Child & Vulnerable Adult Safety Policy The mission of the Grinnell Public Library District is to serve as a center for the community offering each individual the opportunity to develop personally, academically, culturally, professionally and socially. The Library welcomes individuals of all ages to use our services in a secure, friendly and safe environment. The Library encourages children and vulnerable adults to use its facilities and services. However, the Library is not responsible for these individuals while they are in the building or on the library premises. Supervision: Parents and guardians, not the Library Staff, are responsible for the care, behavior, and supervision of their children while using the Grinnell Public Library District and on its property. As the Grinnell Public Library District is a public place, the Board of Trustees has adopted the following policies: 1. Children 9 years old or younger who are using the Library’s resources or who are participating in a Library program shall at all times be accompanied and adequately supervised by a responsible adult. A responsible adult is defined as a parent, guardian, teacher, or assigned caregiver over the age of 16. That person must remain with the child in the Library for the duration of the visit. When a child (9 and under) seems to be unaccompanied, a staff member will observe to see if parent/caregiver is near. If parent/caregiver is not found in a timely manner, the Local Police will be contacted. 2. Children 10 to 13 years of age may use the Library on their own for a reasonable period of time provided they are able to maintain proper Library behavior. Parents are always responsible for the actions of their children. Children who behave inappropriately may be asked to leave the Library. Unattended children must have the phone number of a parent, guardian or caregiver to contact in case of an emergency or any other circumstance where the child must leave the Library. 3. Children/young adults aged 14 to 17 are treated as full library patrons. Parents are advised that even in their absence, they are legally responsible for their child’s behavior. Disruptive Behavior: 1. If a child behaves in a disruptive manner, even if they are accompanied by a responsible adult, they will be given a warning that they must correct their behavior or leave the Library. 2. If the child continues to be disruptive after this warning, then the Library Staff may:  For children 9 and under: ask the parent to remove the child from the library.  For children 10 and over, ask the child to leave the library and, if necessary, contact the responsible adult.

Unattended Children after Closing Time – Regular Scheduled The Grinnell Public Library District will exercise appropriate procedures to ensure the safety of unattended children when the Library is closing. Parents must be aware of the Library’s hours. It is the parent’s responsibility to make arrangements to pick up their children or make advance arrangements to have their children picked up by a responsible adult by closing time. If an unattended child is still in the Library at closing time, then the Library Staff will act according to the following guidelines: 1. If a child is not picked up by the time the Library closes, 2 staff members will wait with the child for 15 minutes outside the building. At the end of 15 minutes if the child/teen is not picked up staff will call Local Police to come and wait with or transport the child. At that time the child will be in care of the police. No Library staff member will transport any child from the Library to another location. Unattended Children – Emergency Closing Emergencies and inclement weather may force the Library to close without warning. Children should know what to do if the Library closes unexpectedly. Parents are responsible for their children and must make arrangements to pick them up. If a child is left unattended during an emergency closing, the same guidelines outlined above under regularly scheduled closings will apply. Vulnerable Adults A vulnerable adult is an individual over the age of 18 who is mentally or physically challenged to a degree that may significantly impair that person’s ability to provide adequately for his/her personal needs and manage his/her behavior without assistance. Vulnerable adults must have a parent/guardian or caregiver 18 years of age or older with them while they are in the Library who can manage their behavior and provide adequately for their personal needs. Physically challenged adults who are capable of providing for their own needs are welcome to remain in the library without supervision so long as a contact person is available in the event that the adult’s health or safety is in doubt. The rules for vulnerable adults at closing time shall be the same as the rules for an unattended child. Violations of the Child and Vulnerable Adult Safety Policy may result in suspension of library privileges for the family.

Approved by the Grinnell Library Board of Trustees on June 15, 2016.

unsupervised child policy.pdf

There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. unsupervised ...
Missing:

398KB Sizes 2 Downloads 161 Views

Recommend Documents

Unsupervised Segmentation of Conversational ...
because of agent/caller distractions, unexpected responses etc. Automatically ... There are two steps in unsupervised segmentation of call transcripts. Firstly, we ...

Confidence Score Based Unsupervised Incremental ...
Recognition Developer Kit (SRDK) which serves as a baseline system for ..... some broad class c , which can be either a broad phone class or a set of tied .... Cox, S. and Rose, R.: Confidence measures for the SWITCHBOARD database. In.

Unsupervised Single-Channel Music Source ...
The idea was first presented in [29]. ... store the overlapping partials in the separation step. However, ... explains why MFCCs are so successful in instrument recog- nition for ...... [46] “Sound quality assessment material (SQAM),” [Online]. A

Unsupervised image layout extraction
ABSTRACT. We propose a novel unsupervised learning algorithm to ex- tract the layout of an image by learning latent object-related aspects. Unlike traditional ...

Unsupervised Features Extraction from Asynchronous ...
Now for many applications, especially those involving motion processing, successive ... 128x128 AER retina data in near real-time on a standard desktop CPU.

Unsupervised Feature Selection for Biomarker ... - Semantic Scholar
Feature selection and weighting do both refer to the process of characterizing the relevance of components in fixed-dimensional ..... not assigned.no ontology.

Experiments with Semi-Supervised and Unsupervised Learning
The system of Martin. (1990) explained linguistic metaphors through finding the corresponding metaphorical ...... Source Cluster: polish clean scrape scrub soak.

Unsupervised image layout extraction
from the Caltech face dataset [9]. As in [7], images are re- sized to around 200 × 140 and converted to grayscale. A random subset of 50 face and 50 non-face ...

Unsupervised Image Categorization and Object ...
cal proportions of visual words and have shown promising results. In this paper we will ... Analysis (PLSA)[11], were originally used in the text un- derstanding ...

Unsupervised Translation Sense Clustering - John DeNero
the synonym groups of WordNet R (Miller, 1995).1 ..... Their analysis shows that of the wide range of met- rics, only BCubed ..... Data-driven semantic anal-.

Unsupervised Learning for Graph Matching
used in the supervised or semi-supervised cases with min- ... We demonstrate experimentally that we can learn meaning- ..... date assignments for each feature, we can obtain the next ..... Int J Comput Vis. Fig. 3 Unsupervised learning stage. First r

Unsupervised Feature Selection for Biomarker ...
The proposed framework allows to apply custom data simi- ... Recently developed metabolomic and genomic measuring technologies share the .... iteration number k; by definition S(0) := {}, and by construction |S(k)| = k. D .... 3 Applications.

Unsupervised Temporal Segmentation of Repetitive ...
for the motion data captured by both the motion capture system and the Microsoft ... the segmentation in real-time using PCA and probabilistic. PCA, respectively ...

Unsupervised Learning for Graph Matching - Springer Link
Apr 14, 2011 - Springer Science+Business Media, LLC 2011. Abstract Graph .... tion as an integer quadratic program (Leordeanu and Hebert. 2006; Cour and Shi ... computer vision applications such as: discovering texture regularity (Hays et al. .... fo

Unsupervised Learning of Probabilistic Grammar ...
1Department of Statistics, 3Psychology and 4Computer Science .... Thirdly, the approach is able to learn from noisy data (where half of the training data is only ...

Unsupervised natural experience rapidly alters ...
Mar 10, 2010 - ... be found in the online. Updated information and services, ... 2 article(s) on the ISI Web of Science. cited by ... 2 articles hosted by HighWire Press; see: cited by ... of the cell lines were in good concordance with data found by

unsupervised change detection using ransac
the noise pattern, illumination, and mis-registration error should not be identified ... Fitting data to predefined model is a classical problem with solutions like least ...

No Unsupervised Thinking: How to increase ... - MarketingExperiments
(Logos and identifying marks have been concealed.) Recoup the ... For this test we couldn't remove the bottom objects, but you should remove as many ... In research project after research project, we see the same direct, positive correlation.

Unsupervised, Efficient and Semantic Expertise Retrieval
a case-insensitive match of full name or e-mail address [4]. For. CERC, we make use of publicly released ... merical placeholder token. During our experiments we prune V by only retaining the 216 ..... and EX103), where the former is associated with

Unsupervised, Efficient and Semantic Expertise Retrieval
training on NVidia GTX480 and NVidia Tesla K20 GPUs. We only iterate once over the entire training set for each experiment. 5. RESULTS AND DISCUSSION. We start by giving a high-level overview of our experimental re- sults and then address issues of s

Semantic-Shift for Unsupervised Object Detection - CiteSeerX
notated images for constructing a supervised image under- standing system. .... the same way as in learning, but now keeping the factors. P(wj|zk) ... sponds to the foreground object as zFG and call it the fore- ..... In European Conference on.