Wednesday, May 30, 2012

Blue Card Australia - Easiest Ways To Get Your Construction Blue Card

To visit or work on a construction site in Queensland Australia you need a Blue Card. Australia has several different types of construction induction training course, depending on which state you're in, and the Blue Card course is the one you need if you live anywhere in Queensland.

In fact, you can't even get on to a construction site without one, so they're pretty important if you're a construction worker, labourer, tradesman, engineer, architect, project manager, soil tester, or a host of other occupations that need to visit construction sites!

Cyber Law

There are two main ways you can go about getting your Queensland Blue Card. Australia in general offers mostly only face-to-face training, but in Queensland you can also do your course online.

Blue Card Australia - Easiest Ways To Get Your Construction Blue Card

Face to face training typically takes four hours of your day to do the actual course, plus travel time, parking etc. etc. and so it can be a real inconvenience, to say nothing of lost income and productivity. This has been the traditional way to do this kind of training.

Blue Card Australia - Online Options.

But in recent years online alternatives have sprung up. Doing your Blue Card training online means you can choose when you do it - you can even complete the training during evenings or on the weekend, out of work hours - if you want to.

The best courses allow you to complete the training in several sittings - the software remembers where you got up to, so next time you login, you just start where you left off last time - very handy!

Interactive, multi-media courses are much more interesting, and easy-to-learn with than boring text hand-outs and bored presenters... the ease and speed with which you'll learn and retain the important information is amazing!

Identification Requirement For Online Blue Card Australia Courses.

New regulations introduced into Queensland in January 2008 require trainees to comply with several identification verification procedures so that the issuing Registered Training Organisation can be confident the trainee is actually who they say they are! You will have to provide a certified copy of ID like your Drivers License, and also get a Statutory Declaration (provided) witnessed by a Justice of the Peace (J.P.), or a Commissioner for Declarations (C.Dec.). Such people can readily be found in shopping centres, Post Offices, and office locations.

If you need to get your Blue Card Australia we recommend the online approach for convenience, speed and ease-of-learning.

Blue Card Australia - Easiest Ways To Get Your Construction Blue Card

Complete your Blue Card Australia training online in around 2 hours with this highly respected and convenient course. http://www.bluecardonline.com

watches mobile phone Buy Best Cycle Country Boomless Spray Boom Buy Cheap Town Food Service 16 Inch Aluminum Best Price Linemaster Twin 88Sh2 05 Classic Iv

Monday, May 28, 2012

Insuring a Joint Venture - Putting the Pieces Together

Joint ventures are a legal entity and thus they need insurance protection just like the normal Corporation would need. Sometimes joint ventures are formed for a specific project, to take advantage of a special relationship, or to create equity shares of an ongoing activity. Ventures can be corporations, limited partnerships, limited liability corporations, or a partnership. The legal status of the venture plays an integral part in the drafting an insurance portfolio program for the joint association.

The purpose of the joint venture is the first key factor that must be addressed in order to design the appropriate insurance program. If the agreement is for a short period of time, a limited period of time, or an ongoing period of time that will all determine the design of the general liability insurance program.

Cyber Law

Clearly the purpose of the joint venture and the length of time that the partnership is to be in existence will have a great impact on the insurance coverages and limits.

Insuring a Joint Venture - Putting the Pieces Together

There are normally four different avenues of providing insurance for the venture.

1. One option is for each individual member of the venture to cover their own exposure within the joint venture with their own insurance program.

2. The second option would be for the managing partner of the joint agreement to procure insurance in its totality for the partnership as a whole.

3. The third option is for the venture to have the commercial general liability insurance, workers compensation insurance, umbrella insurance, etc., all in the name of the joint venture in the design of the insurance program.

4. The fourth option which is not recommended very often is for one member to extend his or her insurance program to cover the joint venture and to extend the coverage for all the members within the one member's personal insurance program.

Knowing which insurance strategy to use of these four options can mean the difference between success and failure in designing the appropriate commercial general liability insurance program.

Insuring a Joint Venture - Putting the Pieces Together

R. Glenn Matsen, CEO, MBA, CPCU, ARM, CLU, ChFC has over 30 years of risk management experience in providing insurance solutions for the small business owners needs. His website contains detailed information on IT consultant insurance [http://technologyinsurancequote.net/it-consultant-insurance] and tech insurance [http://technologyinsurancequote.net/tech-insurance] issues.

watches mobile phone Buy Cheap Town Food Service 16 Inch Aluminum

Tuesday, May 22, 2012

Creating Your Perfect Article Summary - 7 Tips

What should be in your article summary?

It's otherwise known as an abstract or article teaser. The purpose of your article summary is to entice a potential reader to read the rest of your article. It's a sales pitch for the benefits your article delivers and in many cases, it makes the difference as to whether your article gets read or bypassed.

Cyber Law

Remove your "author/writer" hat and put on your "copywriter" thinking cap:

Creating Your Perfect Article Summary - 7 Tips

Here's what should be in your article summary:

Should be 2-7 sentences in length Emotional benefits listed that speak directly to your target reader's interests. Reasons why your target ideal reader should continue reading your article. Mentions of at least 4-7 keywords relating to your article topic using keyword research tools.
Here's what should not be in your article summary:

Do not repeat the title of your article or your author name in your summary. This is redundant. Leave out the sales pitch for yourself or your business. Leave out your URL and email address. Leave out any blatant self-promotion. You're here to do blatant article-promotion, not self- promotion. Never more than 2 paragraphs or 14 sentences.

7 Quick Tips To Help You Write Your Perfect Article Summary:

Tip #1) Don't start it with words like "This article contains this or that." Get right to the point and playfully tease your audience with the benefits that they will get if they take the next step to read the rest of your article.

Tip #2) If you don't know what to put in your summary -- use the first paragraph of your article. If you're a good writer, you already have your first paragraph loaded with hooks to grab the reader's interests to pull them into the rest of the article.

Tip #3) Your article conclusion paragraph can help provide clues for what should be in your article summary. Just don't give away the farm in the summary.

Tip #4) Your article summary is about the WHY, not the HOW. Sell them on why what you're presenting in the article is important to them and that they will learn the "how" if they continue reading.

Tip #5) Keep tips and strategies OUT of your article summary. Why buy the cow when you can get the milk for free. You're in sales mode, not teach mode.

Tip #6) Use smart keyword density research to ensure your article summary hits the key terms and keywords relating to your article. The worst thing you could do is include an article summary that uses 1-3 syllable words that barely mention your topic category. Be lavish with the rich use of buzz words and keywords that are related to your primary article topic. One word of caution: Write for the reader and not for the search engines. When you cross that line, you reduce your effectiveness over the long-term.

Tip #7) Originality matters. Your article summary should come from your brain. Never copy someone else's article summary or style if it's unique to them.

Creating Your Perfect Article Summary Conclusion:

Be brief and bold in your summary - promising the benefits your reader will get if they read on. This is your chance to pitch why your target reader will benefit personally if they continue reading your article. Unlike your resource box where you pitch yourself and your business or website address, the article summary is your article's only sales pitch. Leverage it well and don't waste the opportunity by overlooking this important article writing & marketing strategy.

Creating Your Perfect Article Summary - 7 Tips

Christopher M. Knight invites you to submit your best quality original articles for massive exposure to the high-traffic http://EzineArticles.com/ expert author community. When you submit your articles to EzineArticles.com, your articles will be picked up by ezine publishers who will reprint your articles with your content and links intact giving you traffic surges to help you increase your sales. To submit your article, setup a membership account today: http://EzineArticles.com/submit/

(c) Copyright - Christopher M. Knight. All Rights Reserved Worldwide.

mobile phone watches Best Price Rugged Ridge 13445 15 Black Denim Cheap Maxell Cleaning Tape Sdlt 1 S4 Cheap Whatman Polycap Tf 150 Ptfe Capsule Filter

Sunday, May 20, 2012

Ethical Considerations of Privacy and Cyber-Medical Information

In 1818, British author Mary Shelley's tale of Dr. Frankenstein's infamous creation startled and captivated a receptive audience. Just as the macabre, but resourceful, doctor created life from non-life that terrorized the local countryside, we have created a "cyberspace monster" that "lives" and knows no boundaries. It may not actually terrorize us, but we are likewise captivated by it. It profoundly influences and impacts our everyday activities, but it is also out of control and has spawned many controversial issues involving free speech, censorship, intellectual property, and privacy. The free market and society norm may, in some measure, be capable of regulating these issues and eventually help allay many of our concerns. A major and controversial concern that requires additional discussion is safeguarding the confidentiality of private medical information.

Expectations of Privacy and Private Medical Information

Cyber Law

According to attorney and privacy law specialist, Ronald B. Standler, "Privacy is the expectation that confidential personal information disclosed in a private place will not be disclosed to third parties, when that disclosure would cause either embarrassment or emotional distress to a person of reasonable sensitivities" (Standler, 1997). Another theorist, Ruth Gavison, defines privacy as "the limitation of others' access to an individual with three key elements: secrecy, anonymity, and solitude." Secrecy or confidentiality deals with the limits of sharing knowledge of oneself. Anonymity deals with unwanted attention solitude refers to being apart from others (Spinello, 2003). Basically, we want to protect the integrity of who we are, what we do, and where we do it. Regardless of our definition, the right of privacy usually concerns individuals who are in a place reasonably expected to be private. Information that is public record, or voluntarily disclosed in a public place, is not protected.

Ethical Considerations of Privacy and Cyber-Medical Information

The open architecture of the modern phenomenon that we call the Internet raises very unique ethical concerns regarding privacy. Information is sent effortlessly over this vast global network without boundaries. Personal information may pass through many different servers on the way to a final destination. There are virtually no online activities or services that guarantee absolute privacy. It is quite easy to be lulled into thinking your activity is private when actually many of these computer systems can capture and store this personal information and actually monitor your online activity (Privacy Rights Clearinghouse, 2006). The Net's underlying architecture is designed to share information and not to conceal or protect it. Even though it is possible to develop an adequate level of security, with an acceptable risk level, it is at enormous cost and considerable time.

Medical records are among the most personal forms of information about an individual and may contain medical history, lifestyle details (such as smoking or participation in high-risk sports), test results, medications, allergies, operations and procedures, genetic testing, and participation in research projects.The protection of this private medical information falls under the area of medical ethics. The realm of medical ethics is to analyze and resolve ethical dilemmas that arise in medical practice and biomedical research. Medical ethics is guided by strict principles or standards that address: Autonomy, Beneficence, Nonmaleficence, Fidelity, and Justice (Spinello, 2003). The principle of Autonomy includes a person's right to be fully informed of all pertinent information related to his/her healthcare. A discussion of medical ethical principles and patient rights leads us to further discuss legislation designed to maintain and protect these cherished rights.

Access to Private Medical Information and the Health Insurance Portability and Accountability Act of 1996

Since 400 B.C. and the creation of the Hippocratic Oath, protecting the privacy of patient medical information has been an important part of the physician' code of conduct. Unfortunately, many organizations and individuals not subject to this strict code of conduct are increasingly requesting this private information.Every time a patient sees a doctor, is admitted to a hospital, goes to a pharmacist, or sends a claim to a healthcare plan, a record is made of their confidential health information. In the past, all healthcare providers protected the confidentiality of medical records by locking them away in file cabinets and refusing to reveal them to anyone else. Today, we rely on "protected" electronic records and a complicated series of laws to maintain our confidential and private medical records.

Congress duly recognized the need for national patient record privacy standards in 1996 when they enacted the Health Insurance Portability and Accountability Act HIPAA). This act was effective April 14, 2003 (small health plans implementation date was April 14, 2004) and was meant to improve the efficiency and effectiveness of the nation's healthcare system. For the first time, federal law established standards for patient medical record access and privacy in all 50 states. The act includes provisions designed to save money for health care businesses by encouraging electronic transactions, but it also required new safeguards to protect the security and confidentiality of that information (Diversified Radiology of Colorado, 2002).

There are three essential parts to HIPAA: Privacy, Code Sets, and Security. The Security section is further subdivided into four parts: Administrative Procedures, Physical Safeguards, Technical Security Services (covering "data at rest"), and Technical Security Mechanisms (covering "data in transmission").

PRIVACY:

The intent of the HIPAA regulations is to protect patients' privacy and allow patients greater access to their medical records. The Act specifically addresses patients' Protected Health Information (PHI) and provides patients with greater access to and modification of their medical records. Prior to providing patient services, the Covered Entity must first receive the patient's consent to share PHI with such organizations as the insurance billing company, the billing office, and physicians to which the patient may be referred. Individuals must be able to access their records, request correction of errors, and they must be informed of how their personal information will be used. Individuals are also entitled to file formal privacy-related complaints to the Department of Health and Human Services (HHS) Office for Civil Rights.

CODE SETS:

Under HIPAA, codes are standardized to improve safety and security of health information. According to these new standards, a code set is any set of codes used for encoding data elements, such as tables of terms, medical diagnosis codes, procedure codes, etc.

SECURITY:

The security section is divided into four major parts:

1. Administrative, which requires documented formal practices, the execution of security measures to protect data, policies and procedures regulating conduct of personnel in protecting data, security training, incident procedures, and termination policies.

2. Physical Safeguards relate to the protection of physical computer systems, network safeguards, environmental hazards, and physical intrusion. One must consider computer screen placement, pass code protection, and computer locks to control access to medical information.

3. Technical Security Services refers to PHI stored on the computer network and how it is securely stored and accessed. Those using the PHI must be logged on and authenticated. An audit trail of authenticated access will be maintained for 6 years.

4. Technical Security Mechanisms refers to PHI transmitted over a communication network such as the Internet, frame relay, VPN, private line, or other network. PHI transmitted over a communication network must be encrypted.

There are also some noticeable shortcomings to HIPAA. The act did little to actually make health insurance more "portable" when an employee changes employers. Also, the Act did not significantly increase the health insurers' accountability for wrongdoing with provisions that are often difficult to monitor and enforce. There is also much confusion for patients, as well as healthcare providers, in regard to the interpretation of the act (Diversified Radiology of Colorado, 2002).

Other Laws, Regulations, and Decisions Regarding Private Medical Information

Besides HIPAA, there are important state regulations and laws, and federal laws and legal decisions, concerning the privacy and confidentiality of medical information (Clifford, 1999):

The Privacy Act of 1974 limits governmental agencies from sharing medical information from one agency to another. Congress declared hat "the privacy of an individual is directly affected by the collection, maintenance, use and dissemination of personal information ...," and that "the right to privacy is a personal and fundamental right protected by the Constitution of the United States ..." (Parmet, 2002).

The Alcohol and Drug Abuse Act, passed in 1988, establishes confidentiality for records of patients treated for alcohol or drug abuse (only if they are treated in institutions that receive federal funding).

The Americans with Disabilities Act, passed in 1990, prohibits employers from making employment-related decisions based on a real or perceived disability, including mental disabilities. Employers may still have access to identifiable health information about employees for reasonable business needs including determining reasonable accommodations for disabled workers and for addressing workers compensation claims.

Supreme Court decision in Jaffee v. Redmond: On June 13, 1996, the Court ruled that there is a broad federal privilege protecting the confidentiality of communication between psychotherapists and their clients. The ruling applies to psychiatrists, psychologists and social workers.

Freedom and Privacy Restoration Act of 1999: Designed to prohibit the creation of government unique medical ID numbers.

Managed Care and Cyber Threats to Private Medical Information

The introduction of the Internet and the advances in telecommunications technology over the last two decades allows us to access vast amounts of medical information, regardless of time, distance, or remoteness, with relative ease. This cyber access to medical information has profoundly changed how healthcare providers treat patients and offer advice. No longer are there barriers to the efficient exchange of health information and critical life-saving medical information. In addition to the many benefits of cyber access to medical information, there are also serious threats to our personal privacy and our medical information.

The intense interest for the protection and privacy of medical information is driven by two major developments. The first is the growth of electronic medical record keeping that has replaced paper records. A report from the National Academy of Sciences states that the healthcare industry spent between and billion on information technology in 1996 (Mehlman, 1999). This was the year that the Health Insurance Portability and Accountability Act was passed with most of the expenditure attributed to converting hard-copy information to electronic formats.Electronic medical records (EMRs) present a significant threat to maintaining the privacy of patient-identifiable medical information. This medical information can be retrieved instantaneously by anyone with access and passwords. Although hard-copy medical information can be easily copied, electronic records are much more easily copied and transmitted without boundaries.

The second major development that concerns the privacy of patient information is the overall growth of managed care organizations. There is a demand for an unprecedented depth and breath of personal medical information by an increasing number of players. In contrast to traditional fee-for-service healthcare, the provider of care and the insurer can be the same entity. In this situation, any medical information in the possession of the provider is also known to the insurer. This is common in all forms of managed care, but most evident in closed-panel HMOs. This sharing of information increases the fear that the insurer may use the data to limit benefits or terminate insurance coverage (Mehlman, 1999).

Some managed care companies are reporting private medical information to an extreme in requiring providers to report to case managers within twenty-four hours any case that is considered a high risk potential for the client, a second party, the employer, or the managed care company. Examples include such things as possible danger to self or others, suspected child abuse, potential threats to national security or the client organization, client's request for records, complaint about Employee Assistance Program services or threat of a lawsuit, and potential involvement in litigation including confession or knowledge of criminal activity. No mention is made concerning client privacy or rights regarding the release of this information. Nothing is also said about what will be done with the information that is shared (Clifford, 1999).

Another issue with managed care companies is the large volume of data processed and the carelessness in handling medical information. A salient example deals with lost records as noted in a 1993 survey sample of San Francisco Bay Area psychologists. In this survey, 59% of reports were mailed or faxed to wrong persons, charts accidentally switched, or proper authorization not obtained (Clifford, 1999).

Maintaining and Protecting Electronic Private Medical Information

In order to maintain and protect valued private medical information, we must always be vigilant and proactive. Basic steps can be taken prior to using electronic information sharing. For example, when signing a "Release of Information" form, read everything carefully. If not clearly understood, ask questions. Also, remember that HIPAA grants you the right to request that your healthcare provider restrict the use or disclosure of your medical information. Make sure those who ask for information are properly identified and authorized to collect this information. Finally, make sure that the person collecting information uses at least two "identifiers" to ensure proper identification of patient (e.g. name, last four of social security number, address, telephone, number, birth date etc.

When dealing with electronic and computerized medical information, the situation gets more tenuous and much more complex. Secure networks and websites, passwords, firewalls, and anti-virus software, are unquestionably the first steps in a plan of protection. Passwords must be complex, using numbers, letters, and cases, yet also easily remembered. To maintain security, experts suggest that passwords be changed every 90 days or if they are believed to be compromised. In addition, any private medical information sent on the NET or non-secure networks should be encrypted. Encryption (64 or 128 bit) is translating information into a secret code where a key or password is required to read the information.

Further security is provided by using privacy enhancing P3P frameworks, filtering software (e.g. MIMESweeper), message authentication codes "(MACs), and "digital signatures." The Platform for Privacy Preferences Project (P3P) is a technological framework that uses a set of user-defined standards to negotiate with websites regarding how that user's information will be used and disseminated to third parties (Spinello, 2003). This P3P architecture helps define and improve cyberethics, improves accessibility, improves consistency, and increases the overall trust in using cyberspace. MACs utilize a common key that generates and verifies a message whereas digital signatures generally use two complementary algorithms - one for signing and the other for verification.

There has also some creative technology proposed for maintaining and protecting private medical information. In October 2004, the "VeriChip" was approved by the FDA for implantation into the triceps of patients. The chip is about the size of a grain of rice and is inserted under the skin during a 20-minute procedure. This invisible chip stores a code that can scanned to further release a patient's private medical information. This code is then used to download encrypted medical information. The procedure cost is about 0-200 (MSNBC, 2004).

Another more commonly used medical information tool is the "smart card," a credit card sized device with a small-embedded computer chip. This "computer in a card" can be programmed to perform tasks and store important information. During an emergency, paramedics and emergency rooms equipped with smart card readers can rapidly access potentially life-saving information about a patient, such as allergies to medication, and chronic medical conditions. There are different types of smart cards: memory cards, processor cards, electronic purse cards, security cards, and JavaCards. These cards are tamper-resistant, can be PIN protected or read-write protected, can be encrypted, and can be easily updated. These unique features make smart cards advantageous for storing personal medical information and are popular throughout the world. In Germany and Austria, 80 million people have the capability of using these smart cards when they visit their doctor (Cagliostro, 1999).

There is also a recent proposed government plan to create a national system of electronic health records (EHRs). Details include the building of a National Health Information Network that will electronically connect all patients' medical records to providers, insures, pharmacies, labs, and claim processors. The sharing of vital information could improve patient care, include more accurate and timely substantiation of claims, and be an asset to public health in emergencies. The goal is to have it operational by 2009. Even with laudatory goals of saving money, making medical care more efficient, and decreasing drug reactions and interactions, there are still inherent dangers to this national plan. There are valid concerns that pharmaceutical companies may attempt to market a new drug or device for your specific medical condition. There are also strong worries of exploitation and abuse of personal data. Who will monitor access to the information? There are also concerns that lenders or employers may rely on private medical information to make business decisions. Then there is always the ever present fear of hackers and pranksters retrieving your personal information. There are still so many questions unanswered (Consumer Reports.org, 2006).

In conclusion, we are now stuck with a "Cyberspace Monster" and all of its advantages and shortcomings. When we use cyberspace, we can have no expectations of privacy and we must accept a level of risk. Therefore, when transmitting and sharing private medical information, we must be always aware to take precautions in safeguarding our privacy as much as possible by using secure networks, P3P architecture, passwords, firewalls, encryption, message codes, digital signatures, and devices like smart cards and "VeriChips." Medical records are among the most personal forms of information about an individual, but we are challenged to find a balance between society's interest in protecting medical confidentiality and the legitimate need for timely access to critical medical information especially with fears of influenza pandemics and bioterrorism. When this information is transferred into electronic format, we have heightened concerns about maintaining and protecting this private data. With managed care, there is a demand for an unprecedented depth and breath of personal medical information by an increasing number of players. While the HIPAA provisions are a welcomed start in protecting our private medical information, we must remain vigilant of the ever increasing need to protect this special information.

References:

Cagliostro, C. (1999) Smart card primer.

Clifford, R. (1999) Confidentiality of records and managed care legal and ethical issues.

Consumer Reports.org (2006). The new threat to your medical privacy.

Diversified Radiology of Colorado (2002) History: HIPAA general information.

Mehlman, M. J. (1999) Emerging issues: the privacy of medical records.

MSNBC (2004) FDA approves computer chip for humans.

Parmet, W. E. (2002) Public health protection and privacy of medical records.

Privacy Rights Clearinghouse (2006) Internet privacy resources.

Spinello, R. A. (2003) CyberEthics: Morality and law in cyberspace. Jones and Bartlett Publishers, Sudbury, MA

Standler, R. B. (1997) Privacy law in the USA.

Ethical Considerations of Privacy and Cyber-Medical Information

Mr. Klemens is an accomplished author, writer, and practicing pharmacist. He has authored a book on integrative medicine (Mountains and Rivers: Complementing your Healthcare with Alternative Medicine, ISBN: 1-4033-8672-2) and numerous articles in local, national, and international magazines, and web sites. Topics include integrative medicine, Oriental medicine, herbs and supplements, health and fitness, Scottish culture, and leadership and ethics. He is also listed in the Marquis Who's Who in America, a member of Clan Gregor, and is a Fellow of the Society of Antiquaries of Scotland.

http://www.writers.net/writers/22138

http://jksamurai.googlepages.com/home

cell phone watches Buy Best Supra Cables Mains Block Md 06Us Buy Crl 8 Woods Powr Grip Vacuum Cup

Friday, May 18, 2012

Family: Are Family A Gift Or A Curse?

There are some families in the world that are filled with love and connection. These families' work together, to support and assist each other and not because they have to; but because they want to. To them, family means much more than just a word or the DNA that may connect them to each other.

Here, there is no talk or suggestion of obligations and conditions needing to be fulfilled; what is done is done out of love and only love.

Pure Fantasy

The above description is clearly an example of what the perfect family might look like. And let's face it; how many people have that? To many people the above may sound like something out of story.

As well as the above example there is also the other end of the spectrum and of course somewhere in-between. I do not believe that that it is as simple as there being three categories. However for the purpose of this article I will keep it to these three.

The Other Extreme

So now that we have a description of what a functional family may look like, let's take a look at what a dysfunctional family can consist of.

The modes operandi of this family is not love and it is not support either. Its whole foundations are built on obligation and control and fear is always in operation.

Different forms of abuse are seen as normal and acceptable and the people within the family are often viewed as possessions. There might be examples of tyranny in other countries in the media; but in this family, it is a lot closer to home.

The Family

The family that one is brought up around will go along way into defining how one sees themselves and how one sees the world. This is an environment that will go along way into shaping ones mental, emotional and physical health.

And this is because what we learn about ourselves and the world is usually set by what is going on in our earliest environments. How one was responded to and how the family behaved around others has incredible consequences. And these consequences have the potential to be experienced for many years after

Aware And Unaware Families

In each of these two examples what is clear to see is that the level of awareness between these two examples is radically different. And what is also clear is that how aware a family is will be a defining factor in how the child will be raised.

However, when the child is brought into the world and is exposed to the behaviour of the family; it does not understand the above. To the child everything that happens is taken personally. It does not have the capacity or ability at that time to see, that how it is being treated is a reflection of how the individuals in the family treat themselves.

And how they treat themselves will often come back to how their family behaved during their younger years. It might also be the result of what happened later in their life. An example of this is where one chooses to be different and not allow their childhood to define them. This of course depends on the individual's awareness.

The Identity

After all these years of conditioning; one now has an identity. If one was born into a family that was fairly aware or even moderately aware; then their identity has the potential to be reasonably empowering.

Here one would have received enough mirroring and validation to support them and therefore create a fairly functional self image. Although ones image can change through ones life, it is always easier to change that image if ones original image was fairly empowering.

This is because one is more likely to have the mental power and external validation to believe in oneself enough to change.

Dysfunctional Identity

Now let's focus on the family that has very little awareness, both individually and therefore - collectively. The chances that one was exposed to abuse and experienced abuse are pretty certain. So ones image is not only influenced directly, but also indirectly because of the family lack of awareness.

And this lack of awareness is what is leading to dysfunctional behaviour. This can be classed as the different kinds of abuse and could be: mental, emotional, intellectual, spiritual or physical abuse.

The important nurturing factors like mirroring and validation are then likely to be nonexistent. So not only will one have an identity that is completely dysfunctional, but one's precious inner life will also be unknown or denied at this time.

The Story

So what happens now? After one has experienced a dysfunctional upbringing it is always going to create challenges. This kind of upbringing can define ones whole life. And it can also be defined in a way that is classed as positive or in a way that can be classed as negative.

Traditionally the family that was in born into is meant to be who they are. What one can achieve and what one cannot achieve is interpreted through the family that one was born into.

The upbringing that one has creates their story. And this story typically includes who one is and what one is capable of. Each of these aspects and anything to do with ones story is always based on the past. It has nothing to do with who one is at this moment. And this is where ones freedom and empowerment come from.

A Gift Or A Curse?

Above I mentioned how ones upbringing can be defined in a way that is positive or negative. This might sound a bit confusing; how can something so dysfunctional be positive? When one has these dysfunctional experiences there are clearly no benefits to what has happened. Taken literally there is clearly nothing positive about these kind of experiences.

The ego mind will also hold onto everything that has happened. Emotions like: anger, rage, frustration and pain that were experienced may well be felt as if they happened yesterday.

One is likely to feel the need for revenge and want to change the past in any way that is possible; constantly replaying the scenes in their mind. The ego mind will keep everything alive and never let it go. It then becomes impossible for to ever leave the past and be in the present.

A Curse

To the mind the past will always be a curse. Like a dog with a bone, it will go over and over the past. And this is where the duality of the mind comes into play. On one side it feels wounded and hurt by the past; which creates the idea that it wants to heal and move on from it.

But the on the other side we see a very different story. Although these dysfunctional experiences have caused great pain and suffering, to the mind they are what is familiar. And the ego minds whole existence and identity is based on the past. They are familiar and therefore safe to the mind and it then becomes irrelevant as to what kind of experiences these were.

So even though ones past memories might be traumatic; to the mind they have become its whole identity. It would be interpreted as death to the ego mind to let them go. For as long as one has become identified to their ego mind it will be practically impossible to move on and it will become a curse.

A Gift

Through the observing of one's ego mind and processing the trauma from the past one can begin to move into the present moment. And this is a process that includes validated and acknowledging ones story. This story is not to be denied and it is not to be taken as the truth of who one is.

Here one can then start to view the past in a new light. The meanings that one gives their past will always be unique to them. One might view the past in metaphorical or in symbolic terms.

And from this place one may have the urge to offer ones insight to others that need it. One can also be an example to others in the way they behave and respond to life.

One might never know why they were born into a certain family and perhaps this doesn't matter. What one can do is have the gift of awareness and this can allow one to define who they are and to no longer be defined by their past.

My name is Oliver J R Cooper and I been have been interested in self enquiry for over eight years. For just over a year, I have been expressing my understandings with these transformational writings. One of my intentions is to be a catalyst to others, as other people have been and continue to be to me.

Article Source: http://EzineArticles.com/7028424