Title IX Safety and Security Report

Total Page:16

File Type:pdf, Size:1020Kb

Title IX Safety and Security Report 2021 Heritage Valley Kennedy School of Nursing Annual Safety and Security Report Title IX (A review of 2020) Valerie Gaydosh Heritage Valley Kennedy 1/1/2021 I. Introduction ........................................................................................................................................... 2 Campus Safety and Security / Cleary Act Title IX II. The Campus: Heritage Valley Kennedy School of Nursing ................................................................... 2 III. Campus Safety and Security / Cleary Act and Title IX Personnel ......................................................... 3 IV. Reporting Occurrences /Emergency Alert System ................................................................................. 4 V. Fire Safety .............................................................................................................................................. 6 VI. Title IX Coordinator ............................................................................................................................... 6 VII. School and Governing Agency Policies ................................................................................................. 6 Ohio Valley Hospital .............................................................................................................................. 6 A. Emergency Plan: Incident Command ............................................................................................. 6 1. Evacuation 2. External Evacuation B. Fire, School of Nursing – Institutional Response ........................................................................... 9 C. Missing Persons ........................................................................................................................... 10 D. Violent or Potentially Violent Situations ..................................................................................... 12 Heritage Valley Health System Policies ................................................................................................ 14 E. HVHS Nondiscrimination Policy ................................................................................................. 14 F. Workplace Harassment (HR 102) ............................................................................................... 15 G. Code of Ethics (1.01) .................................................................................................................. 16 H. Regulatory Compliance Code of Conduct (1.22) ......................................................................... 17 I. Organizational Behaviors – Code of Conduct (1.47) .................................................................. 19 J. Weapons (3.03) ............................................................................................................................ 21 K. Authority of Safety Officer (3.16) ................................................................................................ 22 L. Workplace Violence Prevention (3.21) ........................................................................................ 22 Training ................................................................................................................................................... 23 M. Incident Response (3.23) .............................................................................................................. 24 N. Internal Fire Response Drill (Code Red) (3.25) ........................................................................... 24 O. Bomb Threat Procedure (Code Green) (3.29) .............................................................................. 26 P. Active Shooter / Armed Assailant (3.41) ..................................................................................... 27 Q. Non-discrimination (5.03) ............................................................................................................ 30 R. Victims of Suspected Abuse or Neglect (Domestic Abuse) (5.06) ............................................. 31 School of Nursing Guidebook Policies ................................................................................................... 33 S. Substance Abuse .......................................................................................................................... 33 T. Notice Of Nondiscrimination ...................................................................................................... 35 U. Campus Crime And Security Policies ......................................................................................... 35 V. Fire Safety ................................................................................................................................... 35 W. Reporting Criminal Actions And/or Emergencies ....................................................................... 36 X. Safety And Security ..................................................................................................................... 36 Y. Sexual Harassment ....................................................................................................................... 36 VIII. Education for staff and students ........................................................................................................... 36 IX. There (3) Years of Clery Act Statistics ................................................................................................ 37 X. Definitions ............................................................................................................................................ 38 XI. Quick references resources ................................................................................................................... 41 XII. Reference .............................................................................................................................................. 41 1 I. INTRODUCTION The Crime Awareness and Campus Security Act of 1990 was enacted by the U.S. Department of Education for any postsecondary education entity that receives Title IV (federal financial aid) funding. The Act functions to advance the goals of education institutions to provide a safe environment in which to learn, and to keep students, parents, and the public well informed about campus security. The Act, generally referred to as the Clery Act (named after a Lehigh University student who was a victim of violent campus crime in 1986) requires each Title IV institution to report annually a compilation of campus crime statistics covering a three-year period. These statistics are recorded via a web-based data collection tool and are available to the public at: https://ope.ed.gov/campussafety/#/. Along with the annual online report of campus crime statistics, the Cleary Act expanded the original Crime Awareness and Campus Security Act to include the disclosure of educational programming, campus disciplinary processes, and victim rights regarding sexual violence complaints. In 2013, the Cleary Act expanded to include the Campus SaVE Act (sexual violence elimination), which broadened the disclosure and education to include all incidences of sexual violence. The annual disclosure required by the Clery Act is produced yearly by Title IV institutions and must be distributed to the organization. It is to be available on the institution’s website and upon verbal request. These documents range in title from Annual Safety and Security Report, to Cleary Act Reports, to Title IX Reports, as the documents have come to include anti-discriminatory policies required of Title IX. Title IX, or the educational Amendment of 1972, prohibits discrimination in any educational program or activity receiving federal financial support. The Heritage Valley Kennedy School of Nursing Annual Safety and Security Report for 2020 is a review of the policies and programs in place in 2019. 2019 was a year of transition for Heritage Valley Kennedy School of Nursing, entering the year as Ohio Valley Hospital (OVH) School of Nursing and undergoing the final stages of integration into the Heritage Valley Health System (HVHS). As of July 1, 2020, Ohio Valley Hospital School of Nursing formally became Heritage Valley Kennedy School of Nursing, however, the complete transition of policies and procedures continues into 2021. The following report represents this transition with a combination of HVHS and OVH policies and processes. II. THE CAMPUS: HERITAGE VALLEY KENNEDY SCHOOL OF NURSING The Heritage Valley Kennedy School of Nursing (HVK SON) is a non-profit hospital associated nursing school established in 1901 as part of the original McKees Rocks General Hospital and functioned for over 100 years as part of the Ohio Valley General Hospital. In July of 2020, it became part of the Heritage Valley Health System (HVHS), maintaining its Kennedy Township location along with its governing hospital, renamed Heritage Valley Kennedy (HVK). The School of Nursing offers a 20-month, ACEN accredited, State approved, Diploma program. The school is located approximately seven miles northwest of the city of Pittsburgh, Pennsylvania in the town of McKees Rocks, Kennedy Township. The Campus Safety and Security / Cleary Act requires defining the three areas of campus: on campus, public property, and non-campus buildings or properties for the purpose of annual crime statistic reports. Those areas are: On Campus: The W. Laird Davis Center of Learning (School of Nursing) Heritage Valley Kennedy Hospital Sidewalks around
Recommended publications
  • Brainwashing As a Strategy for Building Uniformity Reflected in Lois Lowry’S the Giver Novel (1993) Muhammadiyah University of Surakarta
    BRAINWASHING AS A STRATEGY FOR BUILDING UNIFORMITY REFLECTED IN LOIS LOWRY’S THE GIVER NOVEL (1993) MUHAMMADIYAH UNIVERSITY OF SURAKARTA PUBLICATION ARTICLE Submitted as a Partial Fulfillment of the Requirements for Getting Bachelor Degree of Education in English Department By: NUR HANDINI YUSNA LAILY A320120130 ENGLISH DEPARTMENT SCHOOL OF TEACHER TRAINING AND EDUCATION MUHAMMADIYAH UNIVERSITY OF SURAKARTA 2016 0 BRAINWASHING AS A SRATEGY FOR BUILDING UNIFORMITY REFLECTED IN LOIS LOWRY’S NOVEL THE GIVER (1993) MUHAMMADIYAH UNIVERSITY OF SURAKARTA Nur Handini Yusna Laily . A320120130 ABSTRAK BRAINWASHING AS A SRATEGY FOR BUILDING UNIFORMITY REFLECTED IN LOIS LOWRY’S NOVEL THE GIVER (1993) MUHAMMADIYAH UNIVERSITY OF SURAKARTA Nur Handini Yusna Laily . A320120130 ABSTRAK Penelitian ini menganalisis tentang The Influence of Brainwashing as a Strategy for Building Uniformity The Giver (1993) yang dianalisis dengan menggunakan pendekatan sosiologi. Objektif dari penelitian ini adalah untuk mengetahui karakteristik dari brainwashing, untuk mendeskripsikan proses brainwashing dan untuk mengetahui bagaimana Louis Lowry menerapkan brainwashing berdasarkan pendekatan sosiologi. Penelitian ini adalah penelitian kualitatif. Data pada primer penelitian ini adalah The Giver by Lois Lowry’s (1993), dan data sekundernya adalah sumber lain yang berhubungan dengan penelitian yang diambil dari buku sastra, kritik sastra, jurnal, dan beberapa artikel yang berhubungan dengan novel. Hasil penelitian ini adalah pertama, terdapat karakterisitik brainwashing dalam novel The Giver yaitu metode reward dan punishment, obat-obatan dan senyawa lainnnya, pendekatan dalam pidato atau presentasi dan pendekatan secara audio (vocal) dan visual. Dalam pemberian reward dan punishment seperti pemberian pekerjaan pada masing-masing anggota dan juga pemberian aturan dalam komunitas. Sedangkan obat-obatan diberikan kepada komunitas setiap hari.
    [Show full text]
  • The Search for the "Manchurian Candidate" the Cia and Mind Control
    THE SEARCH FOR THE "MANCHURIAN CANDIDATE" THE CIA AND MIND CONTROL John Marks Allen Lane Allen Lane Penguin Books Ltd 17 Grosvenor Gardens London SW1 OBD First published in the U.S.A. by Times Books, a division of Quadrangle/The New York Times Book Co., Inc., and simultaneously in Canada by Fitzhenry & Whiteside Ltd, 1979 First published in Great Britain by Allen Lane 1979 Copyright <£> John Marks, 1979 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owner ISBN 07139 12790 jj Printed in Great Britain by f Thomson Litho Ltd, East Kilbride, Scotland J For Barbara and Daniel AUTHOR'S NOTE This book has grown out of the 16,000 pages of documents that the CIA released to me under the Freedom of Information Act. Without these documents, the best investigative reporting in the world could not have produced a book, and the secrets of CIA mind-control work would have remained buried forever, as the men who knew them had always intended. From the documentary base, I was able to expand my knowledge through interviews and readings in the behavioral sciences. Neverthe- less, the final result is not the whole story of the CIA's attack on the mind. Only a few insiders could have written that, and they choose to remain silent. I have done the best I can to make the book as accurate as possible, but I have been hampered by the refusal of most of the principal characters to be interviewed and by the CIA's destruction in 1973 of many of the key docu- ments.
    [Show full text]
  • ('Gang-Stalking'): a Content Analysis of Subjective Experiences
    International Journal of Environmental Research and Public Health Article The Phenomenology of Group Stalking (‘Gang-Stalking’): A Content Analysis of Subjective Experiences Lorraine Sheridan 1,* , David V. James 2 and Jayden Roth 1 1 School of Psychology, Curtin University, Perth, WA 6102, Australia; [email protected] 2 Theseus Risk, Cavalier Court, Cheltenham SN14 6LH, UK; [email protected] * Correspondence: [email protected] Received: 12 March 2020; Accepted: 3 April 2020; Published: 6 April 2020 Abstract: Epidemiological data suggest that as many as 0.66% of adult women and 0.17% of adult men in the western world may suffer the subjective experience of being group-stalked (‘gang stalked’) at some point in their lives. Yet the gang stalking experience has been subject to little scientific study. This paper reports an attempt to elicit the core phenomena involved in gang-stalking by allowing them to emerge de novo through the qualitative analysis of accounts of individuals who describe being gang-stalked. Fifty descriptions of gang-stalking that satisfied study inclusion criteria were identified from the internet and subjected to content analysis. Twenty-four core phenomena were elicited, together with 11 principal sequelae of the experience of being gang-stalked. These were then divided into groups, producing a framework for the phenomena of the gang-stalking experience. The results were compared with frequencies of the same categories of experience then extracted from the original data of the only previous study on gang-stalking phenomena. Whilst the methodology of the current study was more rigorous, the core phenomena were similar in each.
    [Show full text]
  • Detecting Digital Fingerprints: Tracing Chinese Disinformation in Taiwan
    Detecting Digital Fingerprints: Tracing Chinese Disinformation in Taiwan By: A Joint Report from: Nick Monaco Institute for the Future’s Digital Intelligence Lab Melanie Smith Graphika Amy Studdart The International Republican Institute 08 / 2020 Acknowledgments The authors and organizations who produced this report are deeply grateful to our partners in Taiwan, who generously provided time and insights to help this project come to fruition. This report was only possible due to the incredible dedication of the civil society and academic community in Taiwan, which should inspire any democracy looking to protect itself from malign actors. Members of this community For their assistance in several include but are not limited to: aspects of this report the authors also thank: All Interview Subjects g0v.tw Projects Gary Schmitt 0archive Marina Gorbis Cofacts Nate Teblunthuis DoubleThink Lab Sylvie Liaw Taiwan FactCheck Center Sam Woolley The Reporter Katie Joseff Taiwan Foundation for Democracy Camille François Global Taiwan Institute Daniel Twining National Chengchi University Election Johanna Kao Study Center David Shullman Prospect Foundation Adam King Chris Olsen Hsieh Yauling The Dragon’s Digital Fingerprint: Tracing Chinese Disinformation in Taiwan 2 Graphika is the network Institute for the Future’s The International Republican analysis firm that empowers (IFTF) Digital Intelligence Lab Institute (IRI) is one of the Fortune 500 companies, (DigIntel) is a social scientific world’s leading international Silicon Valley, human rights research entity conducting democracy development organizations, and universities work on the most pressing organizations. The nonpartisan, to navigate the cybersocial issues at the intersection of nongovernmental institute terrain. With rigorous and technology and society.
    [Show full text]
  • Media Manipulation and Disinformation Online Alice Marwick and Rebecca Lewis CONTENTS
    Media Manipulation and Disinformation Online Alice Marwick and Rebecca Lewis CONTENTS Executive Summary ....................................................... 1 What Techniques Do Media Manipulators Use? ....... 33 Understanding Media Manipulation ............................ 2 Participatory Culture ........................................... 33 Who is Manipulating the Media? ................................. 4 Networks ............................................................. 34 Internet Trolls ......................................................... 4 Memes ................................................................. 35 Gamergaters .......................................................... 7 Bots ...................................................................... 36 Hate Groups and Ideologues ............................... 9 Strategic Amplification and Framing ................. 38 The Alt-Right ................................................... 9 Why is the Media Vulnerable? .................................... 40 The Manosphere .......................................... 13 Lack of Trust in Media ......................................... 40 Conspiracy Theorists ........................................... 17 Decline of Local News ........................................ 41 Influencers............................................................ 20 The Attention Economy ...................................... 42 Hyper-Partisan News Outlets ............................. 21 What are the Outcomes? ..........................................
    [Show full text]
  • Breaking Through with a Loved One Hooked On
    Countering the Effects of Fear-Based Media: A HearYourselfThink Guide OUR MISSION: ABOUT THIS GUIDE: The HearYourselfThink Project is a 501c3 non-profit, grassroots Right-wing media uses fear to hook its audience and build organization working to provide the insights, tools, and allegiance to their ideological worldview. It also normalizes the strategies needed to counter the toxic and divisive influence of bullying style of high-profile pundits like Bill O’Reilly and Rush right-wing media in our relationships, politics, and culture. Limbaugh, sending the message that it’s not only okay to shout down and intimidate those who disagree with you, but a sign of HearYourselfThink is the brainchild of Erin and Dave Ninehouser, the righteousness of your position and strength of your a husband-and-wife team dedicated to helping undo the damage convictions. The effect of these dynamics isn’t confined to caused by manipulative media sources that misinform and “politics” -- it infects, and can sometimes destroy once-strong inflame Americans and to bend the cultural-curve back toward friendships and weaken the ties between family members. reason, critical thinking, and “a more perfect union” as opposed to ever-more polarized citizens. Rebuilding those ties and re-establishing those valuable relationships is part of the deprogramming process, and a Erin and Dave have combined their years of grassroots necessary first step to having a long-term conversation about organizing experience (talking with tens of thousands of voters media manipulation and the dangers of political polarization. and seeing firsthand how the “The Fox Effect” poisons the That’s why this guide addresses family dynamics and provides national discourse with fear, misinformation, and conspiracy) ideas to help you put together a plan to begin repairing and research on how the brain’s processing of strong emotion relationships that have suffered under the strain of divisive right- like fear and anger affects higher thinking, to develop a wing media.
    [Show full text]
  • Psychological Warfare and Propaganda in World War Ii: Air Dropped and Shelled Leaflets and Periodicals
    http://gdc.gale.com/archivesunbound/ PSYCHOLOGICAL WARFARE AND PROPAGANDA IN WORLD WAR II: AIR DROPPED AND SHELLED LEAFLETS AND PERIODICALS This publication collection consists of over 1,000 air dropped and shelled leaflets and periodicals created and disseminated during the Second World War. The majority of items in this collection were printed by the Allies then air or container dropped, or fired by artillery shell over German occupied territory. Many leaflets and periodicals have original publication codes and were printed in over 10 languages. Only shelled leaflets, Germans to Allies (115 items), are in English. Date Range: 1939-1945 (predominantly 1942-1945) Content: 9,730 images Source Library: McMaster University Library Detailed Description: Following World War I, many Americans believed that the U.S. was pressured into WWI by false, manipulative propaganda laced with lies from both the British and the Germans. However, as J.A.C. Brown, noted psychiatrist and author of Techniques of Persuasion: From Propaganda to Brainwashing, articulated, "propaganda is successful only when directed at those who are willing to listen, absorb the information, and if possible act on it, and this happens only when the other side is in a condition of lowered morale and is already losing the campaign". Therefore, the use of airborne leaflets was a way for World War II enemies to psychologically attack one another in a different way than in previous wars. Distribution of Airborne leaflet propaganda was used by both allied and Axis forces in the Second World War. Airborne leaflets printed during WWII were "factual, in the main truthful, and served to create a reputation for reliability both in supplying information and refuting German accounts which we said to be untruthful".
    [Show full text]
  • Child Sex Rings: a Behavioral Analysis for Criminal Justice Professionals Handling Cases of Child Sexual ~ Exploitation
    If you have issues viewing or accessing this file contact us at NCJRS.gov. NATIONAL CENTER FOR MISt.f9IN(. 1~"I"j('lrl'l~I) -----1.---' CHI L D R E N Child Sex Rings: A Behavioral Analysis For Criminal Justice Professionals Handling Cases of Child Sexual ~ Exploitation In cooperation with the Federal Bureau of Investigation ------------------ 149214 U.S. Department of Justice National Institute of Justice This document has been reproduced exactly as received from the person or organization originating it. Points of view or opinions stated in this document are those of the authors and do not necessarily represent the official position or policies of the National Institute of Justice. Permission to reproduce this copyrighted material has been grantedNaElona1 by • center f'or Mlsslng . & Exploited Chi1dren/DOJ/FBI to the National Criminal Justice Reference Service (NCJRS). Further reproduction outside of the NCJRS system requires permission of the copyright owner. Child Sex Rings: A Behavioral Analysis For Criminal Justice Professionals Handling Cases of Child Sexual Exploitation April 1992 Second Edition Kenneth V. Lanning Supervisory Special Agent Behavioral Science Unit Federal Bureau of Investigation FBI Academy Quantico, Virginia © National Center for Missing & Exploited Children Dedication This book is dedicated to the victims of child sex rings and to the memory of two FBI agents who devoted their professional lives to helping sexually exploited children. Leo E. Brunnick FBI Boston, Massachusetts Alan V. MacDonald FBI Boston, Massachusetts Contents Author's Preface v 1. Historical Overview 1 "Stranger Danger" 1 Intrafamilial Child Sexual Abuse 2 Return to "Stranger Danger" 2 The Acquaintance Molester 3 Satanism: A "New" Form of "Stranger Danger" 3 2.
    [Show full text]
  • Parental Alienation Syndrome and Parental Alienation: Research Reviews
    Applied Research Forum National Online Resource Center on Violence Against Women Parental Alienation Syndrome and Parental Alienation: Research Reviews By Joan S. Meier1 Parental alienation syndrome (PAS) and parental alienation,” but focuses instead on children’s “align- alienation (PA) are often invoked in legal and ment” with one parent against the other. legislative contexts addressing the rights of fathers Beginning in the early 1980’s, attention to a and mothers in custody or visitation litigation. purported “parental alienation syndrome” exploded Indeed, alienation claims have become ubiquitous in as the result of the dedicated efforts of Richard custody cases where domestic violence or child Gardner, a psychiatrist loosely affiliated with abuse is alleged as grounds to reject mothers’ Columbia Medical School2 who ran a clinical requests to limit paternal access to their children. practice that focused on counseling divorcing This paper provides a historical and research over- parents. Based solely on his interpretation of data view of PAS and PA, identifies strategic issues for gathered from his clinical practice, Gardner posited advocates working with abused women and chil- that child sexual abuse allegations were rampant in dren, and offers guidelines to improve courts’ custody litigation and that 90% of children in cus- treatment of these issues. While PAS and PA have tody litigation suffered from a disorder, which he much in common both as theories and with respect called “Parental Alienation Syndrome (PAS).” He to how they are used in court, they have distinct described PAS as a “syndrome” whereby vengeful scientific and research bases and critiques. This mothers employed child abuse allegations as a paper, therefore, addresses them separately.
    [Show full text]
  • What Is Coercive Control? Coercive Control Is a Term Developed by Professor Evan Stark to Help Us Understand Domestic Abuse As More Than a “Fight”
    CCChat The online magazine on and araroundound ccoeroercivcivee cconontrtrolol SPECIAL EDITION Understanding Coercive Control The Continuum Of Coercive Control red flags trauma bonding entitlement covert abuse CONTENTS EDITORIAL COVERT ABUSE page 05 page 10 COERCIVE CONTROL RED FLAGS page 07 page 16 - 00 - CONTENTS ENTITLEMENT BOOK OF THE MONTH page 20 page 32 THE CONTINUUM OF CC READING LIST page 26 page 33 TRAUMA BONDING FREEDOM PROGRAMME page 29 page 38 - 00 - about the editor Min Grob editor To contact Min email: [email protected] Min has been raising awareness of coercive control since 2015, having both left a relationship, and narrowly avoided selling the family home, in exchange for an isolated smallholding in a foreign country, far away from everyone. Realising that non-violent abuse is mostly invisible in plain sight, she set about organising the world’s first conference on coercive control. To date conferences have been held in Bury St Edmunds, Bristol, London and Liverpool. In 2017, Min started CCChat, a free online magazine to further increase understanding and give a voice to survivors who have not been heard. To date,the online version of CCChat has been read over 44,000 times. This special edition is the first in a series, exploring the complexities of understanding, identifying and evidencing coercive control in more depth. - 00 - - 00 - CCChat Special Edition Understanding Coercive Control What is Coercive Control? Coercive control is a term developed by Professor Evan Stark to help us understand domestic abuse as more than a “fight”. Coercive control is a pattern of behaviour Much coercive control which seeks to take away a victim’s freedom, their sense of self and erode away their self- is hidden from view esteem.
    [Show full text]
  • The Color of Brainwashing: the Manchurian Candidate and the Cultural Logic of Cold War Paranoia
    【연구논문】 The Color of Brainwashing: The Manchurian Candidate and the Cultural Logic of Cold War Paranoia Swan Kim (University of Virginia) [T]he shock of the discovery of the plight of the prisoners placed Chinese conduct in a new, infinitely more disturbing light. Mao Tse Tung’s China acquired a new, far more frightening and disturbing aspect. From this, arguably, its image in the West never recovered. Long after the Korean War receded into memory, the fear of “the Manchurian candidate” remained. Max Hastings, The Korean War (1987, 304) The concept of a rumor does not deny the presence of existential threats facing the United States during the course of the Cold War. In fact, the predominant image of the enemy was, at times, quite realistic. Nevertheless, veracity had little to do with the rumor’s reception. The rumor spread because it provided a culturally compelling explanation for an uncertain predicament; fact and accuracy played a supporting role only. The sinister face of the enemy emerged primarily from a common “universe of discourse” and a pool of “shared assumptions” permeating American society at mid-century. Ron Robin, The Making of the Cold War Enemy (2001, 4) 168 Swan Kim The Korean War brought one of the great sea changes in postwar American history, yet the most mysterious and terrifying outcome for the American public was a psychological one: “[o]ne of the most interesting aftermaths of the Korean conflict in 1950-1953 has been the preoccupation of many Americans with ‘brainwashing.’”1) As the ultimate product of Cold War paranoia, brainwashing was considered the latest weapon that would complement an ideological warfare.
    [Show full text]
  • Deprogramming Members of Religious Sects
    Fordham Law Review Volume 46 Issue 4 Article 1 1978 Deprogramming Members of Religious Sects John E. LeMoult Follow this and additional works at: https://ir.lawnet.fordham.edu/flr Part of the Law Commons Recommended Citation John E. LeMoult, Deprogramming Members of Religious Sects , 46 Fordham L. Rev. 599 (1978). Available at: https://ir.lawnet.fordham.edu/flr/vol46/iss4/1 This Article is brought to you for free and open access by FLASH: The Fordham Law Archive of Scholarship and History. It has been accepted for inclusion in Fordham Law Review by an authorized editor of FLASH: The Fordham Law Archive of Scholarship and History. For more information, please contact [email protected]. Deprogramming Members of Religious Sects Cover Page Footnote A.B., Xavier University; LL.B., Fordham University. Mr. LeMoult is a member of the law firm of Karpatkin, Pollet & LeMoult. This article is available in Fordham Law Review: https://ir.lawnet.fordham.edu/flr/vol46/iss4/1 DEPROGRAVMNG MEMBERS OF RELIGIOUS SECTS JOHN E. LeMOULT* I. INTRODUCTION T he conflict between established cultures and new religions is an ancient one. It is parallel to and part of the conflict of the generations, the parent-child struggle, youth's quest for identity through conversion, and age's need to preserve meaning and purpose through established values. It is also part of the ongoing friction between established socio-political institutions and the new ideas that transform those institutions. In times past, society's intolerance of new religions was easily implemented. Early Christians were crucified. Later, members of Christian sects perceived as heretical were burned at the stake, or tortured into submission.
    [Show full text]