The European Online Grooming Project_
|
|
|
- Job Strickland
- 10 years ago
- Views:
Transcription
1 The European Online Grooming Project_ Professor Julia Davidson Centre for Abuse & Trauma Studies, Kingston University, London. 5th International Conference Keeping Children and Young People Safe Online Warsaw, 20th-22nd September 2011
2 Presentation overview The European Online Grooming Project_ Project design Interview findings Young people online Safety, treatment & policy implications Next steps
3 European consortium UK Professor Julia Davidson, Kingston University Professor Antonia Bifulco, Kingston University Stephen Webster, National Centre for Social Research Belgium Professor Thierry Pham Italy Professor Vincenzo Caretti Norway Professor Petter Gottschalk
4 The European Online Grooming Project_ Largest study of online grooming to date Aims: to understand the different ways sexual offenders approach, communicate and groom young people online to empower policy makers, front line professionals, teachers, carers and young people to effectively manage online risks Funded by the EC SIP Running from June 2009 to December 2011
5 Scale of the Challenge 30 million US children used the Web in 2000 (Gottschalk, 2010); 2,660 incidents of inappropriate approaches and grooming reported by Centre for Exploited and Missing Children. UK data suggests approximately 1 in 5 young people receives a sexual solicitation or approach, with over two thirds unsupervised when using the Internet (Davidson & Martellozzo, 2008) CEOP data (11/2010) 6291 reports via the panic button in 2009, 66% related to online grooming. Increase in young people self-taken images in offender collections. CEOP Child Exploitation and Online Protection, UK
6 Research Context Evidence to date primarily focussed on indecent images (Seto & Eke 2005; O Brien & Webster 2007) Some studies report co-occurrence of contact sexual offences among indecent image offenders in prison or treatment (Wolak et al, 2005; Seto et al, 2006; Hernandez, 2000) but position not clear. We argue you cannot explain online grooming without understanding the offender computer young person interaction
7 Research Design Three interlinked research phases: Scoping interviews with stakeholders (police officers, treatment providers, industry specialists), analysis of police case-files and chatlogs ; development of theoretical model, literature review In-depth interviews with online groomers in the UK, Norway, & Belgium chat-logs from Italy Workshops with parents, teachers and young people Data analysed using Framework, case and theme based approach to analysis.
8 Online Groomers Findings
9 Sample Characteristics Convicted for grooming under UK and Norwegian legislation, identified through case files in Belgium, analysis of chatlogs in Italy. Mean age 35-44, all male offenders Majority above average IQ score (110+) Majority had indecent child images and had met the child Approximately 50% had access to a child Majority had no previous convictions Approximately 70% of the victims were aged Vast majority of the victims were female
10 Who are online groomers? Like contact sexual offenders not a homogeneous group. Where they do seem to differ: high IQ but not a particularly high level of educational attainment IT competence seems to be primarily self taught, via workplace, observing family and online research Using full range of ICT hardware, chatrooms, social networking sites, file-sharing sites and game platforms to contact young people
11 The role of the Internet Victim scope, choice & access plenty of fish in the sea, you ll catch one eventually Addiction Tense if not online 7 hour per day chat Need to collect and classify more images Justification I m not hurting them, its just chat Everyone else is doing it File-sharing sites advertise indecent image Disinhibition Confidence Anonymity (on both sides) Gaining friends Normalising explicit sexual conduct Escalation Movement from images to webcams Images helped make real what was going on in my head
12 Grooming Features Vulnerability Situational Interpersonal Scanning Mapping Random Virtual presentation Identity Self Minor changes Other I never used my own identity, you changes names, you lay it on Contact Single & multiple encounters Varied timescale Diverse styles Desensitisation & Intensity Sex request You test them by saying are you this or that, if she s receptive you can go further Incentives Threats Outcomes Collect image Meet young person
13 Online Grooming: Preparation & Identity Preparation & Scanning I d always aim for someone with a sexy name because obviously, they d be into sex. I took time to learn about their lives and it was important to them. Then the common denominator became sex. Identity told to piss off by YP when presented as self. Changed profile to that of 17yr old lad-----stole picture of a lad and used that Sometimes it was trial and error. All real contact happened when I presented as a boy age Would then switch to real identity after built up a rapport (so never a problem). Then could start using webcams.
14 Online Grooming: Initial Contact & Risk Management Initial Contact When first met a new contact would write everything down, the fact about her, a kind of log. I could then keep track, especially when I was communicating with so many at the same time I d get on their side and talk about music. So I was well up-to-date with all the teen, the chart stuff. So I knew all the names --- and groups and songs, and that was always a, a good progression. Risk Management basically what I d do if, if they wanted proof of how old I was, if I had a webcam I d click on it to connect and when it started to connect, I went [clicks fingers], switched it off. So, as if it was playing up. gave phone number when trusted or knew the young person. I d always just block out my number as well, obviously, so it didn t show up on theirs.
15 Online Grooming: Networking spoke to another sexual offender online for three months. Exchanged images and gave him things from the girls he was talking to. Came across other men. They said there were enough fish so you will find someone in the end.
16 Classifying online offenders Distorted Relationship Believe in mutual consent/love No images or network contact Longer contact process Own identity Physical meeting Ongoing abuse/multiole meetings Adaptable Offender Believe in own need and mature YP Minimal image collections, if any Tailored contact process to victim Own & tailored identities Hyper-Sexual Dehumanise YP Extensive image collections Extensive contact with other offenders Tailored/sexual identity Impersonal contact methods
17 Young People Online
18 Victims The project was focused on interviewing online groomers only. There was no direct contact with victims. Themes were included in the offender topic guide on the age and choice of victims, type of grooming approach, and victims response Although not a statistically drawn sample, the victims described by the online groomers in this research tended to be teenagers
19 Resilient Young People Evidence of safety messages getting through as offenders told by most to go away in no uncertain terms. It was not easy as young girls had been taught not to talk to guy s age 20 When presented own identity, was told piss off you nonce.
20 Victims: Research evidence Vulnerable young people high need for affection, attention, have difficult relationships with parents and difficult home lives. Seeking love on the internet. Believe they have a true relationship. Resist disclosure because want to continue the relationship. Risk-taking young people seeking adventure, disinhibited, feel in control. Less known about family risks. Open to blackmail not to disclose because their own behaviour is used as evidence by groomer of cooperation or seduction. Resilient young people fend off any approach they consider weird. Take on board safety messages. Come from more secure family backgrounds. Palmer, 2006, Davidson & Martelozzo, 2008
21 Vulnerability Dimensions: 1 Loneliness The girls were definitely insecure and lonely. Many of the girls lacked adult contact.they felt safe with me.. I always made time Self-harm Discussed by the young person and observed by the offender at physical meeting Self-esteem Young people feeling concerned about their body image and the groomer can exploit this mirroring compliments Concurrent sexual abuse She wanted attention in her life, she said she had lost her mum and her stepdad abused her. They had no hang ups- these were girls already being abused
22 Vulnerability Dimensions: 2 Offender adept at meeting these needs to the extent that they perceive the young person is in control of the encounter: She began to pester me to go online and talk to her She could walk away from me at any time and she new this They would ask me, they re re so convinced they re adults, in the end, who s the victim?
23 Disinhibited Online Risk-Takers Victim disinhibition involved using sexual screen names; using sexual chat; populating adult chat rooms; sending explicit images of self. Online groomers describe watching for and drawn to this behaviour: she said I d love to shag an older guy However, online confidence did not always mirror offline reality: she was really quiet when met, even after a few meetings she never really said anything she presented as womanly and mature but when we met I knew it was just a mask
24 Implications
25 Implications for Online Safety & Industry Consider online disinhibition in context of safety campaigns for YP, should there be a more targeted approach for vulnerable? Why are some YP more resilient, less likely to interact? Industry should work more proactively to raise awareness with young people, parents and educators. Appropriate online behaviour, ethical use, digital footprint level 1 images in offender collections. Consider how SNS might design out offender behaviour (grooming, networking, indecent image sharing). Is more specialist monitoring possible? Issue of harm in context of offender approach- all YP harmed at some level.
26 Public Health Problem Minimal contact Degree of harm to child offender meeting Tailored safety Programmes-Risk of victimisation Secure online environments Managing Online Grooming Collaborative approach: Education, criminal Justice, social work, NGOs, charities policy Awareness for parents & educators Offender Behaviour, Risk & Intervention
27 Next steps for the project Focus groups with young people around Europe Dissemination workshops with teachers and parents Final report December 2011 Comparison with EC SIP ROBERT victim data Publications- book & articles 2012
28 Further information Contact:
Julia Davidson, PhD Professor of Criminology, Kingston University Safer Internet. Pl Keeping Children & Young People Safe Online, 3 rd International
Julia Davidson, PhD Professor of Criminology, Kingston University Safer Internet. Pl Keeping Children & Young People Safe Online, 3 rd International Conference, Warsaw, 29-30 September 2009 1. Context
Online grooming: What changes with the new legislation?
Online grooming: What changes with the new legislation? The use of new technologies has considerably increased in recent years, particularly among young people. In Belgium, 96% of children between 12 to
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
Speaker notes from Indigo Daya at the Borderline Personality Disorder What Works Conference, 2014.
Speaker notes from Indigo Daya at the Borderline Personality Disorder What Works Conference, 2014. 1 Talking about trauma can be difficult for everyone. The existence and scale of traumatic events can
Affirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
Assessing capacity to consent and to give evidence
Assessing capacity to consent and to give evidence Dr Theresa Joyce Estia Centre; South London & Maudsley NHS Trust, London, UK This presentation will consider 4 topics Assessing capacity to consent to
E-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
Education Committee inquiry into PSHE and SRE in schools. Written evidence submitted by Childnet International
Education Committee inquiry into PSHE and SRE in schools Written evidence submitted by Childnet International Executive Summary 1. As a children s internet safety charity we have been pleased to see the
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
Online Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
CEOP Relationship Management Strategy
Making every child child matter matter... everywhere... everywhere CEOP Relationship Management Strategy Breaking down the barriers to understanding child sexual exploitation Child Exploitation and Online
Journeys through the Criminal Justice System for Suspects, Accused and Offenders with Learning Disabilities. A Graphic Representation
Journeys through the Criminal Justice System for Suspects, Accused and Offenders with Learning Disabilities A Graphic Representation 0 Contents Introduction page 2 Methodology page 4 Stage One Getting
Digital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
Research to Practice Series
Institute of Child Protection Studies 2 Identity and meaning in the lives of vulnerable young people The Institute of Child Protection Studies links the findings of research undertaken by the Institute
SOCIAL WORK PRACTICE AND DOMESTIC VIOLENCE
SOCIAL WORK PRACTICE AND DOMESTIC VIOLENCE Working with Children and Families Mary Kate Barry, IASW 2015 How are you? Grand Ask me In the hospital Please ask me In the clinic In the church Ask me, ask
Internet Safety Guide for Parents
Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both
REDUCING SEXUAL RISK Lesson 1
REDUCING SEXUAL RISK Lesson 1 GRADE 9 LEARNER OUTCOME 1 W-9.14: Develop strategies that address factors to prevent or reduce sexual risk; e.g., abstain from drugs and alcohol, date in groups, use assertive
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
Online Abuse: Literature Review and Policy Context
Online Abuse: Literature Review and Policy Context Julia Davidson, Julie Grove-Hills, Antonia Bifulco, Petter Gottschalk, Vincenzo Caretti, Thierry Pham, Stephen Webster Prepared for the European Commission
How To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
Child Pornography Offender Characteristics and Risk to Reoffend. Michael C. Seto, Ph.D., C.Psych. Royal Ottawa Health Care Group
Seto 1 Child Pornography Offender Characteristics and Risk to Reoffend Michael C. Seto, Ph.D., C.Psych. Royal Ottawa Health Care Group Prepared for the United States Sentencing Commission Draft dated February
Outsmarting On-line Predators. Christina Kilbourne
Outsmarting On-line Predators Christina Kilbourne Some Surprising Stats 26% believe their parents would be concerned if they knew what they were doing on-line over half have given out personal information
Social Networking Sites like Facebook, MSN
Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and
Listening and learning: improving support for victims in London
Listening and learning: improving support for victims in London Introduction: The report was researched and written by the victims services advocates (VSA) project. The VSA project was commissioned by
Internet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
Victims of crime: Understanding the support you can expect
Victims of crime: Understanding the support you can expect If you have been a victim of crime, you are entitled to certain information and support from criminal justice organisations such as the police
Cyber Crime ACC Crime
AGENDA ITEM 10 STRATEGIC POLICING AND CRIME BOARD 3 rd December 2013 Cyber Crime ACC Crime PURPOSE OF REPORT 1. The purpose of this report is to provide members of the Strategic Police and Crime Board
Council of Europe campaign to stop sexual violence against children
www.coe.int/oneinfive 28 April 2012 Council of Europe campaign to stop sexual violence against children 1. Getting the picture: Sexual violence is a complex, sensitive and alarmingly widespread problem
14/11/2014. Overview of violence and abuse in young people's relationships and peer groups. Identification and assessment
Overview of violence and abuse in young people's relationships and peer groups Carlene Firmin MBE Head of the MsUnderstood Partnership George Curtis Pan-London Programme Manager Identification and assessment
SCHOOL ONLINE SAFETY SELF REVIEW TOOL
SCHOOL ONLINE SAFETY SELF REVIEW TOOL UPDATED February 2016 The South West Grid for Learning, Belvedere House, Woodwater Park, Pynes Hill, Exeter, EX2 5WS. Tel: 0844 381 4772 Email: [email protected]
the criminal justice system and child sex offences
Your children, Your rights a series of legal guides for parents of children who have been sexually abused CHILDREN AND THE LAW the criminal justice system and child sex offences Experiencing and reporting
REPORTING AN OFFENCE TO THE POLICE: A GUIDE TO CRIMINAL INVESTIGATIONS
REPORTING AN OFFENCE TO THE POLICE: A GUIDE TO CRIMINAL INVESTIGATIONS If you are experiencing or have experienced domestic volence and/or sexual violence there are a number of ways the law can protect
Working with Youth to Develop Critical Thinking Skills On Sexual Violence and Dating Violence: Three Suggested Classroom Activities
Working with Youth to Develop Critical Thinking Skills On Sexual Violence and Dating Violence: Three Suggested Classroom Activities The Southern Arizona Center Against Sexual Assault s Rape Prevention
CHILD SEXUAL EXPLOITATION LISA RUTTER DEVON YOUTH SERVICE (CHAIR MACSE)
CHILD SEXUAL EXPLOITATION LISA RUTTER DEVON YOUTH SERVICE (CHAIR MACSE) PUBLIC : MEDIA : SOCIAL NORMS CSE is child abuse and is a crime The victims are children however they present themselves Definition
September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9
Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of
Your duties as a registrant. Standards of conduct, performance and ethics
Your duties as a registrant Standards of conduct, performance and ethics Contents Foreword 1 Introduction 3 The standards of conduct, performance and ethics 8 Fitness to practise 15 Glossary 16 Foreword
Disclosure Scheme. The Domestic Violence. Keeping People Safe from Domestic Violence
The Domestic Violence Disclosure Scheme Keeping People Safe from Domestic Violence This leaflet is for you if you are in a relationship and you are worried that your partner may have been abusive in the
The Victims Code: Young victims of crime: Understanding the support you should get
The Victims Code: Young victims of crime: Understanding the support you should get If you re a victim of crime, support and information is available to help you get through it. The Victims Code is a Government
Reporting the crime to the police
Section 4 Reporting the crime to the police Why report the crime to the police? It is your choice whether you report the crime to the police. Some people choose not to report or may not report straight
Social Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
Guidelines for Preventing and Dealing with Bullying Issues
Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.
Comments made online may be misinterpreted by both receivers and third-parties, which may affect the determination of prevalence of cyberbullying.
Chapter 7 summaries Cyberbullying definitions and prevalence Many definitions have been offered for cyberbullying. Several of these definitions explicitly or implicitly indicate that the bullying behaviour
What s Going On to safeguard children and young people from sexual exploitation? : A data monitoring Tool
What s Going On to safeguard children and young people from sexual exploitation? : A data monitoring Tool Introduction In 2009 the government published guidance on Safeguarding children and young people
Common Facebook issues
Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young
Duty to report. However, duty-to-report is not well understood in terms of student safety in digital contexts.
Duty to report Case study, questions & analysis by Julia Hengstler, Gail Krivel-Zacks and Elizabeth Kroeker Society looks to school principals and vice-principals, faculty, and staff as gatekeepers of
WHOLE SCHOOL ANTI-BULLYING POLICY
130 High Road, Buckhurst Hill, Essex IG9 5SD Telephone number: 0208 504 1133 WHOLE SCHOOL ANTI-BULLYING POLICY 1 Persons responsible: The Head Teacher, in consultation with the Directors, the Governing
Domestic Violence Law Reform The Victim s Voice Survey: Victim s Experience of Domestic Violence and the Criminal Justice System
Domestic Violence Law Reform The Victim s Voice Survey: Victim s Experience of Domestic Violence and the Criminal Justice System FOREWORD We would like to thank all those who took the time to share their
9. Children, Technology and Gambling
9. Children, Technology and Gambling This document is part of a series of Building a Stronger South Australia policy initiatives from the Government of South Australia. 1. Future Fund 2. Jobs and Skills
Business Plan 2012/13
Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,
United Response. Overall rating for this service Good. Inspection report. Ratings. Overall summary. Is the service safe? Good
United Response Kumba Imani Millenium Centre Inspection report 4 Princes Road Toxteth Liverpool L8 1TH Tel: 0151 203 1125 Website: www.unitedresponse.org.uk Date of inspection visit: 6 and 29 August and
Understanding Consent to Sexual Activity. Public Legal Education and Information Service of New Brunswick
Understanding Consent to Sexual Activity Public Legal Education and Information Service of New Brunswick NO means NO Understanding Consent to Sexual Activity This pamphlet provides information on what
Protecting Children. Information for families and carers involved in the child protection process
Protecting Children Information for families and carers involved in the child protection process This leaflet provides information for families who are involved in the child protection process. It will
Southfields Academy: Safeguarding Principles
Southfields Academy: Safeguarding Principles Author: Jacqueline Valin, Principal Date: 9 th October 2015 Review: Annually Reviewed by: Board of Trustees Committee / Delegated to Principal/Headteacher Safeguarding
Support Worker. About the Service. Job Summary. Main duties
Support Worker Role: Works to: Senior Support Worker Reports to: Safer London Salary: 27,000 Duration: Fixed term until 30th September 2017 Location: Safer London office in Southwark (with frequent travel
NSPCC s Share Aware Teaching Guidance
NSPCC s Share Aware Teaching Guidance Helping children stay safe on social networks, apps and games The Share Aware teaching resources and lesson plans have been created to provide straightforward, no-nonsense
Catch Me If You Can is a movie based on a true story about a man named
Introduction Catch Me If You Can is a movie based on a true story about a man named Frank William Abagnale Jr. Frank is a smart, young and charismatic boy. During his early teen years, his parents started
Appendix 6.1. The Person Posing A Risk To Children Assessment Framework
Appendix 6.1 The Person Posing A Risk To Children Assessment Framework Introduction and guidance notes (PPRTC Assessment Framework) A Home Office Review of Schedule 1 in 2004 identified that the term Schedule
Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.
Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human
Cyberbullying in the UK: an evaluation of some intervention procedures
Cyberbullying in the UK: an evaluation of some intervention procedures Fran Thompson, Susanne Robinson, and Peter K Smith Unit for School and Family Studies, Department of Psychology, Goldsmiths, University
June 2008. Canadian Teachers Federation Fédération canadienne des enseignantes et des enseignants
Addressing Cyberconduct A Brief to the Department of Justice Canada June 2008 Canadian Teachers Federation Fédération canadienne des enseignantes et des enseignants Brief to the Canadian Ministry of Justice:
A Guide for Childhood Sexual Abuse Survivors
You are not alone. It was not your fault. You have courage. You have choices. You have power. We re here to help. A Guide for Childhood Sexual Abuse Survivors Breaking the silence. Raising Awareness. Fighting
SOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
A client s experience
40 Rapid Action Project (RAP), Rainer, Essex Scheme of special merit award 2006 A client s experience Louis 1 was aged 11 years when police gave him a reprimand following a violent incident at school and
COUNCIL OF EUROPE COMMITTEE OF MINISTERS. RECOMMENDATION No. R (90) 2 OF THE COMMITTEE OF MINISTERS TO MEMBER STATES
COUNCIL OF EUROPE COMMITTEE OF MINISTERS RECOMMENDATION No. R (90) 2 OF THE COMMITTEE OF MINISTERS TO MEMBER STATES ON SOCIAL MEASURES CONCERNING VIOLENCE WITHIN THE FAMILY 1 (Adopted by the Committee
COUNSELING AFFILIATES SEXUAL ADDICTION TREATMENT PROGRAM GUIDELINES FOR WRITING A DISCLOSURE TO RELATIONSHIP PARTNERS
COUNSELING AFFILIATES SEXUAL ADDICTION TREATMENT PROGRAM GUIDELINES FOR WRITING A DISCLOSURE TO RELATIONSHIP PARTNERS 1. Start with the text of the First Step if available. Only do disclosure after completing
F36D 04 (LMC B1) Lead and manage provision of care services that respects, protects and
Elements of competence LMC B1.1 LMC B1.2 LMC B1.3 Lead and manage provision that complies with legislation, registration, regulation and inspection requirements Lead and manage provision that promotes
SCHOOLS SAFE 4 GIRLS - Questionnaire for schools
SCHOOLS SAFE 4 GIRLS - Questionnaire for schools What is this questionnaire for? Schools have a critical role to play in helping young people to develop healthy attitudes and behaviours, as well as identifying
Example of a Child Protection Policy
Example of a Child Protection Policy Introduction Policy Statement/aims Promoting good practice Good practice guidelines Use of photographic/filming equipment Recruitment and training of staff and volunteers
nationalcarestandards
nationalcarestandards dignity privacy choice safety realising potential equality and diversity SCOTTISH EXECUTIVE Making it work together nationalcarestandards dignity privacy choice safety realising potential
Staying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
I N F O R M A T I O N B U L L E T I N. Considerations for Sexual Assault Coordination
I N F O R M A T I O N B U L L E T I N Considerations for Sexual Assault Coordination This information bulletin is based on the information available at April 4, 2002. In addition to the sources cited,
ONLINE PREDATORS & PREDATORS
the myths and realities of ONLINE PREDATORS & PREDATORS Center For Child Advocacy Sixth Annual National Conference Crimes Against Children: The Multiple Faces of Child Victimization Joseph Hanley B.A.
