) guidelines in sexual violence risk assessment. He begins by reviewing the SPJ approach, highlighting its potential strengths with respect to developing case formulations and management plans. Next, he describes two sets of SPJ guidelines, the Sexual Violence Risk-20 Version 2 (SVR-20 V2) and Risk for Sexual Violence Protocol (RSVP), and their administrative procedures, focusing on their application to developing formulations (case conceptualizations) and management plans. Finally, participants practice the administration of the SVR-20 V2 and RSVP in two case studies.

Intended Audience

This on-demand professional training program is intended for mental health and other allied professionals

Experience Level

This on-demand professional training program is appropriate for beginner, intermediate, and advanced level clinicians.

CE / CPD Credit

APA, ASWB, CPA, NBCC Click here for state and other regional board approvals.

Learning Objectives

Upon completion of this program you will be able to:

Describe the SPJ approach to violence risk assessment

Describe the diversity of sexual violence

Describe the challenges professionals face during assessment and treatment

Describe the risk levels based on statistical profiles

Describe the administration procedures for the SVR-20 V2 and RSVP

Describe the use of the RSVP for developing case conceptualizations and management plans

Describe the SVR-20 V2 and RSVP through case studies

Demonstrate administration of the SVR-20 V2 and RSVP

arch

Presented By

Stephen D. Hart, PhD

Dr. Stephen D. Hart obtained BA, MA, and Ph.D. degrees in psychology at the University of British Columbia. He has been on faculty in the Department of Psychology at Simon Fraser University since 1990 and has held the rank of Professor since 2001. He also served as a Visiting Professor in the Facult...

Curriculum

1. Introduction

2. Risk Assessment and Management

3. Identifying Risk Factors

4. Motivators

5. Disinhibitors and Destabilizers

6. Combining Risk Factors

7. Actuarial Approaches

8. Structured Professional Judgement

9. SVR-20 Version 2

10. SVR-20 Version 2 - Step 1

Develop a Specialty Area of Practice

Transforming mental health professionals into experts

Expert Instructors

Professional training developed and delivered by the field's leading experts

CE Credit

Earn CE credit for meaningful professional training that will elevate your practice

Convenience & Flexibility

Learn at your own pace, from wherever you might be!

Program Partner

Protect International Risk and Safety Services

We are proud to partner with Protect International Risk and Safety Services for this training. Protect International's threat assessment professionals are internationally recognized experts that have developed some of the world's most widely used and best-validated threat assessment tools. Protect International provides services and products related to violence risk assessment and management, also known as threat assessment and management. Protect International services and products include threat assessment training and support, case assessment and management, legal consultation, policy review and development, and program evaluation and research; along with threat assessment manuals, worksheets, licenses, and software applications for those tools.

Company Image