For the past six summers, I have been the Sports Camp Coordinator for a week-long day camp. Each year, we have approximately 60 campers ages 7 to 12 years old participating in various sports, including soccer, ball hockey, basketball, volleyball, as well as many large group games – all on varying terrain. With the heightened...
I was recently interviewed by Faith Today magazine and they asked, “how many organizations and churches have a plan to protect?”
My hope is that every organization and church that serves the vulnerable sector, would have some sort of a plan to protect but not all plans are the same, nor do they all adhere to the same standard.
As we review and customize hundreds of policies and procedure manuals a year, we see such a wide variety of policies including:
Jun19TueJune 19, 2018
Who do you reach out to when you need care and support?
Last week I was interviewed by a young journalist from Huffington Post and asked why victims of child abuse reached out to clergy to disclose their abuse. The interviewer was writing in response to recent disclosures of abuse: #MeTOO and #ChurchTOO.
As I responded to the questions, I thought of many individual cases of abuse where each individual disclosed their abuse to someone they trusted. Some of the names have been changed to protect the victims.
Mar27TueMarch 27, 2018
Feb28WedFebruary 28, 2018
Jan26FriJanuary 26, 2018
We are often asked how implementing a children’s check-in solution can benefit organizations where children are placed in the care of others. A check-in system provides enhanced security and is vital to child safety, yet the benefits and success truly come from a combination of the check-in system itself and how well the staff in the organization uses it.
Regardless of whether you are using an electronic solution or another method, certain tracking and safety measures are still a necessity. You must have accurate records of children checking in and out, know who is picking up the children in your care, be aware of any allergy or medical concerns and have a process to verify people are who they say they are, as well as a secure way of maintaining all documentation.