Protection of Minors Program Coordinators Information Session November 2015 Carolyn Brownawell Melisa Giraldo Dietrich Warner.

Slides:



Advertisements
Similar presentations
The Role of the IRB An Institutional Review Board (IRB) is a review committee established to help protect the rights and welfare of human research subjects.
Advertisements

ONS Research Data Access Strategy AGENDA Background and context Confidentiality The Strategy.
Tips to a Successful Monitoring Visit
Records Management for UW-Madison Employees – An Introduction UW-Madison Records Management UW-Archives & Records Management 2012 Photo courtesy of University.
1. As a Florida KidCare community partner families entrust you to not only help them navigate the Florida KidCare system but to keep the information they.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
FERPA 102 Helpful Guide for Administrators, Security Contacts and Support Staff Prepared by the Office of the Registrar Student Records: Institutional.
SIU School of Medicine Identity Protection Act and Associated SIU Policy.
1 GRAND VALLEY STATE UNIVERSITY FAMILY EDUCATIONAL RIGHTS & PRIVACY ACT (FERPA) TRAINING OFFICES OF THE REGISTRAR AND UNIVERSITY COUNSEL JANUARY 20, 2009.
Supportive Services for Veteran Families (SSVF) Data Bigger Picture Updated 5/22/14.
Form I-9 Process An Online Training for Supervisors and Designees Presented by Human Resources Revised November 2009.
2/16/2010 The Family Educational Records and Privacy Act.
Harvard Human Subjects Payments Policy Effective 1/1/11 1.
University of Pittsburgh Study Abroad Programs Guidelines and Checklist.
YMCA of Simcoe/Muskoka Child Protection Orientation November 2013.
Volunteer Registration & Protection Paul Brown Associate Director, Ag & Natural Resource Programs Arizona Cooperative Extension Master Gardening Planning.
Network security policy: best practices
Created May 2, Division of Public Health Managing Records What is a Record? What is a Records Retention & Disposition Schedule? Why is this Important?
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Youth Protection Wisconsin 4-H Youth Development.
Youth Protection Wisconsin 4-H Youth Development.
Pennsylvania Child Protective Services Law: Module 4: Reporting and the Role of the Child Welfare Professional Transfer of Learning The Pennsylvania Child.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Data Access and Data Sharing KDE Employee Training Data Security Video Series 2 of 3 October 2014.
Let’s Go / Let’s Grow: Inclusive 4-H Child Protection at Camps and Programs for Minors.
Cobb County School District After School Program Financial and Operational Training APS Directors Monday, July 13,2015.
CPS Acceptable Use Policy Day 2 – Technology Session.
Using the Internet to Conduct Research What Investigators and IRB Members Should Know -- January 29, Lisa Shickle, MS Analyst, VCU Massey Cancer.
Programs Involving Children Policy University Office of Public Safety.
HQ Expectations of DOE Site IRBs Reporting Unanticipated Problems and Review/Approval of Projects that Use Personally Identifiable Information Libby White.
Compliance Strategies for Records Management
Division of AIDS Data Interchange. Division of AIDS Data Interchange Agenda.
HIPAA (health insurance portability and accountability act)
Best Practices: Financial Resource Management February 2011.
Youth Protection Guidelines by Carol Wisdom. Education: Every Kiwanis club is expected to inform and educate its members on these guidelines, best.
Human Subjects Research Cynthia Edmonds Director, Office of Research Support Committees.
H I P A A T R A I N I N G Self Directed Module 7 Research Disclosures For Data Custodians START Click to begin…
Office of Research Integrity and Compliance March 2011.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
SPH Information Security Update September 10, 2010.
SUNY Oswego Human Subjects Committee Last Revised 10/28/2011.
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
Volunteer Orientation The mission of the LAUSD School Volunteer Program is to enhance the school’s learning environment and educational program by utilizing.
Division of AIDS Data Interchange DAIDS Adverse Experience Reporting System (DAERS) New User Introductory Training Teleconferencing Details: US Toll Free:
Health Delivery Services May 29, Eastern Massachusetts Healthcare Initiative Policy Work Group Session 2 May 29, 2009.
FRAM Coordinator Training for Community Eligibility Option (CEO) Schools Presented by the KY Department of Education June 21 and 27,
Audit – Consultation – Ethics & Compliance – Enterprise Risk Management – Investigations Office of Internal Audit and Compliance CAMP PLANNING, SAFETY.
New Background Clearance Process And Training Requirements For Volunteers/Unpaid Individuals MICHELLE GRUBE, HUMAN RESOURCE GENERALIST, COLLEGE OF AGRICULTURAL.
1 Family Education Rights & Privacy Act (FERPA) Training University of Kentucky Registrar’s Office.
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
Financial System Upgrade Agency Change Champion Deployment Session March 16 th, 2006.
Slide 1 Standard Operating Procedures. Slide 2 Goal To review the standard operating procedures Creating the informed consent document Obtaining informed.
Protection of Minors Program Coordinators Refresher Session
“At no time in history has the mission of educating our youth for the challenges of citizenship and for participating in a competitive society been more.
Stephanie Oppenheimer, MS SUCCESS Center Erica Ellington, CRA, CHRC
Investigator of Record – Definition
Privacy & Confidentiality
Dining with Diabetes IRB Training 2017.
Test Administration & The TA Sites.
Red Flags Rule An Introduction County College of Morris
How to manage the Electronic Signature Process
Investigator of Record – Definition
Investigator of Record – Definition
Completing the documentation
HQ Expectations of DOE Site IRBs
Confidentiality Training 2014
Family Educational Rights and Privacy Act of 1974
Presentation transcript:

Protection of Minors Program Coordinators Information Session November 2015 Carolyn Brownawell Melisa Giraldo Dietrich Warner

Welcome 2

Introductions  Name  Role  Department/School 3

Agenda  Background  Protection of Minors Policy  Minors Program Coordinator Role  Background Checks  Training  Resources 4

Background  In the wake of the Penn State child abuse and BSU incidents, many higher educational institutions have created new policies and practices to the safety of minors on campus 5

Background  Protection of Minors Task Force Charter:  Inventory all programs and activities  Examine existing policies and protocols  Review state/federal law requirements  Consult with stakeholders and campus experts  Draft a University Policy for the protection of minors  Develop a comprehensive communication and education program 6

New Protection of Minors Policy  A Policy has been approved that outlines responsibilities with respect to ensuring minors’ safety  The Policy supports BU’s commitment to maintaining a safe environment for all members of the University community 7

Policy Key Elements  Appropriate guidelines for interacting and communicating with minors  How to recognize signs of abuse and neglect  How to report suspected abuse or neglect  Required Training  Background checks  Defines Key terms associated with Protecting Minors, i.e. minors, mandated reporters, abuse, neglect 8

Who is Considered a Minor?  For the purposes of this policy, Boston University considers a minor to be any person under the age of 18 who is not a matriculated Boston University student and who is unaccompanied by a parent or legal guardian 9

Roles and Responsibilities  Minors Program Coordinators  Help Program Operators with policy compliance  Ensure cleared background checks are received prior to permitting participation in activities that include Minors  Ensure staff and faculty who work with minors receive training  Maintain training records  Obtain waivers of liability from parents/guardians of all Minor participants 10

Roles and Responsibilities (cont.)  Human Resources  Maintains list of Minors Program Coordinators  Develops/updates online training  Conducts CORI/SORI checks (or authorizing departments to do so directly)  Answers questions about interpretation/application of the Policy  Risk Management  Reviews requests for exemptions from liability waiver or CORI/SORI checks requirements  Answers questions regarding Third Party Operators 11

Background Check Process 1.Minors Program Coordinator distributes and collects completed:  CORI Acknowledgement Form  Disclosure and Acknowledgement Form  Release and Authorization form  Verifies forms are completed  Reviews government-issued ID in person  Signs page two of the CORI Acknowledgement Form  Completes Background Check Transmittal Form. (The “requestor” name and will receive cleared status notifications.) 12

Background Check Process 2.Minors Program Coordinator delivers completed forms in person to HR 3.HR sends forms to background check vendor, CSI 4.CSI sends cleared status notification to BU contact Adverse results go directly to HR 5.Minors Program Coordinator  Notifies Program Operator that cleared background check is received  Retains Background Check Transmittal Form 13

Tips on Handling CORI/SORI Information 1.Do not leave documents containing confidential information in open areas (desks, photocopiers) 2.Keep paper files in a locked file cabinet 3.Keep electronic files on a secured drive 4.If the CORI form must be sent via use secured encrypted (i.e. DataMotion,) shred original documents, delete messages 5.Hand deliver CORI/SORI forms to HR 6.Destroy paper copies after delivering to HR 7.Do not keep copies of CORI/SORI forms 14

Training  On-line training  Request access from Melisa Giraldo  In-person training  Resources available  Policy document review  Certification of Training form in the policy  Maintain training records  Records should be maintained indefinitely  For on-line program reports, contact Melisa Giraldo 15

On-line Training  Customized on-line course  United Educators via EduRisk  Interactive program  Request access through Melisa Giraldo  Demo 16

Resources  Protection of Minors Website Protection of Minors Website  Policy  SharePoint site SharePoint site  Background Check Forms  FAQs  On-line Training request spreadsheet & user instructions  Program Inventory 17

Contacts  First Point of Contact:  Melisa Giraldo,  Background Checks:  Process questions - HR Service Center,  Exemptions Risk Management  Insurance and Liability waivers  Jim Donohue of Risk Management, 18

Questions? 19