SEXTING AND SEXTORTION: KEEPING KIDS SAFE
|
|
- Hugo Payne
- 7 years ago
- Views:
Transcription
1 Federal Partners in Bullying Prevention SEXTING AND SEXTORTION: KEEPING KIDS SAFE November 20, :00-3:00 p.m. ET
2 Moderator Sarah Sisaye, MPH Management and Program Analyst Office of Safe and Healthy Students Office of Elementary and Secondary Education US Department of Education
3 Webinar Learning Objectives During the course of this webinar participants will: Gain a clear understanding of what sexting and sextortion is and learn the dangers involved Learn about the laws related to sexting and sextortion Acquire tools on how to help youth identify and avoid online predators and how to set boundaries with peers who are pressuring them to sext
4 Presenter Lt. Eric Buehler Commander, ICAC Task Force Sacramento County Sheriff s Department
5 SEXTING Changing an Emerging Culture to Protect Our Children
6 What is Sexting? Webster's defines sexting as: sex ting noun \ˈsek-stiŋ\ the sending of sexually explicit messages or images by cell phone
7 A Growing Culture Becoming the norm in teen culture Recent study published by Pediatrics concluded it has grown substantially in the last three years Considered among the youth today as the new first base
8 The Facts A 2012 study published by Pediatrics concludes that: The mean average age of the group studied was years 27.6% have sent a sext 31.4% have asked for a sext 60.0% have been asked
9 Child Pornography Online 10% 24% 7% 3% 17% 3% 3% 14% 16% 3% Parent Other relative Neighbor/family friend Baby sitter/coach Guardian's partner Online enticement Unknown to child Self-produced Boyfriend Human tafficker Abuser data based upon victim information submitted to NCMEC by law enforcement as of Feb. 18, 2013
10 Damage Shared with others Posted to Social Media Shaming / Cyber bullying Isolation Anxiety Depression
11 Laws Self produced nude images of underage subjects are in fact Child Pornography (CP) Production of CP is a felony even when self produced Possession and/or distribution of a CP image is a felony even if the possessor is underage Different jurisdictions handle the cases in varying ways
12 Changing the Culture Parents Talk to your kids Teachers and Counselors Talk to your students Report and deal with suspected sharing of images immediately! Look to resources to help you raise awareness
13 Resources ICAC Task Force ( National Center for Missing and Exploited Children (NCMEC) ( Send This Instead app and webpage Netsmartz.org
14 Send this instead Videos
15 Additional Help
16 Upcoming Webinar Send this Instead Thursday, December 11, :00 3:15pm ET Presenter: Joe Versace Registration URL:
17 Thank You Lieutenant Eric Buehler
18 Presenter Supervisory Special Agent Jacob E. Baillie FBI s Violent Crimes Against Children Program Management Unit
19 Federal Bureau of Investigation Criminal Investigative Division Supervisory Special Agent Jacob E. Baillie
20 Unclassified//For Official Use Only What is Sextortion? Sextortion is a criminal act when someone demands something of value, typically images of a sexual nature, sexual favors, or money from a person (victim) by: Threatening to release or distribute material that the victim seeks to keep private (sexually explicit images, videos, , text messages) Threatening to financially harm friends or relatives of the victim using information they obtained from the victim s computer Withholding something the victim needs or wants unless they comply with the demands (someone in a position of power) Unclassified//For Official Use Only
21 How does Sextortion Happen? Sextortion can be perpetrated in many ways by those seeking to exploit vulnerable individuals sexually or for financial gain. It typically begins by obtaining sensitive material pertaining to their victims. Hacking or the use of malware to assume control of a victim s computer (may allow access to files, webcam, microphone) Theft of personal electronic devices that contain sensitive material Social engineering: leads the victim to believe the perpetrator can be trusted (boyfriend, girlfriend, modeling agency) resulting in the release of sensitive material to the perpetrator Identity theft Unclassified//For Official Use Only
22 Unclassified//For Official Use Only Relationship to Sexting & Bullying Sexting is the sending of sexually explicit images from one person to another using a mobile device such as a cell phone. Sexting is one way images come into the possession of one who would use them for sextortion. When sexually explicit images of a student are distributed to others, those images often become the basis of intense bullying in a school environment. Unclassified//For Official Use Only
23 Unclassified//For Official Use Only Examples of Sextortion In 2013, Christopher Patrick Gunn, 31, of Montgomery, AL was sentenced to 35 years in prison for producing child pornography through a massive online sextortion scheme. Over a period of more than two years, Gunn repeatedly used computers, chat rooms, and other social medial outlets to threaten HUNDREDS of young girls located throughout the United States and internationally. Unclassified//For Official Use Only
24 Examples of Sextortion In 2008, Jonathan Vance, 24, was sentenced to 18 years in federal prison. Vance admitted sending threatening e- mails on Facebook and MySpace in order to extort nude photos from more than 50 teenage girls in 3 states. Vance told the FBI that the intimidation and extortion made him feel empowered. Unclassified//For Official Use Only
25 Unclassified//For Official Use Only Examples of Sextortion In 2010, Anthony Stancl, 19, was sentenced to 15 years in federal prison. Stancl posed as a two girls on Facebook to trick and deceive at least 31 of his male high school classmates into sending him nude cell phone photos and videos of themselves. Stancl then used those photos to extort at least 7 of his male high school classmates for sex. Unclassified//For Official Use Only
26 Unclassified//For Official Use Only Examples of Sextortion In November 2014, Lucas Michael Chansler, 31, of St Johns County, FL was sentenced to 105 years in prison for engaging in an extortion scheme to produce child pornography. Targeted 350 child victims in 26 different states throughout the United States, Canada, and the United Kingdom Approximately 106 child victims have been identified thus far Unclassified//For Official Use Only
27 Unclassified//For Official Use Only The Extent of the Problem Google Trends shows that searches on the term sextortion first appeared in 2010 with the prosecution of several cases. The National Center for Missing and Exploited Children (NCMEC) received its first report related to extortion in October In the subsequent eight months, NCMEC received 181 reports that could be classified as sextortion. There is consistently an international nexus to sextortion cases The FBI s Violent Crimes Against Children International Task Force consists of law enforcement officers from approximately 40 countries. Unclassified//For Official Use Only
28 Unclassified//For Official Use Only Who is at Risk? Sextortion affects both girls and boys across all demographics. Victims of extortion/sextortion withdraw from members of their family and can experience: Anxiety Psychological, physical, and emotional trauma Bullying Increased risk for suicide Increased rates of dropping out of school Unclassified//For Official Use Only
29 Unclassified//For Official Use Only Protection Against Sextortion For Parents & Educators: Supervise children s computer or mobile device use Keep computers and tablets in common rooms Devices like smartphones are trickier, as kids carry these with them wherever they go Disabling the camera within the phone s operating system Use parental control software Talk with your kids Keep an open line of communication with your kids Children should know they can come to you without fear of reprisal Express genuine interest in their online activities Remember, those exploited through these crimes are victims, no matter what they did or how they responded to the threat Unclassified//For Official Use Only
30 Protection Against Sextortion Layer security Use strong passwords Verify sender before opening unexpected attachments Update software promptly Use a firewall, anti-malware software, and possibly encryption Do not assume technology alone will protect you Report sextortion to the FBI It s still important to report all instances of sextortion to law enforcement In some cases the perpetrator may be a teenager, however, its not uncommon that the perpetrator is an adult masquerading as a teenager Law enforcement can help make a determination who the perpetrator is as well as take steps to help minimize further distribution of sensitive material A parent s report may result in the rescue of dozens or even hundreds of other children Unclassified//For Official Use Only
31 Unclassified//For Official Use Only Reporting Sextortion To report suspected sextortion crimes or to get help from law enforcement, please call your local FBI office or toll-free at: CALL-FBI ( ) Unclassified//For Official Use Only
REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO
REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO CERTIFICATE NUMBER (FOR COMPTROLLER S USE ONLY) TO: CITY COUNCIL FROM (ORIGINATING DEPARTMENT): Police Department DATE: 5/26/2015 SUBJECT: Informational update
More informationOffice of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices
Office of the Attorney General of Virginia Sexting Protecting Yourself on the Internet and Mobile Devices Websites Often Used for Social Networking Monthly Visitors to Social Networking Sites 1. 750,000,000
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationDallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
More informationLt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
More informationInternet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force
Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Crimes Against Children Unit SECTIONS CPU ICAC DFU WVMCC WV3C Crimes Against Children Unit WVSP Organizational Change December 1, 2009
More informationeffects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor
Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences
More informationAffirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
More informationFIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766
FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY www.cheezo.org 303-271-6766 A Message from District Attorney Peter Weir One of the priorities of the District Attorney s Office
More informationThe webcast will begin shortly. Please stand by.
The webcast will begin shortly. Please stand by. @Gaggle_K12 Making Student Safety A Priority @Gaggle_K12 Webcast Tips ü To switch from computer audio to your phone, locate the Audio Pane, select Use Telephone
More informationBy Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informationSarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
More informationCyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )
Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.
More informationthink before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
More informationHow To Protect Children From Abuse
CREATING A NETWORK OF PREVENTION AND PROTECTION To report suspected abuse of a minor, call the Pennsylvania Child Abuse Hotline 1-800-932-0313 If you suspect child abuse by clergy, church officials, church
More informationE-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
More informationPredators will use information obtained from children to gain trust and friendship
1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationSocial Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
More informationPARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com
PARENTING IN THE DIGITAL AGE Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com Teens and Technology Use 78% have a cell phone 95% use the Internet 91% have an email address 74% access the
More informationCyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
More informationParents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
More informationAppropriate Use of Social Media and Cell Phones
Appropriate Use of Social Media and Cell Phones Karen Haase Harding & Shultz (402) 434-3000 khaase@hslegalfirm.com H & S School Law @KarenHaase Raise your hand if You have a cell phone You use text messaging
More information2014 Teen Internet Safety Survey. Conducted by The Futures Company
2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online
More informationHow To Avoid The Identity Theft Predators
Camp Watwuzithinkin How To Avoid The Identity Theft Predators Predator 0 An organism that lives by preying on other organisms Identity Thief 0 A person who makes a living by preying on other people Outsmart
More informationCyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction
Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual
More information15 Dangerous Apps Every Parent Should Know About
15 Dangerous Apps Every Parent Should Know About It s safe to say that the advent of the digital age and specifically the Internet, smartphones and social media have brought unique and daunting challenges
More informationModel Safeguarding Policy and Procedure for Smaller Voluntary and Community Groups
Introduction Model Safeguarding Policy and Procedure for Smaller Voluntary and Community Groups This NAME OF ORGANISATION policy follows guidelines set out in Bath & North East Somerset (B&NES) Safeguarding
More informationTeen Online & Wireless Safety Survey
Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications
More informationProtect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
More informationReview VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:
#300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital
More informationA Guide for Parents. of Elementary and Secondary School Students
A Guide for Parents of Elementary and Secondary School Students The effects of bullying go beyond the school yard. As a parent, here s what to watch for, what you can do, and where you can go to get help.
More informationAppropriate Use of Social Media and Cell Phones. Karen Haase. karen@ksbschoollaw.com KSB School Law @KarenHaase
Appropriate Use of Social Media and Cell Phones Karen Haase karen@ksbschoollaw.com KSB School Law @KarenHaase Raise your hand if You have a cell phone You use text messaging You ve taken photos with a
More informationLessons for Teens: Risky Internet and Social Networking
Lesson Plan # 4 Online/Electronic Lure Presenter Overview: Most teens regularly and safely interact online with people they don t know via social networking, media and gaming sites. Although news organizations
More informationLiving Online: Using Technology Wisely Lesson. Guide
Living Online: Using Technology Wisely Lesson Guide Target Audience Adolescents 11-14 Time Entire program 1 hour, depending on discussion Program Objectives Ways to portray a positive image online How
More informationThreat Assessment of Child Sexual Exploitation and Abuse
Centre Plan 2012-13 Threat Assessment of Child Sexual Exploitation and Abuse June 2012 Child Exploitation and and Online Protection Centre Child Exploitation and Online Protection Centre CEOP copyright
More informationInternet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
More informationInterdisciplinary Response to Youths Sexting
Interdisciplinary Response to Youths Sexting Recommendations from the Youth Online Safety Working Group (YOSWG) RESPONSE PLAN PREVENTION EDUCATION TEAM APPROACH Interdisciplinary Response to Youths Sexting
More informationSCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
More informationOPENING ACTIVITY BALL OF STRING FLING
NWAC Youth Violence Prevention Workshop Bullying OPENING ACTIVITY BALL OF STRING FLING Acknowledgements Recognizing and Responding to Violence against Women in Aboriginal Communities created in conjunction
More informationOffice of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW
Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW I know all my online friends. What I post online is private. I can delete what I post. Freedom
More informationTeacher Guide TEEN SAFETY
The Vulnerable Teacher Guide TEEN SAFETY This companion to the online course provides questions and topics for classroom discussion and activities. 2012 ShieldTheVulnerable.org 1277 Treat Blvd #530 Walnut
More informationFACT SHEET: PROJECT SAFE CHILDHOOD
FACT SHEET: PROJECT SAFE CHILDHOOD Project Safe Childhood Project Safe Childhood is a Department of Justice initiative launched in 2006 to combat the proliferation of technology-facilitated crimes involving
More informationCyberbullying: What Parents Can Do to Protect Their Children
Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,
More informationSORNA Substantial Implementation Review State of Tennessee
September 2011 SORNA Substantial Implementation Review State of Tennessee The U.S. Department of Justice, Office of Justice Programs, Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering,
More informationSextortion: Cybersecurity, teenagers, and remote sexual assault 1
May 2016 Sextortion: Cybersecurity, teenagers, and remote sexual assault 1 By Benjamin Wittes, Cody Poplin, Quinta Jurecic & Clara Spera INTRODUCTION It started with an email from an unknown sender with
More informationTo do Justice, as no one is above the Law nor beneath its protection.
Michael L. Ramsey, District Attorney District Attorney Department Summary Mission Statement To do Justice, as no one is above the Law nor beneath its protection. Department Description and Key Issues The
More informationCyber Security. Keeping the internet safe for you and your family
Cyber Security { Keeping the internet safe for you and your family The Five Things you MUST do Learn the lay of the land Protect your identity Become a sceptic Be aware of stranger danger Be a good cyber
More informationTrends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3)
April 2012 Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3) Abstract Arrests for the possession of child pornography (CP) increased between
More informationCyberbullying, Sexting & Predators Oh My!
Cyberbullying, Sexting & Predators Oh My! Addressing Youth Risk in the Digital Age in a Positive and Restorative Manner Nancy Willard Center for Safe and Responsible Internet Use Cyber Savvy Cyber Savvy
More informationVerizon and Online Safety: Protecting Children in the 21 st Century
Verizon and Online Safety: Protecting Children in the 21 st Century APEC-OECD Joint Symposium on Promoting Safer Internet Environment for Children Leslie Martinkovics Director, Verizon International Public
More informationCyberbullying. Welcome!
Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also
More informationSEMINAR Sexting, adolescents and the criminal law
SEMINAR Sexting, adolescents and the criminal law Victoria Williams Author of the Law Reform Commission of Western Australia s discussion paper and final report on the Community Protection (Offender Reporting)
More informationFiling a Form I-360 Self-Petition under the Violence Against Women Act
Filing a Form I-360 Self-Petition under the Violence Against Women Act Prepared by: Northwest Immigrant Rights Project http://www.nwirp.org 615 Second Avenue, Suite 400 Seattle, Washington 98104 (206)
More informationInternet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
More informationHAZING AND BULLYING (Harassment, Intimidation and Dating Violence)
HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) The prohibition against hazing, dating violence, harassment, intimidation or bullying is publicized in student handbooks and in the publications
More informationCounselors Guidelines for the Healthy Development of Youth in the Digital Age
Suggested APA style reference information can be found at http://www.counseling.org/library/ Article 40 Counselors Guidelines for the Healthy Development of Youth in the Digital Age Lakitta D. Johnson
More informationCOMPUTERS & INTERNET SAFETY. Saint Francis Academy April 26, 2012
COMPUTERS & INTERNET SAFETY Saint Francis Academy April 26, 2012 HELLO! Mr. Michael Hoehl Pronounced Mr. Hale AGENDA Let s talk about the Internet! Challenges Trivia Safety Awareness Call to Action CHALLENGE
More informationHow To Report Child Abuse
REPORTING CHILD ABUSE AND ELDER ABUSE Safe Church Practices Training for Presbyterian Ministers, Elders, Deacons, and adults who work with children and youth April 28, 2013 Adults Only No One Under 18
More informationGeorgia Performance Standards. Health Education
HIGH SCHOOL Students in high school demonstrate comprehensive health knowledge and skills. Their behaviors reflect a conceptual understanding of the issues associated with maintaining good personal health.
More informationTeen Online Safety & Digital Reputation Survey
Teen Online Safety & Digital Reputation Survey Cox Communications Teen Online Safety & Digital Reputation Survey in Partnership with the National Center for Missing & Exploited Children (NCMEC) (Fielded
More informationSubcommittee on Oversight and Investigations Committee on Energy and Commerce United States House of Representatives June 27, 2006
Subcommittee on Oversight and Investigations Committee on Energy and Commerce United States House of Representatives June 27, 2006 Making the Internet Safe for Kids: The Role of ISPs and Social Networking
More informationKeeping Safe Online. Program Support Notes. Junior - Senior Secondary. 24 mins. Health and Welfare. VEA Bringing Learning to Life
VEA Bringing Learning to Life Program Support Notes Junior - Senior Secondary Keeping Safe Online 24 mins Program Support Notes by Belinda Kime, App Sci (Home Ec)/Ed (Sec) Produced by VEA Pty Ltd Commissioning
More informationCyberbullying. How common is cyberbullying?
Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:
More informationEmpowering young people to be safe on the Internet. Information for parents, teachers and community members
Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information
More informationEducator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty
Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty Nancy Willard, M.S., J.D., Director Center for Safe and Responsible Internet Use URL: http://cyberbully.org or http://csriu.org
More informationGEORGIA SEX-OFFENDER REGISTRATION AND NOTIFICATION
GEORGIA SEX-OFFENDER REGISTRATION AND NOTIFICATION CONTACT INFORMATION Georgia Bureau of Investigation Georgia Crime Information Center 3121 Panthersville Road PO Box 370808 Decatur, GA 30037-0808 Telephone:
More informationUTC READING Anti-Bullying Policy
UTC READING Anti-Bullying Policy Introduction Bullying may be defined as deliberately hurtful behaviour usually repeated over a period of time, where it is difficult for those bullied to defend themselves.
More informationCyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
More informationRISKS OF ELECTRONIC COMMUNICATION 2
Palacký University Olomouc FACULTY OF EDUCATION Centre for the Prevention of risky virtual communication Czech Republic RISKS OF ELECTRONIC COMMUNICATION 2 SURVEY RESEARCH REPORT CONDUCTED WITHIN A PROJECT
More informationSexting in Schools: Handling Student Discipline in Light of Technology Changes
Sexting in Schools: Handling Student Discipline in Light of Technology Changes Stephanie E. Jones Hodges, Loizzi, Eisenhammer, Rodick & Kohn, LLP Belleville, Illinois Sara Boucek General Counsel Illinois
More informationOutsmarting On-line Predators. Christina Kilbourne
Outsmarting On-line Predators Christina Kilbourne Some Surprising Stats 26% believe their parents would be concerned if they knew what they were doing on-line over half have given out personal information
More informationDARKNESS to LIGHT S 5 STEPS TO PROTECTING OUR CHILDREN. A guide for responsible adults
DARKNESS to LIGHT S 5 STEPS TO PROTECTING OUR CHILDREN A guide for responsible adults DARKNESS TO LIGHT We are a national nonprofit organization that seeks to empower adults to prevent child sexual abuse.
More informationSouth Carolina Internet Crimes Against Children Task Force. Deborah R.J. Shupe Assistant Attorney General Task Force Commander
South Carolina Internet Crimes Against Children Task Force Deborah R.J. Shupe Assistant Attorney General Task Force Commander The S.C. ICAC Task Force South Carolina was one of 10 original task forces
More informationSafety Tips for Social Networking
Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and
More informationwww.xxxchurch.com Online Predators & Strangers
www.xxxchurch.com Online Predators & Strangers When children go online, they have direct access to their friends and family members, but they also may come into contact with complete strangers. Through
More informationUNSUPERVISED AND ONLINE
UNSUPERVISED AND ONLINE Effective Identification of Negative Online Behavior and Strategies for Creating a Family Prevention Plan Follow us on: Contact us at: notmykid.org info@notmykid.org 602.652.0163
More informationInternet Safety Guidelines
Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can
More informationFIRBANK GRAMMAR SCHOOL
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
More informationTEEN ONLINE EXPOSURE: A SNAPSHOT OF DATA
TEEN ONLINE EXPOSURE: A SNAPSHOT OF DATA October, 2008 www.theantidrug.com TEEN VIEWING OF DRUG AND ALCOHOL-RELATED VIDEOS ONLINE Recent data from a special study conducted by Nielsen Online, on behalf
More informationA Time to Tell Troop Meeting Guide
A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as
More informationCampus and Workplace Violence Prevention
Campus and Workplace Violence 1 Prevention SECTION I Policy SUNYIT is committed to providing a safe learning and work environment for the college community. The College will respond promptly to threats,
More informationSORNA Substantial Implementation Review State of Delaware
SORNA Substantial Implementation Review State of Delaware The U.S. Department of Justice, Office of Justice Program, Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking
More informationThis report provides the executive summary for Indicators of School Crime and Safety: 2014.
1 Liability Report Number: LB-10-66 Release Date: August 6, 2015 Section Title: General Information Abstract School violence not only has a direct impact on students, but also on educators, parents, and
More informationOnline grooming: What changes with the new legislation?
Online grooming: What changes with the new legislation? The use of new technologies has considerably increased in recent years, particularly among young people. In Belgium, 96% of children between 12 to
More informationONLINE PREDATORS & PREDATORS
the myths and realities of ONLINE PREDATORS & PREDATORS Center For Child Advocacy Sixth Annual National Conference Crimes Against Children: The Multiple Faces of Child Victimization Joseph Hanley B.A.
More informationA PARENT S GUIDE TO TEEN DATING VIOLENCE 10 QUESTIONS TO START THE CONVERSATION
A PARENT S GUIDE TO TEEN DATING VIOLENCE 10 QUESTIONS TO START THE CONVERSATION DEAR PARENT OR GUARDIAN: Could violence be a part of your teen s social life or dating relationships? The answer may surprise
More informationStaying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
More informationRHODE ISLAND SEX-OFFENDER REGISTRATION AND NOTIFICATION
RHODE ISLAND SEX-OFFENDER REGISTRATION AND NOTIFICATION CONTACT INFORMATION Rhode Island State Police Bureau of Criminal Investigation 150 South Main Street Providence, RI 02903-2907 Telephone: 401-421-5268
More informationCHILD SEXUAL EXPLOITATION LISA RUTTER DEVON YOUTH SERVICE (CHAIR MACSE)
CHILD SEXUAL EXPLOITATION LISA RUTTER DEVON YOUTH SERVICE (CHAIR MACSE) PUBLIC : MEDIA : SOCIAL NORMS CSE is child abuse and is a crime The victims are children however they present themselves Definition
More informationVictim/Witness Security and Protection
REFERENCE GUIDE ON PROTECTING THE RIGHTS OF CHILD VICTIMS OF TRAFFICKING IN EUROPE Chapter 13 Victim/Witness Security and Protection 13.1 General principles Child victims who agree to testify should be
More informationTechno-Panic & 21st Century Education:
Techno-Panic & 21st Century Education: Make Sure Internet Safety Messaging Does Not Undermine Education for the Future Nancy Willard, M.S., J.D. Center for Safe and Responsible Internet Use Trying to prepare
More informationResults. Contact sexual crimes based on PSI and self-report after SOTP participation
Self-Reported Contact Sexual Offenses by Participants in the Federal Bureau of Prisons Sex Offender Treatment Program: Implications for Internet Sex Offenders Andres E. Hernandez, Psy.D. Director, Sex
More informationCurrent Internet Facts
Current Internet Facts Facts about Online Predators and Strangers online: Twenty-eight percent of tweens (ages 8 to 12) have been contacted over the Internet by someone they don t know (COX Tween Internet
More informationEducation Committee inquiry into PSHE and SRE in schools. Written evidence submitted by Childnet International
Education Committee inquiry into PSHE and SRE in schools Written evidence submitted by Childnet International Executive Summary 1. As a children s internet safety charity we have been pleased to see the
More informationToday s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
More informationIN THE UNITED STATES DISTRICT COURT DISTRICT OF OREGON. the District of Oregon, through Stacie Beckerman, Assistant United States Attorney,
S. AMANDA MARSHALL, OSB #95347 United States Attorney District of Oregon STACIE F. BECKERMAN, OSB #06239 Assistant United States Attorney Stacie.Beckerman@usdoj.gov 1000 S.W. Third Ave., Suite 600 Portland,
More informationState law and the Sheriff s Office domestic violence. Victims of domestic violence suf-
VOLUME 14 ISSUE 5 PARTNERS IN CRIME PREVENTION SEPTEMBER/OCTOBER 2010 INSIDE THIS ISSUE VIO- LENCE THE SHERIFF S OFFICE CARES VIO- LENCE MANDA- TORY ARREST & PRIMARY AGRESSOR VIOLENCE WHO INVESTIGATES
More information