The Ultimate 41-Word Cyber Bullying Prevention Crossword Puzzle Young Teen version Brought to you by STOPNOTinmySchool.org and Spectrum Diversity LLC

Size: px
Start display at page:

Download "The Ultimate 41-Word Cyber Bullying Prevention Crossword Puzzle Young Teen version Brought to you by STOPNOTinmySchool.org and Spectrum Diversity LLC"

Transcription

1 % The Ultimate Brought to you by STOPNOTinmySchool.org and Spectrum Diversity LLC This crossword puzzle was designed as an educational tool to teach both teens and adults about cyber bullying. It is recommended for individuals age 13-14; please preview the entries in the crossword puzzle before using it with younger populations to determine appropriateness. Additional versions of this crossword puzzle are available for other age groups. The clues to the puzzle contain safety messages designed to teach young teens what cyber bullying is, how damaging cyber bullying can be, how to avoid being cyber bullies themselves, and what to do if they know someone who is being cyber bullied, or if they are being cyber bullied themselves. The value of this tool is increased if an adult reviews the clues and the answers with the youth, to ensure that the safety messages contained in the puzzle are fully understood and taken to heart. Permission is granted for educators, counselors, and parents to duplicate this crossword puzzle, and to further distribute it for educational purposes, as long as the source information located at the bottom of each page remains intact on each copy. Copies of pages 2-6 (blank puzzle and clues) may be distributed without page 1 (this cover page) and/or page 7 (the answer key). This puzzle is the sole creation of Dr. Paula C. Rodríguez Rust, owner, Spectrum Diversity, LLC. No puzzle making software was used in the creation of this puzzle. Please send comments and suggestions for this activity, or suggestions regarding other activities that you would find useful, to spectrumdiversity@comcast.net "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% # "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% $013456(1/ "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% %#"$%# 74**86%9/ "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% # "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "()##*/ "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% %#"$%" 01$1("/ "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% 2+))# &'()*# "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%#"()"*+##,-'./% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$%"#$% "#$%#"&'"()##*+,-./ Page 1

2 The Ultimate Brought to you by STOPNOTinmySchool.org and Spectrum Diversity LLC " # $ % & ' ( ) * "+ "" "# "$ "% "& "' "( ") "* #+ #" ## #$ #% #& #' #( #) #* $+ $" $# $$ $% $& $' $( $) $* "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# "# Page 2

3 CLUES TO The Ultimate Notes for the Clues: A user is a user of electronic technology. This includes individuals who use cell phones, gaming systems, and the internet. Some entries in the crossword puzzle consist of more than one word, or of hyphenated words. To fit the entries in the puzzle, leave out any blanks between words. For example, if the answer to a clue were peach tree, you would write peachtree in the crossword puzzle, and if the answer were multi- layered, you would write multilayered. ACROSS 5. To copy something from a website onto one s own computer, usually by transferring a file containing the information, photo, video, etc. to one s computer. 6. A string of letters and/or numbers that allows the owner of an account to gain legitimate access to that account. To prevent bullying by impersonation, users should keep this string of letters and/or numbers private, and not reveal it even to their best friends. 8. To copy something from one s computer to a website, usually by transferring a file containing the information to the website, and usually for the purpose of making the information available or visible to others who visit the website. 10. Information that is secret, i.e., that another person does not have the right to pass on to others without permission from the owner of the information. 12. A message that is sent, with instructions for the recipient to forward it to a certain number of other people. Sometimes, a promise of a reward is offered for forwarding the message to the correct number of people, sometimes a time limit is imposed for the forwarding, and sometimes a threat is made in case the message is not forwarded as instructed. Sending such a message can be a crime. 13. Oh My God or Oh My Goodness 14. The information an account holder provides that is made visible by the host to other users is called the user s. For example, the information on a Facebook page about the owner of the page that is visible to people who visit the page. 19. Abbreviated IM, this is a type of message that is transmitted directly from one user s computer to the other, bypassing the filtering, logging, and Page 3

4 monitoring functions of a host server. Youth are more likely to use services to communicate with their friends, than to use e- mail services. 21. In Real Life 22. A list of the individuals with whom an instant message user has established ongoing channels of communication. When one of these individuals is online, an icon might appear to indicate their availability, thus facilitating communication. 24. A popular web application used to broadcast comments to one s followers. Often used to let one s circle of friends know where one is and what one is doing or thinking at the moment. 25. In My Opinion, similar to the more frequently used In My Humble Opinion 28. Acronym for internet service provider. Each message sent using a computer connection to the internet contains an electronic address assigned by the internet service provider, called the address that allows the police to identify a person who committed a crime online, even if that person made an effort to disguise their identity online. 30. is a statement made by a person indicating that s/he will do harm to another person, or that harm will come to another person. Many users make s without realizing that, even if the act described is not carried out, that the act of making itself does harm, and is often illegal. Many chain letters/e- mails contain s about what will happen to a recipient if the chain e- mail is not forwarded, and people who forward these messages often do not realize that they have made to someone else. 32. Laughing Out Loud. 33. Pretending to be someone else online, including sending messages or posting information online under someone else s name, or logging onto someone else s account using their password without their permission. This is a form of cyber bullying that can be partly avoided if users keep their passwords private. 34. What people who harass others online are usually seeking, because they do not feel they have enough of it in their everyday lives. If others do not react to the bullying, sometimes the bully will stop because they are not getting the feeling of that they are trying to get by bullying. 35. Also called revenge, is the act of getting back at someone for something they did that was hurtful. 36. Passing information about someone around to others behind the person s back. Usually, the information is untrue, and often it is hurtful or derogatory. is sometimes also called gossip. 37. A name, which might or might not reflect a user s real name, that is used to represent the user online. Messages sent by the user and postings made by the user are received or posted under this name, and this name is part of Page 4

5 one s profile, which is visible to others. The might be the same as the user name one uses to sign onto an account, or it might be different. Also called a tag or a handle,, it is important that young people choose s that do not reveal their real name, gender, age, or location. 38. The act of harassing another player within an online game. Gamers sometimes excuse this behavior by saying that psyching out the other player is an expected part of the game, and might or might not be aware that, in fact, a line has been crossed and the behavior has become harassment. 39. To another player in a game means to try to win an electronic online game by attacking the opponent psychologically; this behavior often crosses the line and becomes bullying, but gamers sometimes excuse their actions by claiming that it is an expected part of the game. DOWN 1. Many kinds of cyber bullying are illegal. When a crime is committed online, the become involved to conduct an investigation and criminal charges might be filed. 2. Young people who run into trouble online, or who know that a friend is being bullied or has run into other trouble online, should tell a trusted immediately. 3. Someone who use their physical or social power, or technological knowledge of digital communications, to do or say things that harass or bother other people. 4. It is unsafe to allow anyone whom you do not already know in real life to find out who you are, that is, to be able to you. Therefore, you should never give out ing information such as your name, age, address, or phone number online. 5. of character is the act of spreading rumors or other information that impunes another person s character or damages their reputation. This activity is covered under civil law, because it violates the individual s civil rights and might be grounds for a lawsuit. 7. Posting or messaging without revealing one s real name. One reason some people do things online that they would not do to someone else F2F is because, online, they feel even if they know that, in fact, the police would be able to identify them if they commit a crime online. 9. A person who witnesses or knows that someone is being bullied. This person can help, either by telling a trusted adult, by being a friend to the person who is being bullied, or by helping that person stop the bullying. 11. A person who seeks out victims for the purpose of taking advantage of them. A cyber uses information gathered online to identify and locate victims. Page 5

6 15. An important civil right which is often used by cyber bullies to excuse their actions, but harassing and harming others is not, in fact, covered by this right. 16. A security setting in which not only the members of one s own friend list on a social networking site can view a piece of information, but the members of those individuals friends lists can also view the information. This setting is less private than the friends only setting, and only slightly more private than the everyone setting. 17. When one s cyber activity violates someone else s civil rights, for example by invading their privacy or spreading damaging rumors, the injured person might file a against the person who hurt them online. 18. A way to view a conversation between two people who are writing to each other on their walls on Facebook, in which the comments of both participants are visible. 20. Many types of cyber bullying are, for which individuals can be prosecuted under criminal law, leading to prison time and other consequences. 23. To visit a chatroom or forum invisibly, so that other participants do not know that you are listening to the conversation. When you participate in a chatroom or forum, you should always be aware that there might be ers; do not give out any personal information. 24. Written shorthand language used to send messages between cell phones, designed to reduce the number of keystrokes required for a message. Young people are usually much faster at using this shorthand language than adults are. 26. Because experiences and spaces that exist in cyber space are sometimes called reality as opposed to IRL experiences and places- - users sometimes develop the impression that what is said or done online is somehow not quite real. 27. A very popular social networking site among both youth and adults, about which a movie was made. 29. The right to is a civil right under which people have the right to keep certain kinds of information about themselves private, and to expect others to keep their confidential information confidential, and not to pass that information including photos or videos of them on to others without their consent. Violations of this right are illegal, and can lead to lawsuits against someone who does not maintain the confidentiality of another person s information or image. 31. I was only is a favorite excuse of cyber bullies. Many do not realize that if their actions hurt another person, the argument that they were only will not excuse them and they will still be responsible for the hurt they caused to another person. Page 6

7 ANSWERS TO The Ultimate Brought to you by STOPNOTinmySchool.org and Spectrum Diversity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age 7

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

CyberbullyNOT Student Guide to Cyberbullying

CyberbullyNOT Student Guide to Cyberbullying CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage. Penrice Academy Acceptable Use Policy for Mobile Digital Devices including ipads September 2014 Date of Review: May 2015 Introduction Penrice Academy ( The Academy ) may grant a licence to use ipads or

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools

Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National

More information

CYBERBULLYING TEACHER S GUIDE:

CYBERBULLYING TEACHER S GUIDE: TEACHER S GUIDE: CYBERBULLYING LEARNING OBJECTIVES Students will understand the meaning of cyberbully. Students will learn to recognize different forms of cyberbullying. Students will learn different strategies

More information

Idaho. Coalition Against Sexual & Domestic Violence Engaging Voices, Creating Change. Table of Contents

Idaho. Coalition Against Sexual & Domestic Violence Engaging Voices, Creating Change. Table of Contents stalking Most victims are stalked by someone they know. Stalking is serious, often violent, and can escalate over time. This handbook provides information on stalking and available resources. Idaho Coalition

More information

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP)

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) YUKON PUBLIC SCHOOLS: DISTRICT POLICY BJ-R1 YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP) To ensure that our students and employees become proficient in

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

School Bullying Survey

School Bullying Survey School Bullying Survey This survey is not required for your class. If you choose not to complete this survey, your grade in the class will not be affected in any way. If this is your decision, just leave

More information

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT

JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT JOHN PAUL COLLEGE INTRANET and elearning RESOURCES RESPONSIBLE USE AGREEMENT AND DIGITAL CITIZENSHIP AGREEMENT Dear Student and Parent/Caregiver, John Paul College s Intranet and elearning Resources (e.g.

More information

Bullying 101: Guide for Middle and High School Students

Bullying 101: Guide for Middle and High School Students Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org

More information

Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction

Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction Privacy Policy This Privacy Policy will be effective from September 1 st, 2014. Please read Pelican Technologies Privacy Policy before using Pelican Technologies services because it will tell you how we

More information

PRIVACY POLICY. I. Introduction. II. Information We Collect

PRIVACY POLICY. I. Introduction. II. Information We Collect PRIVACY POLICY school2life, Inc. ( school2life ) Privacy Policy is designed to provide clarity about the information we collect and how we use it to provide a better social gaming experience. By accepting

More information

FIRBANK GRAMMAR SCHOOL

FIRBANK GRAMMAR SCHOOL FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...

More information

Technology Acceptable Use Policy

Technology Acceptable Use Policy Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information

Chapter 3. Online Bullying

Chapter 3. Online Bullying Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 ) Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

Portmarnock Community School ICT and Social Media Expected Use Policy. June 2013

Portmarnock Community School ICT and Social Media Expected Use Policy. June 2013 Portmarnock Community School ICT and Social Media Expected Use Policy June 2013 1.0 Introduction Portmarnock Community School recognizes that access to Information and Communication Technology (ICT) gives

More information

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College

Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access

More information

A Time to Tell Troop Meeting Guide

A Time to Tell Troop Meeting Guide A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

Grand Canyon Council - Social Media Policy

Grand Canyon Council - Social Media Policy INTRODUCTION It s an exciting time to be part of the BSA for many reasons. One of those is that new communication vehicles now enable current and past Scouts and Scouters, as well those who are interested

More information

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY What is Twitter? Twitter is one of the leading tools for connecting users with bite-sized pieces of information and status updates. Each message

More information

e-rate toolkit Cyberbullying: Crossing the Line

e-rate toolkit Cyberbullying: Crossing the Line e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

Finchley Catholic High School. Anti Bullying Policy

Finchley Catholic High School. Anti Bullying Policy Finchley Catholic High School Anti Bullying Policy Bullying can occur through many types of anti-social behaviour: Physical A student can be physically punched, kicked, hit, spat at etc Verbal This can

More information

Privacy Policy Version 1.0, 1 st of May 2016

Privacy Policy Version 1.0, 1 st of May 2016 Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)

More information

Social Networking Sites like Facebook, MSN

Social Networking Sites like Facebook, MSN Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and

More information

Girls & Cyber- bullying

Girls & Cyber- bullying MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts

More information

Contents Security Centre

Contents Security Centre Contents Security Centre... 1 1. Search Engines... 2 2. Online Applications... 2 3. Virgin Money Credit Card Online Banking Security Measures... 2 3.1 Access Number, PIN and Password... 2 3.2 Keypad...

More information

Class 2: Manage Your Digital Footprint. Student Handbook

Class 2: Manage Your Digital Footprint. Student Handbook Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal

More information

Coventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy

Coventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy Coventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy The Coventry Public Schools encourages the use of digital technology for teaching and learning, for professional responsibilities,

More information

Guidelines for Preventing and Dealing with Bullying Issues

Guidelines for Preventing and Dealing with Bullying Issues Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.

More information

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE The School Board provides technologies, including the internet, to promote educational excellence by facilitating resource sharing, innovation and communication.

More information

DIGITAL TECHNOLOGY POLICY St Example s School

DIGITAL TECHNOLOGY POLICY St Example s School DIGITAL TECHNOLOGY POLICY St Example s School RATIONALE: At St Example s we provide guidelines to all parents, staff and students on the use of electronic media e-mail, internet, intranet, facsimile, phone

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

Social Networking Sites A Predator s Playground?

Social Networking Sites A Predator s Playground? Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every

More information

Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy

Tomball Independent School District. Technology Resources Acceptable Use and Internet Safety Policy Tomball Independent School District Technology Resources Acceptable Use and Internet Safety Policy 2015-2016 TISD Technology Resources Acceptable Use and Internet Safety Policy Tomball ISD provides users

More information

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence)

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) The prohibition against hazing, dating violence, harassment, intimidation or bullying is publicized in student handbooks and in the publications

More information

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary

More information

Lutheran Education Association of Houston Acceptable Use Policy (Students)

Lutheran Education Association of Houston Acceptable Use Policy (Students) Lutheran Education Association of Houston Acceptable Use Policy (Students) With the use of technology, including the Internet, Intranet, hardware and software, the Lutheran Education Association of Houston

More information

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2 Online Safety Handbook for Students and Parents 2014 Table of Contents Table of Contents... 2 Overview of Program... 2 Aims... 2 Relevant Technology... 3 Appropriate Online Conduct... 3 Online Responsibilities...

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 1.0 Introduction St. Thomas Aquinas Catholic School recognizes that access to technology in school gives

More information

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Essential Question: What are the risks and responsibilities when you share online in a relationship? How can you respect

More information

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences

More information

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?

USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used? TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to

More information

Wakefield Public Schools Technology Acceptable Use Policy

Wakefield Public Schools Technology Acceptable Use Policy Wakefield Public Schools Technology Acceptable Use Policy Vision (per Technology Strategic Plan 2013-2016) Wakefield Public Schools considers classroom technology to be an essential, imperative part of

More information

Understand What s Going On

Understand What s Going On Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

Technology Department 1350 Main Street Cambria, CA 93428

Technology Department 1350 Main Street Cambria, CA 93428 Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any

More information

Parent Guide to Cyber bullying and Cyber threats

Parent Guide to Cyber bullying and Cyber threats School Address: 4450 S Mendenhall Rd Memphis, TN 38141 Tel: (901) 367 7814 Fax: (901) 367 7816 www.sememphis.org MEMPHIS SCHOOL OF EXCELLENCE Parent Guide to Cyber bullying and Cyber threats Young people

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

Cyberbullying. How common is cyberbullying?

Cyberbullying. How common is cyberbullying? Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:

More information

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper Cyber-bullying Cyber-bullying: A Digital Epidemic White Paper What is Cyber-bullying? The past two decades have witnessed a virtual explosion in new technology that has been eagerly embraced by adolescents

More information

Salisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media

Salisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media What is social media? Social media is defined as any form of online publication or presence that allows end users to engage in multidirectional conversations in or around the content on the website. (Online

More information

Saint Martin s Catholic Academy

Saint Martin s Catholic Academy Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin

More information

Zero-knowledge games. Christmas Lectures 2008

Zero-knowledge games. Christmas Lectures 2008 Security is very important on the internet. You often need to prove to another person that you know something but without letting them know what the information actually is (because they could just copy

More information

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really

More information

Acceptable Use Policy Holy Spirit Catholic School

Acceptable Use Policy Holy Spirit Catholic School Acceptable Use Policy Holy Spirit Catholic School For the use of Computers, Mobile Devices, Internet Access, Google Apps for Education Suite, and Internet Applications Definitions User includes anyone,

More information

Handbook on Conducting Research on Social-Networking Websites in California 1

Handbook on Conducting Research on Social-Networking Websites in California 1 Handbook on Conducting Research on Social-Networking Websites in California 1 Created by David Lee and Shane Witnov 2 Samuelson Law, Technology & Public Policy Clinic, UC Berkeley School of Law for The

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

Practical tips for a. Safe Christmas

Practical tips for a. Safe Christmas Practical tips for a Safe Christmas CONTENTS 1. Online shopping 2 2. Online games 4 3. Instant messaging and mail 5 4. Practical tips for a safe digital Christmas 6 The Christmas holidays normally see

More information

Lesson Plan for Senior Secondary

Lesson Plan for Senior Secondary Lesson Plan for Senior Secondary Introduction Purpose Introduce the National Day of Action against Bullying and Violence (NDA) campaign Explore the role of bystanders to bullying Investigate the theme

More information

How To Behave At A School

How To Behave At A School THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY

DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY DCPS STUDENT SAFETY AND USE POLICY FOR INTERNET AND TECHNOLOGY Purpose: 1) To establish standards for the acceptable uses of internet and electronic mail (email) services within the computer network maintained

More information

Social Media Guidebook. by Kevin Lawrie Sport Law & Strategy Group krl@sportlaw.ca

Social Media Guidebook. by Kevin Lawrie Sport Law & Strategy Group krl@sportlaw.ca Social Media Guidebook by Kevin Lawrie Sport Law & Strategy Group krl@sportlaw.ca What is Social Media? Social media has become the catch-all term that we apply broadly to new computer-mediated communication

More information

CYBERSAFETY USE AGREEMENT for Cambridge High School Students

CYBERSAFETY USE AGREEMENT for Cambridge High School Students CYBERSAFETY USE AGREEMENT for Cambridge High School Students Cambridge High School This document is comprised of this cover page and three sections: Section A: Introduction Section B: Cybersafety Rules

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

Disability Hate Crime 04-03-09 9/3/09 12:03 Page 1. Disability Hate Crime. Reporting Book

Disability Hate Crime 04-03-09 9/3/09 12:03 Page 1. Disability Hate Crime. Reporting Book Disability Hate Crime 04-03-09 9/3/09 12:03 Page 1 Disability Hate Crime Reporting Book Disability Hate Crime 04-03-09 9/3/09 12:06 Page 2 This book is about Disability Hate Crime and how to Report it

More information

Art-list License Agreement

Art-list License Agreement Art-list License Agreement 1. General 1.1. The Agreement herein is made between you and Art list (or by any other name), the owner of the site: www.art list.io, and it settles the terms and conditions

More information

Internet Safety. A guide to staying smart & safe online

Internet Safety. A guide to staying smart & safe online Internet Safety A guide to staying smart & safe online What you will learn Privacy how to keep your information safe & secure Safety how to protect yourself & your family online It s not just about computers

More information

Notice of Privacy Practices Walter L Cohen High School School-based Health Center. Effective as of August 6, 2004

Notice of Privacy Practices Walter L Cohen High School School-based Health Center. Effective as of August 6, 2004 Effective as of August 6, 2004 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. We are required

More information

THE TRUTH ABOUT BULLIES

THE TRUTH ABOUT BULLIES THE TRUTH ABOUT BULLIES OVERVIEW: The goal of this activity is to inform and educate students about bullying. The lesson plan asks students to consider a list of statements about bullies and to decide

More information

What Is the Olweus Bullying Prevention Program?

What Is the Olweus Bullying Prevention Program? Dear Parent/Guardians, Your child s school will be using the Olweus Bullying Prevention Program. This research-based program reduces bullying in schools. It also helps to make school a safer, more positive

More information

Table of Contents. 1. Basic Netiquette Pg. 3-4. 2. Copyright Pg. 5. 3. Plagiarism Pg. 6. 4. Privacy Pg. 6

Table of Contents. 1. Basic Netiquette Pg. 3-4. 2. Copyright Pg. 5. 3. Plagiarism Pg. 6. 4. Privacy Pg. 6 Computer Ethics 1 Table of Contents Computer ethics is a term used to describe the ethical principles and moral dilemmas that you encounter in today s computer-based society. It makes us think about the

More information

2012 NCSA / McAfee Online Safety Survey

2012 NCSA / McAfee Online Safety Survey 2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Leonardo Hotels Group Page 1

Leonardo Hotels Group Page 1 Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes

More information

ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY

ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY Please Note: This is the Eastern School District policy in its entirety. Not all regulations are relevant to a K-6 school. Policy Statement ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY All

More information

The Respectful Workplace: You Can Stop Harassment: Opening the Right Doors. Taking Responsibility

The Respectful Workplace: You Can Stop Harassment: Opening the Right Doors. Taking Responsibility The Respectful Workplace: Opening the Right Doors You Can Stop Harassment: Taking Responsibility Statewide Training and Development Services Human Resource Services Division Department of Administrative

More information

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the

More information