720 likes | 1.37k Views
Athens First United Methodist Church Safe Sanctuaries Training. Creating Safe Sanctuaries in the North Georgia Conference of the United Methodist Church. Welcome to Safe Sanctuary training!. We are grateful for your time and cooperation in becoming safe sanctuary certified.
E N D
Athens First United Methodist ChurchSafe Sanctuaries Training Creating Safe Sanctuaries in the North Georgia Conference of the United Methodist Church
Welcome to Safe Sanctuary training! • We are grateful for your time and cooperation in becoming safe sanctuary certified. • There are 6 sections in this training module. Following each section is a brief quiz. Please answer the questions. • If you are correct, you can more forward in the module. • If you are incorrect, you will be directed back to the page with the correct information. • At the end of the training, there is a link that takes you to a signature form. Please sign your name. Let’s begin!
Why must we implement Safe Sanctuaries? • It is required of us: • By the General Conference mandate of 1996, 2000, 2004, and Paragraph 256 in the 2008 Book of Discipline • For the protection of our children, youth, and vulnerable adults • For the protection of all workers, paid or volunteer, who work with our children, youth, and vulnerable adults
Why must we implement Safe Sanctuaries? It is required of us: • Our Baptismal Vow and Covenant • “with God’s help to so order our lives after the example of Christ, that we will surround each baptized person with steadfast love, so that they may be established in the faith, and confirmed and strengthened in the way that leads to life eternal.” • Scripture • “Jesus said, "Let the little children come to me, and do not hinder them, for the kingdom of heaven belongs to such as these.“ Matthew 19:14
Why must we implement Safe Sanctuaries? • By putting safety first, we… • Support workers in case of false allegation of abuse • Deter predators • Prevent the loss of the good reputation of the church • Prevent the loss of money in victim judgments and legal fees
Why must we implement Safe Sanctuaries? • Churches are at risk because they… • Are trusting organizations • Are typically unaware of the facts about the prevalence of abuse in our own community • Provide easy access to children, youth, and adults who can not make sound judgments. • May not screen workers as other agencies do. • May not do enough training concerning appropriate interpersonal boundaries.
Why must we implement Safe Sanctuaries? • To create Safe Sanctuaries, each church can… • Establish and maintain a Safe Sanctuary policy • Create and implement the Safe Sanctuary policy and procedures that work best for your church with the help of ministerial staff, trustee reps, finance committee reps, SPR reps, educators, and lawyers • Train all workers (paid and volunteer) • Have a reporting strategy in case of accident, incident, or suspected abuse
Let’s review! Please answer the following review questions regarding the information you just received.
Why must we implement Safe Sanctuaries? • Which of the following is not a reason why the United Methodist Church creates and implements Safe Sanctuaries? • a. We are paid to do so • b. The General Conference mandate of 1996, 2000, and 2004 • c. Our Baptismal Covenant • d. For the protection of all workers, children, youth, and vulnerable adults
CORRECT! Please Move on to the next slide
Why must we implement Safe Sanctuaries? • Why are churches at risk? (select any that apply) • a. They are trusting • b. They educate their workers on appropriate interpersonal boundaries • c. They are ignorant of the facts about the prevalence of abuse in our own community • d. They do not screen workers as other agencies do
CORRECT! Please Move on to the next slide
Let’s get educated! • Definitions • Children—Birth through age 12 • Youth—Age 13 through age 18 (in high school) • Vulnerable Adult • A person age 18 (not in high school) or older who is mentally, physically, or psychologically challenged and is unable to make responsible legal decisions about his or her own welfare • Elderly, defined as 65 and older
Let’s get educated! • The Numbers Regarding Child Abuse Source: Childhelp.org • 1 in 4 girls will be abused • 1 in 6 boys will be abused • Only 1 in 10 tell someone • 93% are abused by someone they know, trust, and love. • A report of abuse is made every 10 seconds • 5 children die each day from abuse and neglect • 2012 statistics from www.childhelp.org
Let’s get educated! • The Numbers Regarding Child Abuse Source: Childhelp.org • 3 million cases of child abuse are reported each year - The actual number is usually higher than the reported cases. • The United States has one of the worst records among industrialized nations – losing on average between four and seven children every day to child abuse and neglect
Let’s get educated! • Profile of a Child Molester • Known by the victim 80% of the time • Generally between 20-30 years of age • 20% will abuse before the age of 18 • Often married with children • 1 in 4 offenders is a member of the individual’s family or one entrusted with the care of the person • About half are friends of the child or family • 2 out of 3 who are caught and punished will abuse again
Let’s get educated! • Types of Molesters • Preferential • Prefers sexual activity with children or youth and seeks out these victims • Situational • Takes advantage of a particular situation in order to sexually abuse
Let’s get educated! • Registered Sex Offenders • In the state of Georgia, there are 27, 108 total sex offenders including people that are from out of state and ones that are incarcerated • In our surrounding counties, there are 884 **Both of these numbers have risen in the last two years
Let’s review Please answer the following review questions regarding the information you just received.
Let’s get educated! • A child is defined as someone… • a. Birth through age 18 • b. Who is unable to make sound decisions for himself/herself • c. Birth through age 12
CORRECT! Please Move on to the next slide
Let’s get educated! • There is only one type of child molester, the preferential type, that prefers interaction with children or youth. • a. True • b. False
CORRECT! Please Move on to the next slide
Let’s get educated! • The cases of child abuse reported each year are... • a. Higher than the actual number of suspected cases • b. Lower than the actual number of suspected cases • c. The same as the number of suspected cases
CORRECT! Please Move on to the next slide
Your Obligation • Reporting Child Abuse—Georgia Law • The purpose of this law is to “provide protection of children whose health and welfare are adversely affected and further threatened by the conduct of those responsible for their care and protection.”
Your Obligation • Reporting Child Abuse—Mandated Reporters • As of July 2012, mandated reporters include any child service organization personnel. • Included are paid employees and volunteers • Failure to report child abuse is a misdemeanor. • Anyone making a report in good faith is immune from any civil or criminal liability.
Let’s review Please answer the following review questions regarding the information you just received.
Your Obligation • Only individuals who are paid staff members are considered mandated reporters by the Georgia Child Abuse Law. • a. True • b. False
CORRECT! Please Move on to the next slide
Types and Indicators of Abuse • It is important to remember that though a child, youth, or vulnerable adult may display one or even more symptoms of abuse, this does not necessarily mean abuse is occurring.
Types and Indicators of Abuse • Physical Abuse is the deliberate or intentional bodily harm of an individual…NON-ACCIDENTAL • Indicators of Physical Abuse • Hostility and aggression toward others • Destructive behavior toward self, others and/or property • Unexplainable fractures or bruises, particularly on upper arms or around wrists and ankles • Fearfulness of parents and/or other adults • Burns, facial injuries, head trauma
Types and Indicators of Abuse • Sexual Abuse is non-consensual sexual contact between child and adult, or between adults, such as fondling, intercourse, incest, pornographic exploitation, or exposure • Indicators of Sexual Abuse • Advanced sexual knowledge and/or behavior • Depression • Promiscuous behavior • Difficulty sitting or walking • Bruising/bleeding in vaginal or anal areas • Frequent headaches, extreme fatigue • Sexually transmitted diseases
Types and Indicators of Abuse • Emotional Abuse is the infliction of mental anguish by threat, intimidation or humiliation—spoken and/or unspoken. It also includes violence or emotional cruelty. • Indicators of Emotional Abuse • Depression and/or withdrawal • Lack of self-esteem • Threatens or attempts suicide • Speech and/or eating disorders • Extreme passive-aggressive behavior • Excessively seeks adult approval
Types and Indicators of Abuse • Neglect involves endangering an individual’s health, safety, or welfare • Indicators of Neglect • Failure to thrive—malnutrition • Inappropriate dress for climate • Chronic hunger • Depression • Untreated medical conditions • Poor hygiene—soiled clothing • Signs of being over- or under-medicated
Types and Indicators of Abuse • Financial Abuse/Exploitation is the unauthorized use of funds or property belonging to a vulnerable adult by force, misrepresentation, or illegal means • Indicators of Financial Abuse/Exploitation • Complaints of missing money • Financial caregiver is not open and trustworthy with family • Check book or home furnishing are missing
Let’s review Please answer the following review questions regarding the information you just received.
Types and Indicators of Abuse • One indicator of abuse in an individual guarantees that abuse is occurring. • a. True • b. False
CORRECT! Please Move on to the next slide
Types and Indicators of Abuse • Which of the following is not an indicator of physical abuse? • a. Hostility and aggression toward others • b. Burns, facial injuries, head trauma • c. Failure to thrive—malnutrition • d. Unexplainable fractures or bruises
CORRECT! Please Move on to the next slide
Types and Indicators of Abuse • Which of the following is not an indicator of emotional abuse? • a. Chronic hunger • b. Depression and/or withdrawal • c. Lack of self-esteem • d. Excessively seeks adult approval
CORRECT! Please Move on to the next slide
Procedures • Two Adult rule • Two unrelated, non-cohabitating adult leaders should be with children, youth, or vulnerable adults at all times. • Children should not be dropped off where there are not two adults present. • Adult Training • All adults will be at least 18 years of age and at least 5 years older than the children and youth being supervised • Secure background checks will take place every 3 years by Trak-1 Technologies. • Safe Sanctuaries training will take place every year – Covenant signed • First Aid and CPR training is recommended for paid staff and volunteers
Procedures • Windowed and Open Doors • Do not block windows • Leave interior doors open if possible • Nametags and/or Identifying Clothing • Wear nametags at all times and if appropriate, identifying clothing (Nursery, VBS, Music Camp, Preschool, etc)
Procedures • Age Appropriate Check in and Release • Children should be accompanied by adults at all times • Use KidCheck for children birth through age 18 • Drop off and pick up should be at the site of the activity, not just the church door • Siblings under the age of eighteen should not be responsible for drop off and pick up • Appropriate Touch • Examples include: side hugs, touch on shoulder, high five, handshake • A child older than 3 should not be sitting in anyone’s lap
Procedures • Parent/Guardian Permission • Children are not allowed to participate in any activities without parent/guardian permission • Website, Photos, and E-mails • Do not put a child’s photograph on Facebook or any other social medium without written permission from parents or guardians
Receive parental/guardian permission. In addition to general permission to participate in a church ministry, it is advisable to receive advance parental/legal guardian permission for children, youth and vulnerable adults in writing for: Posting photos of participants on any websites or sending them e-mail or cell phone messages or making videos for any use. E-mailing, Instant Messaging (IM’ing), calling, texting, or sending data to a child, youth, or vulnerable adult by computer, PDA, or cell phone (keep in mind "free" minutes and data plans vary tremendously even with the same carrier.) The sharing of any full name or contact information.
Never post easily identifiable information online If you communicate by e-mail, do not use “broadcast” e-mails. Use the “Bcc” option (blind carbon copy) so that each recipient sees only his or her address when a message is received. Be cautious when transmitting easily identifiable information like event dates, times, locations, or participants. Limit what is communicated in electronic prayer requests. When placing a child, youth, or vulnerable adult on an electronic prayer list, consider using only first names. If someone must know the last name or the mailing address of the individual, have her or him call the church office or a designated contact person.
Procedures • Diapering and Restroom Usage • Change diaper in a visible area • Help toddlers and preschoolers only when necessary and in an observable place • Check restrooms before children enter • No youth volunteers should be responsible for diapering and/or restroom usage during any church event • Discipline • Must be positive and planned • No physical discipline allowed • Find out what works best for each child in your care