PARENT UNIVERSITY OFFICER JOE BOYD OFFICER RACHAEL FREEMAN
|
|
- Sheena Hodges
- 8 years ago
- Views:
Transcription
1 PARENT UNIVERSITY OFFICER JOE BOYD OFFICER RACHAEL FREEMAN
2 SRO DIVISION Sgt. Eric Debus Officers Chris Cobb and Diane Patterson (CHS) Officer RJ Harr (New Tech) Officer Joe Boyd (CMSW, Pinkerton, Wilson, Cottonwood Creek) Officer Trevor Grisso (CMSE, Mockingbird, Austin) Officer Rachael Freeman (CMSN & Victory Place, Denton Creek, Town Center, Lakeside)
3 TRIAD CONCEPT
4 LAW ENFORCEMENT OFFICER Uniformed, armed officer that investigates criminal activity and makes arrests when necessary Uniformed officers serve as a deterrent for students and other citizens Work with other law enforcement agencies and serve as a liaison between the school and police department Officers serve as a positive role model for students
5 TEACHER/GUEST SPEAKER Officers will be asked to speak to students about various topics, including but not limited to: drug and alcohol prevention, bullying, social media, forensic science, blood spatter, criminal investigations, observation and documentation, The Constitution/Bill of Rights. Officers will often be contacted during Red Ribbon Week for presentations, and community programs like Shattered Dreams. Officers can provide educational resources for classrooms and community organizations.
6
7
8 INFORMAL COUNSELOR Officer will work within the context of knowledge, training, and the expertise of a law enforcement officer to suggest a solution to a problem. Officers work closely with administrators and employees of the district. Officers can provide information on community services and the law to students, parents, and staff. Did you know the Coppell Assistance League provides free drug test kits to parents in Coppell?
9 STANDARDIZED RESPONSE PROTOCOL (SRP) On September 27th, 2006 a gunman entered Platte Canyon High School, held seven girls hostage and ultimately shot and killed student, Emily Keyes. During the time she was held hostage, Emily sent her parents these text messages: "I love you guys" and "I love u guys. k?" Emily's kindness, spirit, fierce joy, and the dignity and grace shown by the Keyes family following this tragic event define the core of The "I Love U Guys" Foundation. Mission The "I Love U Guys" Foundation was created to restore and protect the joy of youth through educational programs and positive actions in collaboration with families, schools, communities, organizations and government entities. Coppell ISD has been utilizing SRP since 2011.
10 STANDARDIZED RESPONSE PROTOCOL (SRP) The Standard Response Protocol (SRP) is based not on individual scenarios but on the response to any given situation.
11 SHELTER! Shelter is always followed by a type and a method and is the protocol for group and self protection. Generally used for weather issues, earthquakes, or hazmat situations. In a real weather emergency, the schools are much safer than your homes or vehicles. Please allow your child to remain on campus until the weather event is no longer a threat.
12 EVACUATE! Evacuate is always followed by a location, and is used to move students and staff from one location to a different location in or out of the building. We can evacuate for many reasons; fire hazard, safety hazard, biohazard.
13 LOCKOUT! Lockout is followed by the Directive: "Secure the Perimeter" and is the protocol used to safeguard students and staff within the building. The potential threat is located outside of the campus. It could be a person (shooter in the area), a situation (a traffic stop where an arrest is made or a robbery in progress at a close business), or an animal. The exterior doors will remain locked and secure, and the school will conduct business as usual.
14 LOCKDOWN! Lockdown is followed by "Locks, Lights, Out of Sight" and is the protocol used to secure individual rooms and keep students quiet and in place. The threat is inside the building. Exterior doors will be secured allowing no one to enter the building. Inside, students, staffs, and visitors will be in a locked room, with the lights out, and will remain out of sight. It works. Coppell ISD runs 4 lockdown drills at EACH campus every year, and 2 at CHS.
15 IN A REAL EMERGENCY Please follow/like Coppell ISD, Coppell PD, and Coppell FD on Facebook and Twitter. Coppell PD also has a Community Liaison Officer, Peter Dirks, on Facebook. This is the fastest way to disseminate real time information to the masses. Any major event will be pushed out via these pages.
16 SOCIAL MEDIA AND YOUR STUDENT
17 Twitter online social networking service that enables users to send and read short 140-character messages called "tweets." Registered users can read and post tweets, but unregistered users can only read them. Uses the # symbols. Tumblr- Another blogging platform, owned by Yahoo!, which allows the user to post media (pics, video, etc). Currently has over 261 million blogs. Instagram- online mobile photo-sharing, videosharing and social networking service that enables its users to take pictures and videos, and share them on a variety of social networking platforms, such as Facebook, Twitter, Tumblr and Flickr. Vine -short-form video sharing platform where users can share six-second-long looping video clips. Owned by Twitter.
18 Snapchat- a messaging application that allows the user to take a photo or video, add a caption or doodle, and send it to a friend(s). Friends can view snaps for up to 10 seconds, and then it disappears, allowing the media to never be seen again or does it? SnapGrabber/SnapCapture/SnapBox/Snapchat Saver/SnapCrack/Casper/Save My Snaps/Snap Saves- Allows you to download and save Snapchat files without notifying the original sender. Yik Yak & Gaggle - allows people anonymously to create and view discussion threads and photos within a 5-mile radius. Users are assigned a random name (ha54bx) and image (usually an animal), and all users within a 5 mile radius can see the post. Periscope- created by Twitter that allows users to broadcast live video and audio online. It has become a concern of the parents of many of the children and teenagers. The fear is that they are opening themselves up to all situations of abuse. Another is concern is the location sharing feature. If users neglect to turn off the location sharing feature, viewers can locate the Periscope user. A social networking site that lets users tailor their searches for potential social contacts by age and geography.
19 Kik & WhatsAp - An instant message service that also allows photo sharing. It is loaded with spammers attempting to share sexual content. Tinder- A dating application that allows you to swipe left or right (if you dislike/like) the user s image. It pulls geographical location from your phone showing other tinder users near you. Omegle a free online chat website that allows users to communicate with others without the need to register. The service randomly pairs users in one-on-one chat sessions where they chat anonymously using the names "You" and "Stranger" or "Stranger 1" and "Stranger 2" in the case of Spy mode. oovoo- a video chat and messaging app, and is available for Apple and Android devices, or on a computer (PC or MAC). You can video chat with up to 12 people at a time; you can see four people at once on screen during these video chats. MeerKat- A live video streaming app that allows users to share real time video with viewers on the app and on Twitter. The app has opened doors to kids to be vulnerable to cyberbullying exposure to inappropriate content, and sexual predators.
20 Burnbook/Burn Note - An app for users to anonymously post pictures and text. It has become a collection of harsh comments and threats from students directed at their peers. Burn Note- online message with a timer that can only be viewed once by the recipient. The timer starts when the recipient opens the note and automatically destroys the Burn Note once they're done reading it. Whisper- allows users to send messages anonymously, and to receive replies. Users post messages which are displayed as text superimposed over an image, similar to greeting cards. Ask.fm- is an anonymous question and answer platform website that allows anyone to post anonymous comments and questions to a person's profile and is increasingly being used as a means to communicate abusive, bullying and sexualized content. Is this all?
21 SUGGESTIONS FOR PARENTS Discover the Internet together, but prescreen what you choose to allow your student to view. Agree with your child rules for Internet use in your home. Limit time/usage/location of computer. Encourage your child to be careful when disclosing personal information. Have them make their social media accounts private, and to only allow users that they actually know personally. Talk about the risks associated with meeting online friends in person. How easy is it?
22 MORE TIPS Teach your child about evaluating information and being critically aware of information found online. <Gun threat> Report online material you may consider illegal to the appropriate authorities. Encourage respect for others; stamp out cyberbullying. Let your children show you what they like to do online. Remember that the positive aspects of the Internet outweigh the negatives.
23 CONVERSATIONS TO HAVE Permanence Privacy Sexting Consequences Cyberbullying Safety
24 REFERENCES
25 KRISTIN PANGLE CRIMESTOPPERS
15 Dangerous Apps Every Parent Should Know About
15 Dangerous Apps Every Parent Should Know About It s safe to say that the advent of the digital age and specifically the Internet, smartphones and social media have brought unique and daunting challenges
More information!! What dangers do your!children!face when they go online?!! All!who!participate!in!activities!online!face!risks!when!they!use!the!
What dangers do yourchildrenface when they go online? Allwhoparticipateinactivitiesonlinefaceriskswhentheyusethe Internet,includingadults.Theworldisconstantlychangingwithnew technologyavailabledaily.itmayfeeloverwhelmingwhenwefocuson
More informationHow To Avoid The Identity Theft Predators
Camp Watwuzithinkin How To Avoid The Identity Theft Predators Predator 0 An organism that lives by preying on other organisms Identity Thief 0 A person who makes a living by preying on other people Outsmart
More informationLiving Online: Using Technology Wisely Lesson. Guide
Living Online: Using Technology Wisely Lesson Guide Target Audience Adolescents 11-14 Time Entire program 1 hour, depending on discussion Program Objectives Ways to portray a positive image online How
More informatione-safety for Parents
e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology
More informationPARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com
PARENTING IN THE DIGITAL AGE Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com Teens and Technology Use 78% have a cell phone 95% use the Internet 91% have an email address 74% access the
More informationKingsley Park Primary School. 1-1 ipad Program BYOD
Kingsley Park Primary School 1-1 ipad Program BYOD 2016 Kingsley Park Primary School ipad 1-1 BYOD Program In 2015 KPPS implemented a 1-1 BYOD [bring your own device] Program for Grades 4-6. We will be
More informationA Parents' Guide to. Snapchat. 2013 ConnectSafely.org
A Parents' Guide to Snapchat 2013 ConnectSafely.org Top 5 Questions Parents Have About Snapchat 1. Why do kids love Snapchat? They love the spontaneity of it. It s been (rightfully) drummed into their
More informationAffirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
More informationEVACUATION Fire / Explosion / Smell of Smoke / Gas Odor / Fire Alarm / Bomb Threat
Emergency Procedures Quick Reference Guide Faculty Edition EVACUATION Fire / Explosion / Smell of Smoke / Gas Odor / Fire Alarm / Bomb Threat LOCKDOWN Intruder / Weapon / Hostage /Active Shooter / Hostile
More informationNower Hill High School
Nower Hill High School An introduction to E-Safety Louise Voden, Ben Ford & PC Ian Scanlon Outcomes: Highlight the potential risks young people may face online Describe the technologies and functions Outline
More informationSarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
More informationNew Social Networking Apps
Do you track your child s Facebook account and texting (We certainly hope so!)? Well, time for an update on alternative networking and messaging apps teens are using (often with a much more raw side of
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationPleasant Hill Police Department School Resource Officer Annual
Pleasant Hill Police Department School Resource Officer Annual 2015 Report Compiled by: School Resource Officers Brandon Killam and Adam Choat 2014/15 School Year Report Southeast Polk School District
More informationSocial Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
More informationOnline Reputation. Luke 29/09/2015. Never give out your personal information. www.thinkuknow.co.uk. www.ceop.police.uk
Online Reputation Luke www.ceop.police.uk www.thinkuknow.co.uk Child Exploitation Online Protection Centre (CEOP) Never give out your personal information Parents 1 When should I report to CEOP? How to
More informationA Parents Guide to. 2014 ConnectSafely.org
A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.
More informationDallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
More informationBlog, Tweet and Facebook Your Way to Success SELF-PROMOTION THROUGH SOCIAL MEDIA: INSTAGRAM
Blog, Tweet and Facebook Your Way to Success SELF-PROMOTION THROUGH SOCIAL MEDIA: INSTAGRAM Spring 2013 WHAT IS SOCIAL MEDIA? The term social media refers to forms of electronic communication (websites
More informationSOCIAL MEDIA: Make it part of the plan. Marcus Betschel
SOCIAL MEDIA: Make it part of the plan Marcus Betschel Today Why social media is important How you can use social media How you can measure social media What about content? The traditional advertising-led
More informationParents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
More informationThe webcast will begin shortly. Please stand by.
The webcast will begin shortly. Please stand by. @Gaggle_K12 Making Student Safety A Priority @Gaggle_K12 Webcast Tips ü To switch from computer audio to your phone, locate the Audio Pane, select Use Telephone
More informationRushern L. Baker, III County Executive. Presented By: Eben Smith, Contract Compliance Officer Minority Business Development Division
Rushern L. Baker, III County Executive a Presented By: Eben Smith, Contract Compliance Officer Minority Business Development Division 1 2 3 4 5 Social media includes web- and mobile-based technologies
More informationFamily Day Teen Toolkit. Conversation Starters, Facts, Family Fun Ideas and more!
Family Day Teen Toolkit Conversation Starters, Facts, Family Fun Ideas and more! Table of Contents Countdown to Being an Engaged Parent 10 Warning Signs of Teen Substance Use.......1 9 Social Networking
More informationEMERGENCY RESPONSE PLAN SUMMARY PRESENTATION
EMERGENCY RESPONSE PLAN SUMMARY PRESENTATION Risk Assessment Committee Statement of Purpose The Emergency Response Plan is a comprehensive framework for the management of critical incidents, issues, or
More informationEmergency Preparedness Plan Assessment
Emergency Preparedness Plan Assessment School Corporation: Completed by: School Representatives: School: Date: This assessment represents a one day review that may or may not be the total depiction of
More informationA school crisis is any event that drastically disrupts or alters a normal school day for your campus. More dynamic if the media covers the event!!
Critical Incident Management Instructor: Lieutenant Mo Canady, Hoover Police Department What Is A School Crisis?? A school crisis is any event that drastically disrupts or alters a normal school day for
More informationEMERGENCY RESPONSE PLANNING FOR SCHOOLS AND CHILDCARE PROGRAMS
EMERGENCY RESPONSE PLANNING FOR SCHOOLS AND CHILDCARE PROGRAMS Gregg Champlin (603) 223-3629 Gregg.champlin@dos.nh.gov School and Child Care Emergency Response Plans Requirements: K-12 Public and Nonpublic
More informationSafety & Security October 2015
Safety & Security October 2015 Intro PCC Facilities and College Police constantly monitor and strive to improve security and safety at the college. This presentation will cover improvement projects that
More informationA Parents' Guide to. 2014 ConnectSafely.org
A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram
More informationMiddleton-Cross Plains Area Schools. Crisis Preparedness Parents and School Emergencies
Middleton-Cross Plains Area Schools Crisis Preparedness Parents and School Emergencies Table of Contents Introduction... 1 What is an emergency?... 2 What do schools do to prepare or practice for emergencies?...
More informationToday s mobile ecosystem means shared responsibility
It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has
More informationThe Emergency Notification System and Protocol at Virginia Tech
Introduction The Emergency Notification System and Protocol at Virginia Tech Michael J. Mulhare, P.E., Director Office of Emergency Management Virginia Tech Blacksburg, VA 24061 Telephone: (540) 231-2438
More informationAdministration & Finance
Issuing Office: Vice Chancellor Policy Number: FY13-A&F-004-01 for Policy Name: UMass Boston Alert System Original Date Issued: April 24, 2013 Revision #: 1 Last Update: August 13, 2014 Purpose of Policy:
More informationSAFE AND SECURE SCHOOLS PLAN
SAFE AND SECURE SCHOOLS PLAN This safe schools plan is a comprehensive set of coordinated efforts both at the school and district level, all aimed at three components: prevention, intervention and, when
More informationMt. San Antonio College Campus Emergency Response and Evacuation Plan
Mt. San Antonio College Campus Emergency Response and Evacuation Plan The Mt. SAC Board of Trustees is committed to providing a safe and secure campus work and learning environment for students, employees,
More informationBROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions
BOARD OF EDUCATION POLICY ADMINISTRATIVE GUIDELINE 6.6.1A(3) BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12 Employee Computer Use Agreement The district is pleased to
More informationPREPAREDNESS DRILL DOCUMENTATION FORM
SY 12/13 PREPAREDNESS DRILL DOCUMENTATION FORM District: School/Facility: Person Completing Form: Contact Ph: Drills & Recommended Frequency Date conducted Person conducting drill Time required to conduct
More informationSOCIAL MEDIA GUIDELINES FOR CANADIAN RED CROSS STAFF AND VOLUNTEERS
SOCIAL MEDIA FOR CANADIAN RED CROSS STAFF AND VOLUNTEERS INTRODUCTION Communities have the power to make the world a better place. We know this because we see it happen every day through the work of staff
More informationLakeside Safety, Security & Emergency Services
Safety, Security & Emergency Preparedness Panel Office of the Dean of Students Residential Life LSU Police Department Student Health Center Emergency Operations Student Advocacy & Accountability C.A.R.E.=
More informationPasswords Students should not share their assigned password, or attempt to discover the school Apple Id.
Alta Loma Christian School Acceptable Use Policy 1:1 ipad Program Revised January 20, 2014 Alta Loma Christian (ALCS) recognizes that access to technology in school gives students greater opportunities
More informationPolicies & Procedures. Moat Community College E-Safety Policy
Moat Community College E-Safety Policy Vision Statement Moat Community College embraces the positive impact and educational benefits that can be achieved through appropriate use of the Internet and associated
More informationTo host Ryan Holsopple at Performance Space 122 to imagine and explore new approaches to demand building for contemporary dance and theater
Legal Name Performance Space 122 Project Title To host Ryan Holsopple at Performance Space 122 to imagine and explore new approaches to demand building for contemporary dance and theater DDCF Grant Number
More informationAppropriate Use of Social Media and Cell Phones. Karen Haase. karen@ksbschoollaw.com KSB School Law @KarenHaase
Appropriate Use of Social Media and Cell Phones Karen Haase karen@ksbschoollaw.com KSB School Law @KarenHaase Raise your hand if You have a cell phone You use text messaging You ve taken photos with a
More informationSTAFF SOCIAL MEDIA POLICY
STAFF SOCIAL MEDIA POLICY July 2015 AIMS To safeguard and protect both members and staff when using social media. To ensure that members and staff can use social media with confidence. APPLICATION Given
More informationInternet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
More informationSocial Media Guidelines
Purpose for Social Media Guidelines: Guilford County Schools (GCS) realizes that part of 21st century learning is adapting to the changing methods of communication. The importance of teachers, students
More informationTECHNICAL EDUCATION CENTER OSCEOLA ST. CLOUD ANNUAL SECURITY REPORT
TECHNICAL EDUCATION CENTER OSCEOLA ST. CLOUD ANNUAL SECURITY REPORT HISTORY The Technical Education Center Osceola (TECO) opened its doors in April of 1994. TECO provides initial Workforce Development
More informationEADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
More informationHOW TO STAY SAFE. Smartphones
HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these
More informationMill Hill Years 9 &10 E-Safety / Social Media: Risk Danger - Harm Safely Navigating Uncharted Waters
Mill Hill Years 9 &10 E-Safety / Social Media: Risk Danger - Harm Safely Navigating Uncharted Waters Jon Taylor Social Media - Risk Danger - Harm Risk Danger Harm Downloading and use of Apps or websites
More informationComputer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
More informationSocial and Digital Media Policy
Social and Digital Media Policy October 2012 Version 1.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data
More informationCrisis Response with the Standard Response Protocol
Crisis Response with the Standard Response Protocol Crisis Response with the Standard Response Protocol Page 1 of 46 FORWARD The Standard Response Protocol (SRP) A critical ingredient in the safe school
More informationStaying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
More informationAcceptable Use Policy for Technology Catholic Schools of the Diocese of Brooklyn
Acceptable Use Policy for Technology Catholic Schools of the Diocese of Brooklyn 1. Purpose: Throughout the years, the Catholic Schools within the Diocese of Brooklyn have maintained a steadfast dedication
More informationLt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
More informationOCPS Tech Centers Orlando Campus. Annual Security Report
OCPS Tech Centers Orlando Campus Annual Security Report 2015 2016 1. Current campus policies regarding procedures for students and others to report criminal actions or other emergencies occurring on campus.
More informationDigital Safety and Privacy
Digital Safety and Privacy Class Description: As computers and the Internet become more and more the way we communicate, we need to be aware of potential threats to our security online. This class discusses
More informationEast Mississippi Community College. Scooba Campus * Mayhew Campus Department of Public Safety. Campus Emergency Action Plan.
1 East Mississippi Community College Scooba Campus * Mayhew Campus Department of Public Safety Campus Emergency Action Plan Revised 2013 TABLE OF CONTENTS 2 Foreword & Emergency Numbers Page 3 Active Shooter
More informationPRIVACY POLICY. Your Personal Information will be processed by Whistle Sports in the United States.
PRIVACY POLICY This Policy was last changed on March 31, 2015. Kids Sports Entertainment, Inc. d/b/a The Whistle ( Whistle Sports ) and its affiliates operate this website, and any and all Whistle Sports
More informationCRISIS PREPAREDNESS:
CRISIS PREPAREDNESS: Parents and School Emergencies The safety of our students and staff are top priorities for Holy Rosary School. www.holyrosaryschool.us Crisis Preparedness: Parents and School Emergencies
More informationCRISIS PREPAREDNESS:
: Parents and School Emergencies The safety and security of our students and staff are top priorities for Henrico County Public Schools. henricoschools.us henricoschools.us Contents Introduction...4 What
More informationGLOUCESTER COUNTY SPECIAL SERVICES SCHOOL DISTRICT SCHOOL SAFETY PLAN
GLOUCESTER COUNTY SPECIAL SERVICES SCHOOL DISTRICT SCHOOL SAFETY PLAN TABLE OF CONTENTS Introduction Purpose... 3 Objectives 3 Section 1 Health & Safety.. 4 Section 2 Campus Security and Safety Plan. 8
More informationE-Safety Awareness. Parents and Carers
E-Safety Awareness Parents and Carers Bullying online by people in my school year has left me with significant mental health issues for which I am now on medication and in therapy for. So it s really damaged
More informationSOCIAL MEDIA IN SCHOOLS. Guidelines for school staff using social media and other technologies. Licenced for NEALS
SOCIAL MEDIA IN SCHOOLS Guidelines for school staff using social media and other technologies Licenced for NEALS TITLE: Social Media In Schools: Guidelines for school staff using social media and other
More informationWorking Relationship with Local Law Enforcement Authorities. Department of Safety and Security Scope of Authority. How to Report On-Campus Crime
Working Relationship with Local Law Enforcement Authorities The working relationship with local police departments is limited to the reporting of crimes and information sharing. The working relationship
More informationCOPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act
The Children s Online Privacy Protection Act COPPA How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online A uknow White Paper by Tim Woda, co founder of uknow.com, Inc Overview
More informationipad Acceptable Use Regulation
ipad Acceptable Use Regulation The Mamaroneck School District has purchased Apple ipads for selected students of the Mamaroneck School District. These students will be issued ipads with predetermined applications
More informationSTOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION
STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the
More informationUSES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?
TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to
More informationFederico Beauty Institute. Campus Safety and Security Handbook
Federico Beauty Institute Campus Safety and Security Handbook I. Campus Geography Federico Beauty Institute is located & controls 1515 Sports Drive, Sacramento, CA 95834. This is The School s only location.
More informationUniversity of Wisconsin- Milwaukee Social Media Guidelines Updated: 9-13- 12
1 University of Wisconsin- Milwaukee Social Media Guidelines Updated: 9-13- 12 University of Wisconsin- Milwaukee Social Media Guidelines... 1 Introduction... 2 About social media at UWM... 2 Tips on getting
More informationE-SAFETY SOCIAL MEDIA GUIDANCE
E-SAFETY SOCIAL MEDIA GUIDANCE for those who work with Children, Young People and Adults who may be at risk 1 Contents What do we mean by Social Media... 3 Introduction... 3 Background... 3 Legal Consequences...
More informationHuman trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.
Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human
More informationSCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
More informationYour MSU App - Rave. Alerts, Guardian Safety App and E-TIPS
Your MSU App - Rave Alerts, Guardian Safety App and E-TIPS Montclair State University continues to be a leader amongst higher education institutions in utilizing mobile technology for students to assist
More informationA Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk
A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the
More informationplications of their online actions for the lives of others. They are less likely to understand the risks of cyber-stalkers, or the risks of
Students and Parents Attitudes towards Online Privacy: The Start of an International Study Eric K. Clemons, Josh Wilson The Wharton School 15 September 2013 Extended Abstract 1. Introduction A new threat
More information(Internet) for students, staff and, if requested, members of the Board of Education. All computer
4510 Computer Network (Cf. 4520) 4510 The Board authorizes the Superintendent to develop services linking computers within and between buildings in the District, and to provide access to the international
More informationAppropriate Use of Social Media and Cell Phones
Appropriate Use of Social Media and Cell Phones Karen Haase Harding & Shultz (402) 434-3000 khaase@hslegalfirm.com H & S School Law @KarenHaase Raise your hand if You have a cell phone You use text messaging
More information1 PEW RESEARCH CENTER
1 TEEN RELATIONSHIPS SURVEY FINAL TOPLINE SEPTEMBER 25- OCTOBER 9, 2014 AND FEBRUARY 10-MARCH 16, 2015 N=2,102 PARENTS OF 13-17 YEAR OLDS=1,060, TEENS AGES 13-17=1,060 1 NOTE: ALL NUMBERS ARE PERCENTAGES.
More informationIs Your Crisis Management Plan Ready for Today s Crisis?
Is Your Crisis Management Plan Ready for Today s Crisis? Leonard & Finco Public Relations, Inc. What is a crisis? cri sis krīsis/ noun: crisis; plural noun: crises a time of intense difficulty, trouble,
More information[Example] Social Media Acceptable Use Policy
[Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.
More informationSchool Security: What are you missing?
School Security: What are you missing? The need to keep our nation s children safe at school has become more urgent than ever. But this also puts pressure on both the school s administrators and its budget.
More informationWHAT YOUR TEEN IS DOING ON SOCIAL MEDIA
WHAT YOUR TEEN IS DOING ON SOCIAL MEDIA THE GUIDE 2014 EDITION It s undeniable that Social Media has changed the way teenagers experience the world. Your teens are on social media as soon as they get up,
More informationTomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy
Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users
More informationWHOLE SCHOOL ICT POLICY INCORPORATING E-SAFETY AND ACCEPTABLE USE POLICIES
WHOLE SCHOOL ICT POLICY INCORPORATING E-SAFETY AND ACCEPTABLE USE POLICIES Approved: December 2014, Full Governing Body Next review due: December 2016 The key aim of the whole school ICT team is to support
More informationNortheast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY
Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have
More informationi-safe America Internet Safety Tips for Parents
i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and
More informationAllegated Facebook Groupchat - A School of Agriculture and Food Science
Report: Investigation into Alleged Facebook Groupchat Published: 12 February 2016 On 2 nd February 2016 the College Tribune published an article under the headline UCD Facebook Chat Rating and Sharing
More informationKeeping Our Schools Safe Texas Unified School Safety and Security Standards. Dr. Victoria Calder, Director Texas School Safety Center
Keeping Our Schools Safe Texas Unified School Safety and Security Standards Dr. Victoria Calder, Director What is the heart of schoolbased emergency management? What is the goal of school-based emergency
More informationAcceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
More informationDefense Media Activity Guide To Keeping Your Social Media Accounts Secure
Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something
More informationPolicy and Guidelines for Personal Use of Social Media*
I. Scope: This policy applies to all employees, students, contractors and volunteers as it relates to their employment, academic, or business relationship with the University of Mississippi Medical Center
More informationWestern Kentucky University, The Center. The Michael Minger Act Report for 2015 Activity Reported for Calendar Year 2014
Western Kentucky University, The Center The Michael Minger Act Report for 2015 Activity Reported for Calendar Year 2014 Section 1: Campus Security Authority List campus security authority personnel (definition
More informationStudent & Staff Access and Use of Networked Information Resources and Communications
Page 1 of 6 These procedures are written to support the Electronic Resources Policy of the board of directors and to promote positive and effective digital citizenship among students and staff. Digital
More informationSTOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationCyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction
Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual
More information