Safeguarding: Bullying and Young Person
Safeguarding: Bullying and Young Person
2.1 Identify the signs and symptoms of common childhood illnesses Chicken pox – temperature, fever, sick, red rash, blisters Measles / rubella – 2/3 weeks fir symptoms to appear. Red/pink spots, swollen lymph nodes, fever, temperature, sire throat. Mumps – swelling and pain of one or both glands.
The mouth may feel dry, fever, high temperature, headache, feeling tired. Hand foot and mouth- red spots, ulcers in mouth and cheeks. Sides of fingers and toes, fever, sore throat. Impetigo – bullious and non – bullious is more contagious. Large fluid filled blisters around mouth. Goes after 3/5 days. Conjunctivitis – redness in whites of eyes or inner eyelids, increased amount of tears. Thick, yellow discharge, itchy eyes, burning eyes. Whooping cough- 3 stages. First cold and sire throat. Second whooping cough and third it gets less and less. Can last 6 to 20 days after infection. Caused by a bacteria called Bordetella pertussis. Tonsillitis- red and swollen tonsils, high temperature.
Gastroenteritis – diarrhoea, sickness, dehydrated.
2.2 Describe the actions to take when children or young people are injured. All work places must have at least one qualified first aider. It is essential that you know who the named first aiders is. Reporting to the manager or senior care is particularly important when a child/YP has suffered a head bump. Information on incidents and accidents must be recorded in the incident or accident report book. If you have observed an incident or accident you will have to provide details on what occurred and the action you took. You should make notes as soon after the event as possible. A manager or member of staff with the authority to do so will complete and sign the reports. Serious accidents have to be reported to the Health and Safety Executive by law.
2.3 Identify circumstances when children and young people might require urgent medical attention.
1. When a child bumps their head and becomes sleepy or drowsy.
2. Severe diarrhoea or vomiting
3. Unbidden tidied rashes
4. Difficulty breathing
5. Child or YP becomes unconscious
3.1 Identify the characteristics of different types of child abuse Physical – repeated injuries, unwilling to undress, development delay. In babies , floppiness, May be broken bones. Emotional – withdrawn, aggressive, low self esteem, lack of confidence, depression, nervous, neurotic. Sexual – constant infections, blood, bruising, food related problems, anorexia, self harm. Neglect – dirty, inappropriate clothing, poor personal hygiene, nits, hungry, underweight, stealing food, low attendance at school. Inappropriate behaviour, tiredness, delayed development. Bullying – isolation, low self esteem, self harm, loss of clothes or money. Reluctant to attend school. Education standards delayed, bullying messages. 5R’s Recognise – notice what is happening
Respond – by verbal response, what you say , how you say it. Report – report to safeguarding officer, manager, police. They will make referral. Record – record down, procedures to follow, times dates, who is involved, where it happened. Refer – if nothing is being done, refer to police, social services.
3.2 Describe the risks and possible consequences for children and young people using the internet, mobile phones and other technologies. Exposure to inappropriate material which could be pornographic, violent or racist, this can encourage illegal or dangerous behaviour and activities. A risk of physical danger, paedophiles use technology as an opportunity to pose as whoever they wish and they can develop friendships/relationships with children and young people which can progress into sexual activity. Children and young people are at risk of bullying when uses the internet, mobile phones and other technology. It provides an anonymous method of bullying by way of text messages and emails which can be emotionally damaging. Racist ant anti-social groups use modern technology to preach and spread what they are about, leaving young people vulnerable to becoming part of their activity which is unhealthy.
3.3 Describe actions to take in response to evidence or concerns that a child has been abused, harmed (including self-harm) or bullied, or maybe at risk of harm, abuse or bullying. Report your concerns to the designated person or manager. Write down what has been said or observed and keep the information secure. Take the child or young person seriously.
Assure the child or young person they are not to blame. Assure the child or young person that to be able to help them you need to tell someone else. Do not appear shocked, or ask further questions
Do not make promise to the child or young person to keep the information a secret. 3.4 Describe the actions to take in response to concerns that a colleague may be: A, failing to comply with safeguarding procedures.
B, harming, abusing or bullying a child or young person. Anyone who works with children or young people has a responsibility to take action if it is felt that a colleague is not following the code of conduct. All staff has a duty to comply with policies and procedures. Failure to comply May put children and young people at risk of harm or abuse. Concerns should be reported to a Safeguarding co-ordinator, if we have concerns that a colleague is abusing a child our actions should be exactly the same as a parent, family member or stranger. We must inform a Safeguarding officer for child protection. We made need to give evidence.
3.5 Describe the principles and boundaries of confidentiality and when to share information. Any information regarding children or young people must be treated confidential, as stated in the Data Protection Act 1998. Any information must be stored as stated in the act. All members of staff must be familiar and adhere to the guidelines.
The Data protection Act (1998) covers both paper and electronic records. Individuals have the right to see all information that is stored about them. The workplace has a responsibility to ensure all information is correct, and kept confidential. All records should be stored safely i.e. (locked away and password protected) so that access is restricted to those who have legitimate access to the information.