Washington Schools Risk Management Pool Protecting Children From Sexual Misconduct of Employees November 30, 2010 Presentation and Materials By Patterson.

Slides:



Advertisements
Similar presentations
Keeping Our Children Safe from Sexual Abuse. HB 1041 This bill requires districts to adopt and implement a policy addressing sexual abuse of children,
Advertisements

Decree on Child Protection Revised 2014 Diocese of Steubenville.
for staff in their interactions with children and young people
An introduction to Child Protection and Safeguarding
Internet Safety in Henry County Schools By the division’s Internet Safety Task Force.
SUBSTITUTE TRAINING SCHOOL YEAR Mendham Township School District.
Child Protection Training
Sex Offender Registration and Community Notification Meeting The purpose of community notification is to provide information to protect you and your family,
CYBERSAFETY Acting Sergeant Kate Brown Christchurch Police Youth Education.
Bullying, Harassment, and Cyberbullying in Schools Definitions, Issues, and Strategies September 2013 ©Vermont Human Rights Commission.
The Dignity Act SHS presentation. Effective July 1, 2012 Intent to provide a school environment free from discrimination and harassment for all students.
Successful Solutions Professional Development LLC A Basic Approach to Child Safety Chapter 4 Mandated Reporting Law.
Safer Recruitment & Managing Allegations Training Pack for whole-school use Last updated: June 2012.
School-wide Bullying Prevention A Guidance Services Presentation.
OCT Professional Advisory Professional Misconduct Related to Sexual Abuse and Sexual Misconduct.
Management and Operational Practices Addressing Staff Sexual Misconduct with Offenders March 2006.
FERPA Overview for CANR Business Managers Rob Kent, MSU Assistant General Counsel October 7, 2014.
Bullying How To Recognize & Prevent it From Happening To Your Child Before It Is Too Late Target audience: Parents of bullies.
Grooming: what parents should know
VOLUNTEER TRAINING HOLLY SPRINGS ELEMENTARY SCHOOL STEM ACADEMY VOLUNTEER TRAINING 1.
PROFESSIONAL BOUNDARIES
Risk Management in Youth Development Programs January 16, 2013.
Internet Safety Part II CyberBullying. Judson Independent School District … strives to provide a safe, positive learning environment for students in our.
INVESTIGATIONS IN THE SCHOOL YARD A presentation on behalf of CANFIELD JERRY MOBERG & ASSOCIATES (The Thrilla in Manila)
SEX OFFENDERS AND VICTIMIZATION IN OUR COMMUNITY Awareness, Support and Prevention San Diego County Sex Offender Management Council
Bullying and Cyberbullying Presented By Principal: Dr. Brook Reynolds Counselor: Phuong An TOSA: Danae Popovich.
©2003 PACER WIFACETS Wisconsin Family Assistance Center for Education, Training & Support, Inc. (WIFACETS) Presents: Is Your Child a Target of Bullying?
Electronic Use Policies.   Social Media  Internet.
VIOLENCE PREVENTION AND INTERVENTION PROGRAM (VPIP) TECHNIQUES TO PREVENT DATING VIOLENCE I. Indicators of Perpetrators and Victims of Dating Violence.
STANDARDS OF MINISTERIAL BEHAVIOR AND BOUNDARIES
Belvedere Middle School Annual Policy Review (April 2011)
Chesapeake Public Schools Field Trip Chaperone Guidelines and Orientation for Elementary Schools.
Atholton Elementary Parent Volunteers and Confidentiality Training
VOLUNTEER TRAINING Holly Springs Elementary School STEM Academy
Presented by Robin Castle, MA Child Sexual Abuse Prevention Manager The Strengthening Families Approach in Action : An Overview The Strengthening Families.
Child Maltreatment Arkansas Commission on Child Abuse, Rape and Domestic Violence.
BYOD: Bring Your Own Device
Online Safety Parent Workshop Helping to keep your children safe online.
Practical Approaches for Engaging Youth Serving Organizations and Schools in Child Sexual Abuse Prevention.
Dignity for All Students Act & Sexual Harassment Avoidance Annual Training.
Internet Information for Parents. Objectives The Realities Benefits Learn the language Identify concerns and risks Learn strategies to increase safety.
© 2008 i-SAFE Inc. an i-SAFE presentation. © 2008 i-SAFE Inc. Learning Goals YOU WILL: Understand that an online stranger is anyone met exclusively online.
ACT 168 UPDATE. This presentation is intended for informational purposes only and is not intended to provide legal advice. Agency personnel should consult.
Child Maltreatment Arkansas Commission on Child Abuse, Rape and Domestic Violence Jan
Unit Awareness of Protection and Safeguarding in Health and Social Care (adults and children and young people)
SEXUAL ABUSE SEXUAL ABUSE IS AN EPIDEMIC IN THE USA. NO ONE HAS THE RIGHT TO SEXUALLY ABUSE ANOTHER PERSON.
Pertaining to Teachers and Educators.  Misconduct is defined by the Webster as: unacceptable or improper behavior, esp. by an employee or professional.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
What Parents and Students Need to Know Presented by Joan Reubens Pinellas County Schools, Prevention Office or Protect with.
AnyName School Year 11 Tutor Time Child Sexual Exploitation – How can it happen?
Child Abuse Prevention EDU 153 Spring Policies for Child Abuse  Preventive Measures  Protective Measures.
District Updates  1. Crisis Go App  2. Bullying Refresher  3. Social Media Policy  4. Teacher Web Pages.
Data Privacy Request Janet Rash Intel Corporation Oregon Community Relations Manager October 3, 2008.
Bullying, Threats Sexual Harassment & Consequences Lincoln High School November 2012.
School Board Policy Draft Bullying and Harassment School Year
Digital Citizenship Grades 4-6
Ethics & Boundaries In the School Setting
Protecting children and disabled adults from abuse and neglect
Mandatory Child Abuse Reporting
Arkansas Commission on Child Abuse, Rape and Domestic Violence
Dating Violence and Abuse SRCSB Policy 5.325
Teaching Internet Safety
Mandatory Child Abuse Reporting
Harassment, Intimidation & Bullying The New Legislation FAQs
Kingsport City Schools
Mandatory Child Abuse Reporting
Responding to Disclosures of Abuse and Duty to Report
Mandated Reporting of Child Abuse and Neglect
VOLUNTEER TRAINING AVERY ELEMENTARY SCHOOL
Presentation transcript:

Washington Schools Risk Management Pool Protecting Children From Sexual Misconduct of Employees November 30, 2010 Presentation and Materials By Patterson Buchanan Fobes Leitch & Kalzer, Inc. P.S. Seattle (206)

Blind Spot in Protecting Children Boundary Invasions

Thesis School districts can prevent a vast majority of sexual misconduct by school employees against students by monitoring boundary invasions against students, and prohibiting inappropriate boundary invasions. 3

The The Scope of the Problem Sexual Abuse 4

Occurrence of Sexual Abuse of Children 1 in 4 women 1 in 6 Men 1979 and 1984 studies 5

Different Patterns Above and Below 7 th Grade Below 7th: Educators who target elementary school children are often professionally accomplished and even celebrated. Above 7 th : Late middle and high school educator abusers may or may not be outstanding practitioners. 6

7 Initial acts are somewhat less premeditated and often are: Opportunistic, a result of bad judgment, or a misplaced sense of privilege. Source: Shakeshaft, 2004

“ Successive Approximation ” Used With the student: The student becomes used to increasingly more intrusive boundary invasions which eventually become sexual in nature. I.e., boundary invasions come to seem “normal” with the particular adult. With other adults: Other adults come to see the boundary invasions as normal for the teacher/employee but do not see the boundary invasions which are sexual in nature. 8

Sexual Grooming in a nutshell: Boundary invasions which become increasingly more invasive and then sexual. They can not be called sexual grooming in the earlier stages, because there may not be anything verifiably sexual about them. They are nonetheless identifiable as “boundary invasions.” 9

Is there a Problem in the Schools 9.6% of students are targets of educator sexual misconduct during their school career. American Association of University Women 10

Educator sexual offenders are: Teachers 18% Coach 15% Sub. Teachers 13% Bus Drivers 12% Aides 11% Other 10% Security Gd. 10% Principal 6% Counselor 5% 11

The “Typical Situation”  Age of offender = Any age  Offender Gender = Male or Female  Age of victims = Any age  Victim Gender = Male or female In other words, leave all preconceived notions behind you. There is no “typical situation.” 12

Educator sexual offenders often are: Well-liked and considered excellent teachers Trusted by parents and staff Adults who have access to students before or after school or in private situations (e.g., coaches, music teachers.) Work with vulnerable students. 13

Examples of Boundary Invasions which could be potential Sexual Grooming:  Working with an individual student behind a closed door.  Touching children when there is no educational reason to do so.  Flirting with students.  Off-color remarks to students.  Giving a student rides alone.  Frequent socializing with a student at school.  Getting a student out of other classes to see the teacher. 14

Boundary Invasions, cont’d: Socializing with the student away from school. Inviting students to the teacher’s home. More than normal individual attention given to a particular student. Frequent s or texting to a child for non-educational reasons. Using to do any of the above. Electronic social networking. Any combination of the above. 15

Other Red Flags An adult often engaging in “peer-like” behavior with students. A teacher who asks students to keep secrets. 16

In Essence, Grooming Is Based Upon: Having a “Special Relationship” with a student. Socializing with the student »Away from school. »After school hours. »Electronically. Often the student: »Has problems at home. »Is in need of adult attention. 17

Grooming of adults-- Often the teacher becomes known as someone: Who deeply cares about students. So that focusing on a student seems not unusual. Who makes extra-special efforts to help kids. So that being with a student at odd hours seems less odd. 18

How Perpetrators Groom Victims with Boundary Invasions  General familiarity with all students to learn which students will let the perpetrator get away with touching.  Increasing the touching and the familiarity with the individual student so that the student comes to accept it as normal.  The touching can be actual or electronic.  Creating a special relationship. 19

Perpetrators, cont’d  Having secrets with the student, testing the student’s reliability.  Telling the student, “It’s our secret.”  Helping the student blame him or herself.  Threatening the student if the student tells. 20

Perpetrators, cont’d Who would never be suspected of misconduct. So that access to students is freely given. Who is just a “touchy,” “hugging” kind of person. So that rumors of touchy-feely may be discounted. 21

Other Risk Indicators The same student as teaching assistant Personal problems Financial problems Being “too familiar” with students in general Physical environment of classroom in chaos Drug or alcohol problems Working with students at odd hours Sometimes general intimidation “Peer-like” behavior 22

Inappropriate Boundary Invasions Any boundary invasion which does not have a bona fide, legitimate educational, safety, or health reason is inappropriate in the schools. Beware of people offering pretextual excuses of educational, safety, or health reasons. 23

What Is Inappropriate? Impossible to describe in every situation. Depends on the totality of the situation. Experienced educators would know something appears inappropriate. Anything which goes against generally recognized professional practices. 24

To Avoid Allegations of Misconduct –Recommendations to Educators Re Communications with students: s: Do not use personal accounts Text messages: Avoid Phone calls: Avoid making personal cell phone calls MySpace/Facebook: Avoid student’s MySpace, etc.; set your own to private Classroom alone: Door open 25

The Electronic Touching 26

What is Social Networking? An online community of people who share interests and/or activities, or who are interested in exploring the interests and activities of others. Most social network services are web-based and provide a variety of ways for users to interact, such as and instant messaging services. 27

Common Electronic Touching of Students Tools Wikopedia lists 142 major active social networking websites including: –Facebook –MySpace –Twitter –Linkedin –You Tube –Flickr –Blogspot, etc. 28

Distinctions Considered On-Line Instruction Not private Valid and obvious instructional and educational purpose Pre-Approved by the school and part of the planned instructional methodology Parents are aware School can monitor Social Networking Private Social in nature Loose connection to school, if connected at all Often done without others knowing Often wouldn’t be allowed if the telephone was being used instead 29

Social Networking -- The Telephone Test Communications with students should be of a professional nature. If it would be odd or inappropriate to communicate the same things by telephone, it is inappropriate electronically too. 30

Social Networking – Personal Social Needs Test Communications with students should be of a professional nature. Employees should understand their role of being the adult in the relationship with students. Students are never their “peers.” Employees should not use students to meet their own social needs. If they are, someone should stop them. 31

Bottom Line with Employee Social Networking with Students It is suspect behavior which should be –Prohibited in policies and training, –Investigated when it occurs, –Eradicated from schools, and –For which appropriate discipline should take place. 32

On-Line Instruction Rules Text-message students only in rare emergency like situations, never routine situations. Text-messaging should not be done to mentor or for any social purposes; Only done through the District access to the internet (no private accounts); Ideally through the school website and thereby open to administrative supervision; 33

On-Line Instruction, cont’d Such communications would be approved ahead of time by administration; Transparent, in that parents and administration may review if they want; Parents are notified ahead of time that such on-line instruction is taking place so that they can take steps to monitor if they want). 34

Our Theme, Again By stopping inappropriate boundary invasions by school employees with students, You also stop most employee sexual misconduct with students. 35

SCHOOL EMPLOYEE MANDATORY REPORTING DUTIES 36

Summary of Reporting Duties 1.RCW (General Child Abuse Reporting) 2.RCW 28A (Reporting Abuse by Employees to Appropriate Administrator) 3.RCW 28A (Reporting Abuse to the Parent) 4.RCW 28A (Sexual Misconduct References) 5. WAC (Supt. Report to OSPI) 37

School employee in course and scope of employment Determines there is reasonable cause to believe that child abuse has occurred Must immediately report to CPS or police Must then report in writing within 48 hours 1-Mandatory Child Abuse Reporting Duty (RCW )

If a school employee –has reasonable cause to believe a student has been physically or sexually abused, –OR has been the victim of sexual misconduct of another school employee The employee must report such abuse/misconduct to the appropriate school administrator. 2- Special School Staff Reporting Duty (RCW 28A (1))

3-Duty to Report to Parents (RCW 28A ) Inform parents at the first opportunity, and no later than 48 hours Of receiving a report alleging sexual misconduct by a school employee where the parent’s child is the alleged victim. Provide parents annually with information on how to obtain employee discipline documentation through the Public Records Act. 40

4- Sexual Misconduct References (RCW 28A ) Hiring district must check with prior districts. Prior districts disclosure if there is “sexual misconduct material.” No agreements with certificated employees to cover up sexual misconduct. 41

5- Superintendent’s Report to OSPI (WAC ) When the superintendent has sufficient reliable information to believe that An employee is not of good moral character or personally fit or has committed an act of unprofessional conduct, The superintendent must report the employee to OSPI’s Office of Professional Practices. 42