Search
https://www.acacamps.org/blog/power-engaging-diversity-hiring-international-exchange-visitors
The Power of Engaging Diversity by Hiring International Exchange VisitorsThe world has 206 sovereign states — are you maximizing the opportunities for diversity at your camp?
https://www.acacamps.org/blog/how-avoid-your-master-plan-gathering-dust
How to Avoid Your Master Plan Gathering DustA traditional and well-conceived master planning process allows you to leverage your facility to provide exceptional programs and avoid critical errors in terms of building placement, cost, and...
https://www.acacamps.org/blog/campwire-episode-37-camp-staff-recruiting-finding-diverse-organizations-campus
CampWire Episode 37: Camp Staff Recruiting - Finding Diverse Organizations on CampusThis podcast talks about how to find organizations for BIPOC students, why it is important to hire diverse staff members for summer camp, and how diversity can impact the culture of your camp.
https://www.acacamps.org/blog/creating-inclusive-culture-increase-staff-retention
Creating an Inclusive Culture to Increase Staff RetentionA camp culture where everyone feels a sense of belonging can lead to better staff retention.
https://www.acacamps.org/blog/tips-lyme-disease-prevention-camp
Tips for Lyme Disease Prevention at CampAs staffers, parents and kids prepare for another memorable summer at camp, there is one important detail that must not escape our attention - doing everything possible to ensure that children are...
https://www.acacamps.org/article/camping-magazine/risk-management-privacy-security-risks
Risk Management: Privacy and Security RisksThe right to privacy is well established in the legal system of the United States. As citizens of the United States, we expect that our right to privacy will be respected. Virtually all businesses...
https://www.acacamps.org/article/camping-magazine/computer-network-security-evolving-risks
Computer Network Security — Evolving RisksAccording to some experts, 2012 could be the worst year ever for computer network security breaches. In 2011, major companies were victims of massive computer network security breaches. If you listen...