{"id":12,"date":"2014-11-25T03:00:18","date_gmt":"2014-11-25T03:00:18","guid":{"rendered":"https:\/\/security2j2.com\/?page_id=12"},"modified":"2019-10-18T15:56:01","modified_gmt":"2019-10-18T15:56:01","slug":"health-care-and-victim-service-workers","status":"publish","type":"page","link":"https:\/\/security2j2.com\/?page_id=12","title":{"rendered":"Health Care and Victim Service Workers."},"content":{"rendered":"<p><a href=\"https:\/\/security2j2.com\/wp-content\/uploads\/2016\/09\/IMG_1516.jpg\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-469\" src=\"https:\/\/security2j2.com\/wp-content\/uploads\/2016\/09\/IMG_1516-300x300.jpg\" alt=\"img_1516\" width=\"300\" height=\"300\" srcset=\"https:\/\/security2j2.com\/wp-content\/uploads\/2016\/09\/IMG_1516-300x300.jpg 300w, https:\/\/security2j2.com\/wp-content\/uploads\/2016\/09\/IMG_1516-150x150.jpg 150w, https:\/\/security2j2.com\/wp-content\/uploads\/2016\/09\/IMG_1516-768x768.jpg 768w, https:\/\/security2j2.com\/wp-content\/uploads\/2016\/09\/IMG_1516-1024x1024.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><a href=\"https:\/\/security2j2.com\/wp-content\/uploads\/2016\/09\/IMG_1515.jpg\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-468\" src=\"https:\/\/security2j2.com\/wp-content\/uploads\/2016\/09\/IMG_1515-300x300.jpg\" alt=\"img_1515\" width=\"300\" height=\"300\" srcset=\"https:\/\/security2j2.com\/wp-content\/uploads\/2016\/09\/IMG_1515-300x300.jpg 300w, https:\/\/security2j2.com\/wp-content\/uploads\/2016\/09\/IMG_1515-150x150.jpg 150w, https:\/\/security2j2.com\/wp-content\/uploads\/2016\/09\/IMG_1515-768x768.jpg 768w, https:\/\/security2j2.com\/wp-content\/uploads\/2016\/09\/IMG_1515-1024x1024.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Review of Assaults on Health Care, Victim Service Workers.<br \/>\nHealth Care Professional Response Options<br \/>\nIdentifying Patient, Client Resistance<br \/>\nDealing with Confrontational and Aggressive Behaviour<br \/>\nlegal rights &amp; responsibilities<br \/>\nconfrontation management<br \/>\nempty hand control tactics<br \/>\ndefensive tactics<br \/>\nshield for protection<br \/>\ndisengagement tactics<br \/>\nreport writing<br \/>\nUnruly clients\/ Safety Management<\/p>\n<p>Leon Durette, Albert Boucher, Joel Pedersen Defensive Tactic Instructors can be reached at 306-281-5338, or email to <a href=\"mailto:jp@fitness2j2.com\">jp@fitness2j2.com<\/a><\/p>\n<p><a href=\"https:\/\/security2j2.com\/wp-content\/uploads\/2015\/09\/IMG_5540.jpg\"><img loading=\"lazy\" class=\"alignnone wp-image-242\" src=\"https:\/\/security2j2.com\/wp-content\/uploads\/2015\/09\/IMG_5540-300x225.jpg\" alt=\"IMG_5540\" width=\"249\" height=\"187\" srcset=\"https:\/\/security2j2.com\/wp-content\/uploads\/2015\/09\/IMG_5540-300x225.jpg 300w, https:\/\/security2j2.com\/wp-content\/uploads\/2015\/09\/IMG_5540-1024x768.jpg 1024w\" sizes=\"(max-width: 249px) 100vw, 249px\" \/><\/a><a href=\"https:\/\/security2j2.com\/wp-content\/uploads\/2015\/06\/IMG_4649.jpg\"><img loading=\"lazy\" class=\"alignnone wp-image-131\" src=\"https:\/\/security2j2.com\/wp-content\/uploads\/2015\/06\/IMG_4649-300x300.jpg\" alt=\"IMG_4649\" width=\"244\" height=\"244\" srcset=\"https:\/\/security2j2.com\/wp-content\/uploads\/2015\/06\/IMG_4649-300x300.jpg 300w, https:\/\/security2j2.com\/wp-content\/uploads\/2015\/06\/IMG_4649-150x150.jpg 150w, https:\/\/security2j2.com\/wp-content\/uploads\/2015\/06\/IMG_4649.jpg 1000w\" sizes=\"(max-width: 244px) 100vw, 244px\" \/><\/a><a href=\"https:\/\/security2j2.com\/wp-content\/uploads\/2014\/11\/IMG_1319.png\" rel=\"attachment wp-att-366\"><img loading=\"lazy\" class=\"alignnone wp-image-366\" src=\"https:\/\/security2j2.com\/wp-content\/uploads\/2014\/11\/IMG_1319-300x169.png\" alt=\"IMG_1319\" width=\"295\" height=\"166\" srcset=\"https:\/\/security2j2.com\/wp-content\/uploads\/2014\/11\/IMG_1319-300x169.png 300w, https:\/\/security2j2.com\/wp-content\/uploads\/2014\/11\/IMG_1319-768x433.png 768w, https:\/\/security2j2.com\/wp-content\/uploads\/2014\/11\/IMG_1319.png 1024w\" sizes=\"(max-width: 295px) 100vw, 295px\" \/><\/a><a href=\"https:\/\/security2j2.com\/wp-content\/uploads\/2014\/08\/IMG_7395.jpg\" rel=\"attachment wp-att-386\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-386\" src=\"https:\/\/security2j2.com\/wp-content\/uploads\/2014\/08\/IMG_7395-300x297.jpg\" alt=\"IMG_7395\" width=\"300\" height=\"297\" srcset=\"https:\/\/security2j2.com\/wp-content\/uploads\/2014\/08\/IMG_7395-300x297.jpg 300w, https:\/\/security2j2.com\/wp-content\/uploads\/2014\/08\/IMG_7395-150x150.jpg 150w, https:\/\/security2j2.com\/wp-content\/uploads\/2014\/08\/IMG_7395-768x761.jpg 768w, https:\/\/security2j2.com\/wp-content\/uploads\/2014\/08\/IMG_7395.jpg 924w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Review of Assaults on Health Care, Victim Service Workers. Health Care Professional Response Options Identifying Patient, Client Resistance Dealing with Confrontational and Aggressive Behaviour legal rights &amp; responsibilities confrontation management empty hand control tactics defensive tactics shield for protection disengagement tactics report writing Unruly clients\/ Safety Management Leon Durette, Albert Boucher, Joel Pedersen Defensive Tactic &hellip; <a href=\"https:\/\/security2j2.com\/?page_id=12\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Health Care and Victim Service Workers.<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/pages\/12"}],"collection":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/security2j2.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12"}],"version-history":[{"count":5,"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":777,"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/pages\/12\/revisions\/777"}],"wp:attachment":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}