This resource guide helps BTAM teams move beyond the vague, often misleading label of “unfounded” and toward clear, defensible language about risk. It explains why terms like “no risk of violence exists” or “did not rise to the level of posing a threat” can create false certainty, confuse stakeholders, and undermine organizational liability protection. The guide introduces a core disposition phrase, “No evidence of risk to others at this time,” and then walks readers through a structured taxonomy for documenting low-concern or no-evidence cases. It differentiates between types of “no evidence of risk” dispositions, offers a simple triage framework for cases that don’t warrant a full threat assessment, and provides practical examples of what to say instead of “unfounded,” resulting in a practical, field-ready tool to strengthen documentation, communication with leadership, and overall BTAM defensibility.
“No Evidence of Risk to Others at This Time” vs. “Unfounded” Resource
1) Ownership and Intellectual Property
All Resources are the proprietary intellectual property of Key Operational Insights, LLC and are protected by U.S. and international copyright, trademark, and other intellectual property laws. K.O.I. retains all right, title, and interest in and to the Resources, including all copies and derivative works.
2) License Grant: Purchaser-Only Use
When you purchase a Resource, you are purchasing a limited license to use the Resource—not ownership of the content.
Unless otherwise stated in writing by K.O.I., each purchase grants the purchaser a non-exclusive, non-transferable, revocable, limited license to access and use the Resource for the purchaser’s individual professional use only.
- Individual purchaser: The license is for one person (the purchaser) only.
- Organizational purchaser: The license is limited to the single named organization and only the specific number of authorized users expressly stated at checkout or in a written agreement with K.O.I.
- If you need access for multiple staff, teams, departments, sites, or enterprise use, you must obtain an organizational/multi-user license from K.O.I.
3) Prohibited Uses (No Sharing / No Redistribution)
Unless expressly authorized in writing by K.O.I., you may not:
- Share, forward, upload, post, publish, distribute, or transmit the Resource (or any portion) to any third party
- Share within an organization beyond the specifically licensed authorized users
- Copy, reproduce, scan, photograph, screen-record, or create copies for others
- Upload the Resource to any shared drive, intranet, LMS, learning portal, document repository, Slack/Teams channel, Google Drive/Dropbox/Box folder, or AI training/processing tool accessible by others (unless expressly permitted)
- Resell, sublicense, lease, lend, assign, gift, or otherwise transfer the Resource or access credentials
- Create derivative works (including “rewritten” or “rebranded” versions) for redistribution, training, or publication
- Remove, obscure, or alter copyright notices, watermarks, attribution marks, or unique identifiers
4) Limited Permitted Use
You may:
- Use the Resource for your own professional development and reference
- Print one copy for your personal use (if the Resource is printable), provided it is not shared
- Incorporate brief excerpts into internal notes for your personal use, provided the excerpt is not redistributed and does not substitute for the Resource itself
(If you need to distribute content for training or policy adoption, request a licensed version.)
5) Security and Access Integrity
You agree to maintain reasonable security measures to prevent unauthorized access, including:
- Not sharing passwords, links, or access credentials
- Storing the Resource in a manner not accessible to non-authorized individuals
- Immediately notifying K.O.I. if you suspect unauthorized access, loss, or disclosure
K.O.I. may use watermarks, unique purchaser identifiers, access controls, and other methods to protect its intellectual property.
6) Unlawful Dissemination: Consequences and Enforcement
Unauthorized dissemination, copying, or distribution undermines K.O.I.’s intellectual property and may constitute infringement. If K.O.I. determines, in its discretion, that this Policy has been violated, K.O.I. may, to the fullest extent permitted by law:
- Revoke the license and terminate access without refund
- Issue a cease-and-desist demand and require written confirmation of compliance
- Require removal of the Resource from any platforms, shared drives, websites, or systems
- Seek recovery of actual damages and/or statutory damages where applicable
- Seek injunctive relief (court orders to stop use/distribution)
- Seek reimbursement of reasonable attorneys’ fees and costs where permitted
- Pursue any other remedies available under contract, copyright, and related laws
7) Reporting Suspected Misuse
If you become aware of unauthorized sharing of K.O.I. Resources, please report it to:
info@koipartners.net
Include any relevant links, screenshots, or details.8) No Waiver
Failure by K.O.I. to enforce any provision of this Policy does not constitute a waiver of K.O.I.’s right to enforce that provision later.
9) Updates to This Policy
K.O.I. may update this Policy periodically. The version in effect at the time of purchase governs that purchase unless K.O.I. provides otherwise in writing.

