A Different Voice Serving the Sisseton-Wahpeton Oyate

Tag archive

Policy

Is Banishment Really The Answer

Chairman Flute advocates “Banishment” as a traditional way to tackle the use and abuse of methamphetamine on the Lake Traverse Reservation.  In the 26 April 2017 edition of The Chairman’s Corner1, he proposes three (3) levels of banishment with penalties ranging from banishment from “all Tribal property” for first time offenders, all the way to a 25-year-to-life banishment for third offenses. He fails to state clearly which offenses would count for his three strike policies, although the article begins with “increasing penalties for those that continue to manufacture meth and smoke meth in our community.”  There is a big difference between smoking meth to manufacturing meth. Furthermore, he offers no evidence to support that banishment will decrease meth use and abuse.

Banishment as Public Policy

Before allowing Council to vote “Yes”, the entire Oyate needs to be well-informed about the details of this policy and how it will be applied fairly to all.  Banishment may be the current fad amongst tribes battling meth and other drugs, but there is no evidence as of yet that it would be effective in curbing methamphetamine usage and abuse.  Currently the Standing Rock Sioux Tribe, the Allakaket Tribe, and the Cheyenne River Tribe have all boarded the Banishment Train specific to meth.  Chairman Flute singles out methamphetamine for banishment without including other destructive or addictive behaviors like embezzling, gambling, alcohol, nicotine use, other drug abuse, or deviant sexual behaviors like child molestation and rape.

If the Oyate wishes to go forward with banishment, we should do it in a careful, studious way to determine if it really impacts methamphetamine use.  We have many resources to do this including our own Research Office (with an established Institutional Review Board to ensure the rights of the participants), Law Enforcement, Community Health practitioners, and other clinical and ancillary providers in our community. If done properly, a research-based approach would inform all Tribal Leaders on just how effective banishment is, because right now, there is no data to support this action.

Some say banishment is just another way of disenfranchising Tribal Members.  Donna Ellis2 goes so far to state that

Banishment is another form of cultural genocide and an example of internalized oppression

Prior to leaping to banishment, in addition to current efforts, we should try evidence-based approaches to prevention, harm-reduction, treatment, and recovery. Options include increasing funding for youth activities, harm-reduction strategies like needle exchanges, and evidence-based recovery models like SMART Recovery (Self-Management and Recovery Training).

Chairman Flute touts banishment as “Traditional”, but is stripping Tribal Members of access to their identity and culture really the Dakotah Way?


SOURCE CITATION(S):

Flute, “Chairman’s Corner – Updating the Oyate”, Sota Iya Ye Yapi, 26 April 2017, Accessed on 25 April 2017. [Time travel is just one of my many skills.]

Ellis, “The High Cost of Tribal Banishment”, Indian Country Today, 7 October 2014.  Accessed on 25 April 2017.

IMAGE CREDITS:
Meth Paraphernalia: https://www.pinterest.com/juliaogles99/speed/?lp=true, Accessed 25 April 2017
Policy Stages: http://www.giarts.org/article/tools-support-public-policy-grantmaking, Accessed 25 April 2017

SWO’s Computer Use Policy

Uncategorized by

I have copied Section 4.8 – Network Security for Portable Devices for your review.  I’ve read this section a million times.  I have stopped strangers on the street and read it to them and then asked, “So, would this policy apply to a flashdrive?”  Every Single Person has answered “no, it would not – because flashdrives don’t have personal firewalls or anti-virus protection”.  There are links below that will bring up the “Computer Use Policy” in its entirety and the SWO Personnel Policy Manual.

 

4.8 Network Security for Portable Devices

Introduction

Portable devices offer staff the ability to be more productive while on the move. They offer greater flexibility in where and when staff can work and access information, including information on our network. However, network-enabled portable devices also pose the risk of data theft and unauthorized access to our network. Any device that can access the network must be considered part of that network and therefore subject to policies intended to protect the network from harm. Any portable device that is proposed for network connection must be approved and certified by the IT department.

Protecting the Portable Device

In order to qualify for access to the Tribal network, the portable device must meet the following conditions:

  1. Network settings, including settings for VPN, must be reviewed and approved by IT support personnel.
  1. A personal firewall must be installed on the device and must always be active. Recommended firewall software is Zone Labs’ ZoneAlarm, Norton Internet security and Windows Firewall.
  1. Anti-virus software must be installed. Software must have active scanning and be kept up-to-date. Recommended anti-virus software is Norton Antivirus, AVG Antivirus, and, TrendMicro.

Portable Device User’s Responsibilities

  1. The user of the portable device is responsible for network security of the device whether they are onsite, at home, or on the road.

2. The user of the portable device is responsible for keeping their anti-virus scanning software up-to-date at all times. It is strongly recommended that they update their anti-virus software before going on the road.

 

SWO Computer Use Policy

 

2015 SWO Personnel Policies with Revisions

 

 

 

A Real Challenge – Policy That Makes Sense

SWO Politics by

I didn’t think the “Flash-Drive Controversy” would go this far, but word has it that the Old Agency District (or just 7 people) voted to remove the Vice-Chairman claiming he “misused a flash drive” according to SWO Policy.  Now that we’ve all gotten beyond our WTF moment, let’s review the policy.  SWO’s Computer Use Policy starts on page 77.

2015 SWO Personnel Policies with Revisions

If you can explain to me how anything within this Computer Use policy, Chapter XIII, applies to a flash drive, I will buy you lunch, hot and fresh – a $8.99 value!  Stay tuned and I will post my analysis of this Chapter as well.

An IT Breach or an IT Failure?

SWO Politics by

As I was listening to the District Chairman’s Association, I was struck by how many came in to “Investigate the Vice-Chair’s Office and/or Political Appointees for an IT Breach of confidential information.”  Let’s review what happened.

Apparently, the Vice-Chairman and/or his political appointees wanted to review their budget.  Each office has the right to do that, and furthermore, since the Vice-Chairman’s office oversees all budgets, he has the Constitutional duty to examine all budgets.  They ran into a problem however, because the Information Technology (IT) Department had not yet set them up with computers and the equipment they needed to complete their job duties.  This is an failure on the IT Department, as they had plenty of notice that new persons would be coming on board.  The election was held in November 2016, after all, so that’s two months lead time.

I’m told they spoke with IT and IT gave them a portable jumpdrive to transfer documents to.  The budget specialist then gave them the budget matrix on that drive.  Sounds like a simple solution.

I imagine the political bruhaha started about now.

FACTS:

  1. The Vice-Chairman acted within his authority.  It is the duty of the Vice-Chairman to review and administer the financial affairs of the Sisseton-Wahpeton Oyate.  See the By-laws of the Sisseton-Wahpeton Oyate, Article I – Duties of Officials, Section 3. Vice-Chairman, (f) The Vice-Chairman shall oversee all financial and business matters of the Tribe.
  2. Budgets are not confidential.  Tribal Governement spends our money and we have the right to know how our government spends it.  The budgets are held in a simple Excel spreadsheet with no security whatsoever and are freely shared.  In fact, current Chairman Dave Flute has shared the budget outside of the tribal email system in the past under the same policies in effect now, so I am not sure why anyone would fault the current Vice-Chairman for simply having the file.

I really don’t see the issue with the Vice-Chairman and his political appointees.  If there was a failure of duty, it would fall on the IT Department for not having the Vice-Chairman’s office set up with the equipment they needed to carry out their elected duties.

OTHER CONCERNS MUDDYING THE WATERS

SOCIAL SECURITY NUMBERS!!  I’ve heard that people were concerned about the Social Security Numbers within that file.  Oh?  Why would that be?  Social Security numbers should be confidential information and held only by the HR Department.  Then my question is “Why would the budget specialist have social security numbers on her computer?”  Wouldn’t that be a violation of confidentiality on her part then?  Since she was installed with the previous Vice-Chairman, was she directed to keep SSNs on file or did she keep them at her own discretion?  For what purpose?

CHAIN OF COMMAND!!  The Vice-Chairman did follow the chain of command.  As previously established, he has the right to review budgets, he directed his political appointees to begin the process, and the Budget Office reports directly to the Vice-Chairman.

If there must be a call for an “Investigation”, logically the investigation should look at these two departments:

  • Budget Office and Budget Specialists – why do they have SSNs in their files?  For what purpose?  Since this was the previous administration, it would involve looking not only at one remaining budget specialist, but the other budget specialist, the political appointees – Laura Williams (currently working as Chairman Flute’s political appointee) and Viva DuBois, and the previous Vice-Chairman Garryl Rousseau.
  • IT Department – Why didn’t they have the Vice-Chair’s office set up and ready to go when they took office? Why did it take an entire week to accomplish?  The Information Technology department currently reports to Chairman Flute, although, up until December 2016, they reported to previous Vice-Chairman Garryl Rousseau.

Performance Improvement

https://www.brainyquote.com/quotes/quotes/w/wedwardsd672626.html

 

My background really focuses on performance improvement, which involves looking at a process, program or department and identifying key performance measures.  Those measures must be quantitative (as in numbers).  Those numbers/measures are then tracked for a period of time to determine where the program is at (baseline).  I then choose benchmarks – or goals to shoot for.  When a program can’t reach their goals, there is an underlying cause.  We then analyze the program, the policies, the environment and the people involved to determine why the goals can’t be reached and what can be done about it.

STEPS

  • Identify key metrics (what we’re going to measure)
  • Measure our current performance (baseline)
  • Set goals (benchmarks)
  • Find out what is causing problems in reaching the benchmarks
  • Create solutions
  • Repeat

As you can see, it’s a cycle that’s repeated over and over again.  That’s why it’s often called “Continuous Quality Improvement”.  So how can we apply that to our Tribal Government?

 

Find out more at the following links:

Baldrige Performance Excellence – This is how I structure my Performance Improvement programs and activities.
Six Sigma Basics

Go to Top