Jeff Poiner David - Detroit Conference
Download
Report
Transcript Jeff Poiner David - Detroit Conference
+
Ann Arbor District
Leadership Day
Conference
Youth Protection Policy
& CyberSafety
Awareness
Jeff Poiner
[email protected]
February 5, 2011
+
Agenda
Introduction
Making Church a Safe Place
Background
Goal of a Protection Policy for your congregation
Difference between Local and District Policy
General Rules and Procedures for Consideration
Next Steps
CyberSafety Awareness
Background
Cyberbulling, Social Network, Texting, Identity Theft
Closing Thoughts
2
+
Background
When the crowd tried to keep the children away from Jesus, he
was quick to respond. “Let the Children come to me”
Jesus taught that children were to be included and provided
for within the community of faith.
Today, the church may be the only place where some children
find the unconditional love and care they so desperately
need to grow and thrive.
In 1996, the Council of Bishops called upon The United
Methodist Church to reshape its life in response to the crisis
among children.
“A report of child abuse is made every ten seconds. Almost five
children die everyday as a result of child abuse. More than
three out of four are under the age of 4.” www.childhelp.org
3
Baptismal Covenant
(p.44 The United Methodist Hymnal)
Pastor: Do you as a congregation accept the responsibility of assisting
these parents in fulfillment of the baptismal vows, and do you undertake
to provide facilities and opportunities for Christian nurture and
fellowship?
People: We will, by the grace of God.
Pastor: Members of the household of faith, I commend to your love and
care this child, whom we this day recognize as a member of the family of
God. Will you endeavor so to live that this child may grow in the
knowledge and love of God, through our Savior Jesus Christ?
People: With God’s help we will so order our lives after the
example of Christ, that this child, surrounded by steadfast love,
may be established in the faith, and confirmed and strengthened in
the way that leads to life eternal.
4
+
Goals of a Protection Policy
1. Promote
a safe and nurturing environment for all
children, youth, and vulnerable persons who
participate in events sponsored by the Detroit
Conference, its Districts, and Agencies.
2. Protecting
children youth, and vulnerable persons
from abuse and neglect.
3. Protecting
our care providers from false
accusations of abuse or neglect.
4. Minimize
potential Detroit conference & local
church liability.
5
+ Type of Policies
Types of
Certification
When is this
Required?
Detroit Annual
Conference
All District
and
Conference
Events
Local Policy
Working with
Children,
Youth, and
Vulnerable
Adults
Do I need to
attend a class?
Yes
Complete a
test?
Background
Check?
References
Church
attendance
Yes
Yes
Yes – 3
Required
Not Check
but assumed
No
Yes “Other”
accepted
certification i.e.
Scouts, School
District, etc. may
be used
No
Strongly
suggested
Consistently
for 6 months
Both Policies are good for 3 years
6
General Rules and Procedures:
Participation Covenant For All
Participants/Leaders
Annual Orientation For Workers
Advance Notice To Parents
Parent and Family Education
Appropriate Equipment and
Supervision
Unsupervised Time
Supervising person’s with a
background of abuse
7
Two Adult Rule [not spouses]
Windows In All Classrooms
No Workers Under (16)
Sixteen
Four -Years-Older Rule
Open Door Counseling
First Aid/CPR Training
General Rules and Procedures:
Recruiting - Screening
Written
Six
Additional
Month Affiliation Rule
Criminal
Participation
Application Forms
Background Checks
Local-State-National
Policy Process in the event
someone has a you have a
situation
8
Covenant
Considerations
Personal Reference Forms
Driver’s License Checks
Personal Interviews
+ General Rules and Procedures:
Reporting Procedure
You can not keep confidences if
anyone reports to you that:
They are going to commit
suicide.
They are going to hurt another
person.
They report that they have been
abused sexually or physically
If you know any of the above or
you suspect physical or sexual
abuse, you are required by law to
report these to the Department of
Human Services in Michigan
within 72 hours of the report
made to you.
In most settings you will:
1.
2.
3.
4.
5.
Maintain confidences
9
Contact the event director.
Contact the Michigan
Department of Human Services
(DHS).
Follow the instructions of DHS.
Submit the paper work supplied
by DHS.
If parents are notified, they shall
be informed of what steps have
been taken. (Only contact the
parents if DHS instructs you to.)
Once a report has been made, your
primary responsibility will be to
assure the safety and security of the
individual about whom a report was
made.
+ Questions to ask about your current
Insurance coverage.
How much coverage do you have? What are the limits?
Do you specifically have Sexual Abuse and Molestation
(SAM) insurance?
Who is covered? Who is not covered?
Exactly what is covered—criminal lawsuits/defendant until
found guilty, innocent? Punitive damages are never
covered.
What do you do if there is an allegation?
10
+
Make a safe place for everyone
Begin a Conversation with your;
Youth Teams
Board of Trustees
Staff Parish Relations Committee and Staff.
Establish a Local Policy with supporting processes and make
available for your congregation to review/utilize.
Review current insurance policy
Church Mutual
Brotherhood Insurance
Agent referenced me to their website
Agent was very helpful, sent information
No discount available as of January 2011
Complete and Submit application that you have
background check process in place submit and
you will receive a discount on your premium.
11
+
Questions?
12
+ CyberSafety
Awareness
13
+
Proverbs 22:6
Train children in the right way,
and when old, they will not
stray.
NRSV
14
7
+
CyberSafety Awareness
Raise the awareness to be proactive in keeping
children and youth safe in the Internet-based world
of computers, cell phones and video games.
Cyberbulling
Social Media
Texting / Sexting
Identity Theft
15
+
Safety Rules
Acceptable places - Where your child is allowed to go in the community?
Friends & strangers - Who your child can visit and socialize with
Activities - Talking to and associating with strangers?
Visitors - Do you make a effort to know your child?
Curfew - Do you have one for your child?
Risky behaviors - Do you set rules and monitor risky behaviors such as the use
of alcohol and drugs?
Content of media - Do you set rules about what your child is allowed to watch
on TV or at the movies?
16
+
Safety Rules
∧
Acceptable places – Do you have clear, specific rules governing what types
of websites your child can visit?
Friends & strangers – Do you have clear rules about whom your child can email, text message, or send instant messages to?
Activities – Have you set a clear expectation that your children should never
communicate online with someone they don’t know in real life?
Visitors -
Do you know all the people in your child’s online address book or friends list
on their social network page?
Curfew - Do you limit the time of day and the amount of time your child is allowed to use
the computer?
Risky behaviors - Do you monitor your child's online activities?
Content of media- Do you know how to use parental control on your Computer
of Phone
17
+
Cyberbulling
Definition: Cyberbullying is the use of technology for harassment,
impersonation, denigration, trickery, exclusion and stalking.
Cyberbullies may use email, chat rooms, discussion forums, instant
messaging, text messaging or social networking sites.
Over 80 percent of teens use a cell phone regularly, making it the
most popular form of technology and a common medium for cyber
bullying
42% of kids have been bullied while online. 1 in 4 have had it
happen more than once.
Headline news provides opportunities for discussion and
“teachable moments”
“If I tell someone about bullying, it will just make it worse.”
Research shows that bullying will stop when peers or adults get
involved.
18
+ Combating Cyberbulling
Never share passwords
Never participate in cyberbullying or respond to meet with a cyberbully.
Block the bully
Collect evidence - Save proof of the harassment like e-mail messages,
screen shots, IM logs, blogs, etc.
Report the activity and tell a trusted adult who can:
File a complaint with the Internet Service Provider or send an email to
the host of the web site where the abuse was posted.
Contact the cyberbully’s parents. Contact an attorney or file a small
claims action.
A number of young persons have committed suicide following cruel
cyberbullying attacks.
19
+
Social Networking
Definition: Social network sites (Facebook, MySpace and
Xanga) are services that use the Internet to create an
interactive network of photos, videos, web logs (blogs) and
groups.
Youth are no longer restricted to playgrounds, sport teams or
malls to meet new people. Digital = Very Accessible
Posting a picture on Social Networking is like posting it on a
public bulletin board, that anyone can access and deface
Users share pictures, video, information, music, and
messages. Most are appropriate… Some are inappropriate!
“If Facebook was a Country it would be the 3rd Largest in the World,
between China and the US. Twitter would be Number 7th “
20
Privacy Settings for Facebook
Default
21
+
Social Network Safety
Do not add “friends” you do not know
Follow age restrictions
Use privacy settings to restrict access and review on a
frequent basis.
Limit personal information posted
Be a “friend”—Monitor your friend and youth profile page from
time to time
Create an Awareness Program for Parents and Youth at least once a year.
Consider conducting this prior to summer break.
22
+
Texting / Sexting
Definition: Texting / Sexting is the use of technology for
harassment, impersonation, trickery, exclusion and stalking.
“80% of teens (12-17) carry mobile phones and One in Three teens (1319) use their phones to surf the web.”
23
+
Text Decoding
LOL
Brb
OMG
WYCM?
F2F
ROFL
24
+
Text Decoding
LOL – Laugh Out Loud
Brb – Be Right Back
OMG – Oh My Gosh
WYCM? - Will you call me?
F2F – Face to Face
ROFL – Rolling on the Floor Laughing
25
+
Text Decoding
LOL – Laugh Out Loud
PA / PAL / POS / P911
Brb – Be Right Back
NIFOC
OMG – Oh My Gosh
LMIRL
WYCM? - Will you call me?
AITR
F2F – Face to Face
WRN
ROFL – Rolling on the Floor Laughing
53x
WTGP
420
143
KPC
26
+
Text Decoding
LOL – Laugh Out Loud
PA / PAL / POS / P911
Parent Alert Parents are Listening,
Parents over Shoulder, Parent alert
Brb – Be Right Back
OMG – Oh My Gosh
NIFOC- Naked in Front of Computer
WYCM? - Will you call me?
LMIRL - Let’s meet in real life
F2F – Face to Face
AITR – Adult In The Room
ROFL – Rolling on the Floor Laughing
WRN – What’s your real name
53x- Sex
WTGP – Want to go private?
420 – Marijuana
143 – I Love You
KPC – Keep Parents Clueless
27
+ Example - Sexting
A Young girl (under 18 years old) is asked to send a photo of herself,
either nude or partially-nude to a potential boyfriend. She takes the
photos and sends them to him. He receives them and keeps them on
his phone or computer. He also promises not to show the photos to
anyone else. After all that’s the only reason she made the photos and
sent them to him.
The two date for awhile and then one of them decides to break-up. The
now former-boyfriend out of spite or showing-off, sends the photos
onto his friends, her friends and/or her family.
28
+ Example - Sexting
The police are called when someone makes a complaint. Often times the
young girl, a school official or parent file a complaint because the
harassment will not stop and the pictures are circulating to people she
never thought would see them. Now this is a Police Investigation…
A Young girl (under 18 years old) is asked to send a photo of herself,
either nude or partially-nude to a potential boyfriend. (Solicitation)
She takes the photos and sends them to him. (Creation and
Distribution) He receives them and keeps them on his phone or
computer. (Possession) He also promises not to show the photos to
anyone else. After all that’s the only reason she made the photos and
sent them to him.
The two date for awhile and then one of them decides to break-up. The
now former-boyfriend out of spite or showing-off, sends the photos
onto his friends, her friends and/or her family. (Distribution)
20 Year Prison, Felony and SOR - Solicitation of Sexually Explicit Material
Up to
20 Year Prison, Felony and SOR- Creation of Sexually Explicit Material
7 Year Prison and SOR- Distribution of Sexually Explicit Material
4 Year Prison and SOR - Possession of Sexually Explicit Material
29
SOR = Sex Offender Registry
+
Take Away Texting / Sexting
Build Awareness of the Risk with your Youth and Parents
Recognize change in behavior
Today’s child pornography laws were meant to prosecute
sexual predators, not teens doing something stupid.
30
+
Identity Theft
Definition: Identity theft is a form of fraud of cheating of another
person’s identity in which someone pretends to be someone else
by assuming that person’s identity.
Identity Stolen via Dumpster Diving
Identity Stolen via Phishing
Identity Stolen via Stealing
“Forty percent of victims don’t realize someone has stolen their
identity until six months after the initial theft.”
31
+
Identity Theft Safety
Make sure all computers are up to date with the latest
software. e.g. virius, spy bot
How well is your congregation data protected?
Consider installing a disk encryption on systems that hold
personal information.
Never give personal information via e-mail.
Understanding that Phishing are getting creative each and
everyday to try and capture your personal information.
Review your credit report on a yearly basis.
32
+
Overwhelm!?!
Remind people “Why”
Baptismal, Scripture and Trying to Make everyone Safe
Establish a local child protection policy, review frequently.
Create Awareness of the Risk & Rewards of using technology. Used
wrong it will Damage Your Future!
University Admission Officers, Recruiters, In-Laws, Potential Employers
Watch how much personal information you posted on-line.
Continuously monitor the changes being made privacy settings with
Social Networking.
GPS Location / Context-Aware – Phone Applications have in the fine
print that your agreeing to have your location shared when you access
the application WiFi Coverage.
33
+
Thank You
[email protected]
Mobile 248-444-0187
34
+
Appendix
35
+
Acknowledgements
Paul O’Briant – CyberSaftey for Families
Child Protection Committee, Flint UMC District Office
Ministries with Youth, Dunwoody UMC
“What do these numbers Mean?” Jessica R Cooper Oakland
County Prosecutor
Website Referenced
connectsafely.org
ESRB.org
Churchsafety.com
Netsmartz.org
36
+
1.
2.
3.
4.
5.
6.
Ten Things Parents Can Do
Talk with your children about their online activities and the risks and ethical
responsibilities of surfing the Web. Tell them you have a responsibility to
monitor their Internet use and that you will.
Keep the computer in a common room in your home and set time limits for its
use.
Make sure your child knows never to divulge personal information as they
surf the Internet.
Set rules as to what sites your children are allowed to visit and which ones
they are not.
Tell your children to let you know immediately if a stranger tries to make
contact with them on the Web.
Install an operating system that makes you the administrator of the family
computer, enabling you to control Web browser settings, content that can be
viewed online, and software that can be installed. Consider installing thirdparty filtering software (CYBERPatrol, CYBERSitter).
37
+
7.
8.
9.
10.
Ten Things Parents Can Do
Insist your children give you their e-mail and chat room passwords. Prohibit
them from having multiple e-mail accounts.
Make sure your children know what online activities are against the law.
Illegal activities include making threats against someone else online, hacking,
downloading pirated software, creating bootlegged software, sharing music
files online and (for children under 18) making purchases over the Internet.
Go online with your kids and find out who they send Instant Messages to
and/or chat with. Do not allow your children to send Instant Messages during
homework-related computer time.
Regularly scan the files on your family computer to see what kind of material
your children have downloaded and whether it was obtained legally.
38
+
“Just Talking”
is different with Youth today…
Cell phones
Chat rooms
Texting
Message boards
E-mail
Webcam
Instant Messaging (IM)
Videogames
Skype (Internet visual
telephone)
39
44