Seize your opportunity now! Naval Hospital Twentynine Palms Pediatric Dept. will be holding a school and sports physical rodeo on 12th and 13th of July. These appointments are for school aged children (5 to 17 years of age) who need to have forms filled out to start school or participate in sports activities. The appointments are for screening purposes only, and may be with someone other than the child’s primary care manager. Should an issue be identified that needs further evaluation, a follow up appointment can be scheduled at the time of the screening appointment.
If your child has had a well child visit or physical exam done in the past 9 months, an appointment is not necessary. Simply fill out the school forms and drop them off at the front desk of either Family Medicine or Pediatrics, depending on where the child normally gets their care. The medical chart will be reviewed and the forms signed and ready for pick up in 2-5 working days.
To make an appointment, please contact Central Appointments at 760-830-2752.
Please be sure to fill out the school forms and bring them to your appointment or you may need to be rescheduled. If unable to participate during the Rodeo day please schedule your physical at your earliest opportunity as appointments go quick. Do not be late for the upcoming school year.
Tuesday, June 29, 2010
Tuesday, June 15, 2010
Cyber-Safety, For You and For Your Kids
By Martha Hunt, M.A. Health Promotions Coordinator
Summer vacation is in full swing and your kids may spend time home alone surfing the net and looking for all sorts of fun and excitement. Cyber-violence has become a major problem in the US. The focus of most cyber-violence is women and children and takes the form of stalking, mental and emotional abuse, and in extreme cases kidnap, sexual assault and murder. In fact, several suicides of teenage girls have been caused by someone online bullying the teen until they felt the only way out was to kill themselves.
The issue of social network sites such as myspace has enabled the problem of easy access to children whose parents either allow the use of social networking or are unaware of their child’s use of such a site. The FBI estimates that there are over 200 of these free social network sites and sex offenders routinely use these sites to access potential victims and abuse them.
Recent data shows that as many as 1 in 5 children have received an unwanted sexual solicitation via the internet in the past year. One-in three of the children who had received a solicitation were male; the rest were female. Three quarters of the solicitation victims were 14 to 17 years old leaving nearly one quarter under the age of thirteen. This same research study also reports that most children do not report these incidents to their parents or teachers because of fear or embarrassment.
Another startling finding of this research showed that most homes do not use filtering or child safety soft ware. There are many software programs available and be sure to access one that is appropriate to the age of your child. Younger children will have a harder time disabling the security software than older children who may need stricter software to protect them. The website http://familyinternet.about.com/cs/filteringsoftware/a/aafiltering.htm offers a good overview of available filtering software and how to pick one that is appropriate for your family’s needs.
Cyber-violence, like any violence, is really an issue of power. Cyber-stalkers are empowered by the anonymity of the Internet. Since you cannot see them, hear their voice or (usually) trace them, they feel free to say or do as they wish to the inexperienced Internet user.
Cyber-violence is real. What makes it real is that it occurs in one’s mind just like any verbal or emotional abuse. The victims of cyber-violence are just as affected by the assault as they would be if the assailant were actually in their home with them. Outcomes of cyber-violence mirror the emotional and physical aspects of post traumatic stress syndrome including sleeplessness, depression, agitation, fear, etc. When cyber-violence crosses the line to real life violence, the results can be deadly.
It is very easy to simply say to the victim, either the child or adult, “simply disconnect the computer when you feel threatened”. However, this then places the blame on the victim and denies the fact that many predators, real and cyber, can be very smooth in their approach to the victim. A few years ago a little girl in San Diego was murdered and then explicit images of her posted on the internet. The victim knew her predator - he lived next door and her parents socialized regularly with him. She trusted him. The predators who assault children, online as well as in real life, go to great lengths to become friends with the child first to earn their trust.
Guidelines for defending yourself and your children involve protecting your privacy as best as you can and maintaining open lines of communication with your children as to their online activities. Learning proper ‘netiquette’ (online etiquette) will help you to blend into the social structure of the Internet. If you stand out as being a ‘newbie”, you open yourself as a target to potential abusers.
Always make sure when using any chat related software that your privacy options are enabled as well as logging options. Examples of chat related software are mIRC, ICQ, PIRCH, JAVA, or AOL. By ensuring that your privacy options are enabled, a potential abuser cannot track you or identify any personal information about you.
Never use your real name or any personal information about yourself when you set up your chat software. This can sometimes be accessed very easily by anyone on the same net as you, and leave you open to invasion of privacy. Never give anyone any personal information about yourself. This includes photographs, phone numbers, addresses, and home towns - anything that can identify you. Even the smallest bit of personal information can be used to track who you are in real life.
By ensuring that your logging option is effective, you keep a written record of every conversation you or your child engages in, both in public chat rooms and in private chats. These logs can also be enabled to record time and date stamps and any available identifying information of the chat participants. If you are ever cyber-stalked or abused in any way while online, the logs are written proof that the conversation that took place and who were the participants.
Think of your children on line like this – if you don’t let your child talk to strangers in a shopping mall, why would you let them talk to strangers online? If your kids are using the home computer, place it in a common area of the home. This will enable the child to call for help if they feel threatened and will also allow you as the parent to monitor their activities more easily. If you prefer that your children do not use the chat software on your computer at all, it can be password protected in the software security options. Then only you as the parent knows the password and has access to the chat software. And don’t use easily guessed passwords. Your kids are smarter than you think about guessing your passwords.
If for some reason you do decide to meet someone in real life that you have developed a relationship with online, never meet them at your home or theirs. Always choose a safe, public place to meet and always have a ‘safe call”. That means that a friend knows exactly where you are and with whom, that you have the phone number of the person you are meeting, and you have pre-arranged to call that friend at a specific time and let them know you are safe. This way, if you fail to make the ‘safe call’, your friend can notify authorities. If the person you are meeting refuses to give you their home phone number, refuse to meet them. Children should never meet anyone in real life that they have met online period!
If you feel you are a victim of cyber-violence you do have options. Some forms of cyber-violence such as hacking or damaging another’s machine are federal offences and are reportable to the FBI. Also, report the incidents to your Internet Service Provider (ISP). This is when you need to access the logs you have recorded when you enabled the logging option in the chat software.
Sometimes you need to be persistent when reporting to the FBI or to your ISP. They receive so many complaints that they become overloaded with them and may not readily respond to your complaint. If it is proven that a specific individual has committed a crime, then they will be banned forever from service with that ISP. If the cyber-stalker somehow gets your phone number or address and threatens you in real life, report it to your local police. Many states, including California, have begun to enact cyber-violence laws and all 50 states have stalking laws.
The Internet can afford incredible growing experiences. Not all people online are evil stalkers or pedophiles. You can meet and talk to people from all walks of life and from all corners of the globe. However, you must also use an extreme degree of caution when dealing with anyone online to ensure your own safety as well as that of your children.
Summer vacation is in full swing and your kids may spend time home alone surfing the net and looking for all sorts of fun and excitement. Cyber-violence has become a major problem in the US. The focus of most cyber-violence is women and children and takes the form of stalking, mental and emotional abuse, and in extreme cases kidnap, sexual assault and murder. In fact, several suicides of teenage girls have been caused by someone online bullying the teen until they felt the only way out was to kill themselves.
The issue of social network sites such as myspace has enabled the problem of easy access to children whose parents either allow the use of social networking or are unaware of their child’s use of such a site. The FBI estimates that there are over 200 of these free social network sites and sex offenders routinely use these sites to access potential victims and abuse them.
Recent data shows that as many as 1 in 5 children have received an unwanted sexual solicitation via the internet in the past year. One-in three of the children who had received a solicitation were male; the rest were female. Three quarters of the solicitation victims were 14 to 17 years old leaving nearly one quarter under the age of thirteen. This same research study also reports that most children do not report these incidents to their parents or teachers because of fear or embarrassment.
Another startling finding of this research showed that most homes do not use filtering or child safety soft ware. There are many software programs available and be sure to access one that is appropriate to the age of your child. Younger children will have a harder time disabling the security software than older children who may need stricter software to protect them. The website http://familyinternet.about.com/cs/filteringsoftware/a/aafiltering.htm offers a good overview of available filtering software and how to pick one that is appropriate for your family’s needs.
Cyber-violence, like any violence, is really an issue of power. Cyber-stalkers are empowered by the anonymity of the Internet. Since you cannot see them, hear their voice or (usually) trace them, they feel free to say or do as they wish to the inexperienced Internet user.
Cyber-violence is real. What makes it real is that it occurs in one’s mind just like any verbal or emotional abuse. The victims of cyber-violence are just as affected by the assault as they would be if the assailant were actually in their home with them. Outcomes of cyber-violence mirror the emotional and physical aspects of post traumatic stress syndrome including sleeplessness, depression, agitation, fear, etc. When cyber-violence crosses the line to real life violence, the results can be deadly.
It is very easy to simply say to the victim, either the child or adult, “simply disconnect the computer when you feel threatened”. However, this then places the blame on the victim and denies the fact that many predators, real and cyber, can be very smooth in their approach to the victim. A few years ago a little girl in San Diego was murdered and then explicit images of her posted on the internet. The victim knew her predator - he lived next door and her parents socialized regularly with him. She trusted him. The predators who assault children, online as well as in real life, go to great lengths to become friends with the child first to earn their trust.
Guidelines for defending yourself and your children involve protecting your privacy as best as you can and maintaining open lines of communication with your children as to their online activities. Learning proper ‘netiquette’ (online etiquette) will help you to blend into the social structure of the Internet. If you stand out as being a ‘newbie”, you open yourself as a target to potential abusers.
Always make sure when using any chat related software that your privacy options are enabled as well as logging options. Examples of chat related software are mIRC, ICQ, PIRCH, JAVA, or AOL. By ensuring that your privacy options are enabled, a potential abuser cannot track you or identify any personal information about you.
Never use your real name or any personal information about yourself when you set up your chat software. This can sometimes be accessed very easily by anyone on the same net as you, and leave you open to invasion of privacy. Never give anyone any personal information about yourself. This includes photographs, phone numbers, addresses, and home towns - anything that can identify you. Even the smallest bit of personal information can be used to track who you are in real life.
By ensuring that your logging option is effective, you keep a written record of every conversation you or your child engages in, both in public chat rooms and in private chats. These logs can also be enabled to record time and date stamps and any available identifying information of the chat participants. If you are ever cyber-stalked or abused in any way while online, the logs are written proof that the conversation that took place and who were the participants.
Think of your children on line like this – if you don’t let your child talk to strangers in a shopping mall, why would you let them talk to strangers online? If your kids are using the home computer, place it in a common area of the home. This will enable the child to call for help if they feel threatened and will also allow you as the parent to monitor their activities more easily. If you prefer that your children do not use the chat software on your computer at all, it can be password protected in the software security options. Then only you as the parent knows the password and has access to the chat software. And don’t use easily guessed passwords. Your kids are smarter than you think about guessing your passwords.
If for some reason you do decide to meet someone in real life that you have developed a relationship with online, never meet them at your home or theirs. Always choose a safe, public place to meet and always have a ‘safe call”. That means that a friend knows exactly where you are and with whom, that you have the phone number of the person you are meeting, and you have pre-arranged to call that friend at a specific time and let them know you are safe. This way, if you fail to make the ‘safe call’, your friend can notify authorities. If the person you are meeting refuses to give you their home phone number, refuse to meet them. Children should never meet anyone in real life that they have met online period!
If you feel you are a victim of cyber-violence you do have options. Some forms of cyber-violence such as hacking or damaging another’s machine are federal offences and are reportable to the FBI. Also, report the incidents to your Internet Service Provider (ISP). This is when you need to access the logs you have recorded when you enabled the logging option in the chat software.
Sometimes you need to be persistent when reporting to the FBI or to your ISP. They receive so many complaints that they become overloaded with them and may not readily respond to your complaint. If it is proven that a specific individual has committed a crime, then they will be banned forever from service with that ISP. If the cyber-stalker somehow gets your phone number or address and threatens you in real life, report it to your local police. Many states, including California, have begun to enact cyber-violence laws and all 50 states have stalking laws.
The Internet can afford incredible growing experiences. Not all people online are evil stalkers or pedophiles. You can meet and talk to people from all walks of life and from all corners of the globe. However, you must also use an extreme degree of caution when dealing with anyone online to ensure your own safety as well as that of your children.
Thursday, June 3, 2010
The Heat of Summer is Here
Just in case you haven’t noticed, we are in the summer season here… it’s important to pay attention to your environment to prevent heat stroke.
The Heat Condition Flag Warning System, determined by the Wet Bulb Globe Temperature Index (WBGT) reading, on the Combat Center is set up to help you determine your safe daily outdoor activities in the summer months.
The Robert E. Bush Naval Hospital also constantly monitors the “Mainside” WBGT in real time making it available on the hospital’s internet at https://www.med.navy.mil/sites/nhtp/Pages/FlagCondition.aspx
The WBGT index consists of a combination of readings from thermometers, providing temperatures for dry, humid and radiant heat. These three temperatures are combined in a standard formula providing a more accurate reading of heat stress intensity, known as the WBGT Index.
Safety concerns with heat and PT are very real, especially in a desert environment. Dehydration is a constant threat when exercising in the heat. Since thirst occurs too late to be a good indicator of excessive water loss from the body, be sure to weigh yourself regularly during hot weather, especially if you’re doing a lot of intense physical activity.
There is no specific temperature beyond which you should not exercise. People have become heat casualties even in subfreezing temperatures because they were overdressed. Any circumstances that cause your body’s heat production to exceed its capability to cool off will often result in heat stress.
To alert Combat Center members of hazardous heat conditions, the following flags are flown to indicate readings and control physical activity:
Green Flag – WBGT Index Temperatures range from 80-84.9 – Unrestricted physical activity may be carried out.
Yellow Flag – WBGT Index Temperatures range from 85-87.9 – Physical activity should be limited to those people who have been exercising in similar heat for a minimum of 10 days or more.
Red Flag – WBGT Index Temperatures range from 88-89.9 – Physical activity is advised only for members who have been working out in similar heat conditions for a period of 12 weeks for more.
Black Flag – WBGT Index Temperatures range 90 and above – Vigorous outdoor exercise, regardless of conditioning or heat acclimatization, is not advisable.
Combat Center members should be advised to note the flag, which is indicated on the hospital’s web site before beginning outdoor workouts on Main side in the summer months. For Camp Wilson and Ranges, check with Marine Wing Support Squadron – 374 (MWSS-374) Weather Office at 830-7809, as geographic locations on the base cause the WBGT Index to vary.
Although you do not have a choice about the characteristics of work clothing or gear, do not use a vapor barrier (rubber) suit as an aide for weight reduction while exercising. Exercising in a rubberized suit may result in severe dehydration and elevate your core body temperature. Wearing these suits also will not help you with your weight reduction program since the decrease in weight is due to a very temporary loss of fluid, not fat loss. If you are required to wear NBC gear or body armor you should add 10 points to the WBGT Index to determine your training activities.
For more information on the WBGT Index call the Hospital’s Preventive Medicine Department at 830-2029.
The Heat Condition Flag Warning System, determined by the Wet Bulb Globe Temperature Index (WBGT) reading, on the Combat Center is set up to help you determine your safe daily outdoor activities in the summer months.
The Robert E. Bush Naval Hospital also constantly monitors the “Mainside” WBGT in real time making it available on the hospital’s internet at https://www.med.navy.mil/sites/nhtp/Pages/FlagCondition.aspx
The WBGT index consists of a combination of readings from thermometers, providing temperatures for dry, humid and radiant heat. These three temperatures are combined in a standard formula providing a more accurate reading of heat stress intensity, known as the WBGT Index.
Safety concerns with heat and PT are very real, especially in a desert environment. Dehydration is a constant threat when exercising in the heat. Since thirst occurs too late to be a good indicator of excessive water loss from the body, be sure to weigh yourself regularly during hot weather, especially if you’re doing a lot of intense physical activity.
There is no specific temperature beyond which you should not exercise. People have become heat casualties even in subfreezing temperatures because they were overdressed. Any circumstances that cause your body’s heat production to exceed its capability to cool off will often result in heat stress.
To alert Combat Center members of hazardous heat conditions, the following flags are flown to indicate readings and control physical activity:
Green Flag – WBGT Index Temperatures range from 80-84.9 – Unrestricted physical activity may be carried out.
Yellow Flag – WBGT Index Temperatures range from 85-87.9 – Physical activity should be limited to those people who have been exercising in similar heat for a minimum of 10 days or more.
Red Flag – WBGT Index Temperatures range from 88-89.9 – Physical activity is advised only for members who have been working out in similar heat conditions for a period of 12 weeks for more.
Black Flag – WBGT Index Temperatures range 90 and above – Vigorous outdoor exercise, regardless of conditioning or heat acclimatization, is not advisable.
Combat Center members should be advised to note the flag, which is indicated on the hospital’s web site before beginning outdoor workouts on Main side in the summer months. For Camp Wilson and Ranges, check with Marine Wing Support Squadron – 374 (MWSS-374) Weather Office at 830-7809, as geographic locations on the base cause the WBGT Index to vary.
Although you do not have a choice about the characteristics of work clothing or gear, do not use a vapor barrier (rubber) suit as an aide for weight reduction while exercising. Exercising in a rubberized suit may result in severe dehydration and elevate your core body temperature. Wearing these suits also will not help you with your weight reduction program since the decrease in weight is due to a very temporary loss of fluid, not fat loss. If you are required to wear NBC gear or body armor you should add 10 points to the WBGT Index to determine your training activities.
For more information on the WBGT Index call the Hospital’s Preventive Medicine Department at 830-2029.
Subscribe to:
Posts (Atom)