CYBER BULLYING: Bully Prevention... It s EVERYBODY S Business 24/7/365 TAKE ACTION

Size: px
Start display at page:

Download "CYBER BULLYING: Bully Prevention... It s EVERYBODY S Business 24/7/365 TAKE ACTION"

Transcription

1 CYBER BULLYING: Bully Prevention... It s EVERYBODY S Business 24/7/365 TAKE ACTION

2 CYBER BULLYING is just what it sounds like... Bullying through Internet applications and technologies such as; Instant messaging (IM) and Chat, Social networking sites, Cell phone Text, You Tube, Defamatory Websites and 73% of teens and young adults are a member of at least one social network. In 2009, 5 trillion text messages were sent worldwide. Texting has surpassed , phone, and face to face conversations as the main communication vehicle for year olds.

3 Flaming: online fights with angry language Harassment: repeatedly sending mean or insulting messages Denigration: sending gossip, rumors Outing: sharing secrets or embarrassing information Trickery: tricking someone to sharing secrets Impersonation: pretending to be someone else, while posting damaging material Exclusion: cruelly excluding someone Cyber stalking: intense harassment that includes threats and creates fear 75% of teens have visited a WEB site bashing another student. About 21% of kids have received mean or threatening s.

4 Sending or forwarding sexually explicit photos, videos or messages from a mobile phone or other digital device. Approximately 20% teens aged have engaged in sexting, by either sending or receiving sexually suggestive text messages or with nude or nearly nude photos or videos of themselves or someone they know. Students and staff must be alerted that they could be breaking the law if they create, forward or even save this type of message. Pew Research Center (2009); Cox Communications (2009); National Campaign to Prevent Teen and Unplanned Pregnancy (2008) Students who sext may face charges of producing, possessing and/or distributing child pornography, a serious crime in all states. Federal laws also treat all sexually explicit images as child pornography. If prosecuted, students could spend their lives on a sex offender registry.

5 It can start easily with a rumor, a photo, or a forwarded message and just as easily spiral out of control. An embarrassing video posted to a social networking site by someone in Kansas tonight may be watched by someone in Japan tomorrow. Cyber bullying victims may be targeted anywhere, at any time. Source: Hinduja, S., Patchin J. Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying. Thousand Oaks: Corwin Press, in 10 adolescents or teens have had embarrassing or damaging pictures taken of themselves without their permission, often using cell phone cameras. Source: Bullying Statistics.org

6 Examples of Cyber Bullying Young people often share too much information which should be kept secret, log in information for example. Friends or former friends can use another person s information to pretend to be that other person. Ann was Barb s friend. Ann knows Barb s screen name and password. Ann pretends to be Barb, and sends hurtful, untrue messages about Carol. Carol is hurt, but she gets mad and retaliates against Barb. Barb seeks revenge against Carol by sending a text to a group of friends with a picture of Carol s head on a pig. Ann laughs secretly. School Safety Center:

7 Using a fake identity, John creates a page on a social networking site. He calls it the We Hate Betty site. John invites friends to post nasty and hateful messages about Betty, all using fake identities. Soon there are lots of mean comments about Betty. After a while, Betty is shown the hate page. Betty is devastated by the messages. She stops attending school so she doesn t have to see anyone. Also, she no longer knows who her real friends are. School Safety Center: 15% of all school absenteeism is directly related to fears of being bullied. Source; Isafe: Leader in e-safety Education

8 Anonymous Bullying from a physically distant location Infinite audience No escape internet is available 24 7 The speed at which it occurs Difficult to stop/delete Many adults do not have access to technically supervise The prevalence of Sexual Harassment.

9 They have 24/7 access to a variety of personal technologies. The technologies provide a sense of anonymity. They may see their online personas as if they were outside themselves. (It s not really me.) They see a lot of the activities as fun. (I was joking.) They do these things because they get some kind of positive personal or social feedback. They do not think ahead. Nor do they think about the impacts or consequences. They are naïve, still kids. They are making up the rules as they go. They are often online alone without any adult guidance or supervision. James, GoodWork Project Report Series, Number 54, 2008

10 The Guide to Positive Student Behavior, pages 8-11 details the Columbus City Schools Board Policy on Student Computer Acceptable Use Regulation. Students accessing the internet in CCS must sign the Acceptable Use Policy along with their parent/guardian.

11 Ohio Department of Education Anti-bullying Policy Model Ohio Revised Code (ORC), Sections and Harassment, Intimidation or Bullying also means electronically transmitted acts i.e., Internet, cell phone, personal digital assistance (PDA) or wireless hand held device that a student has exhibited toward another particular student more than once and the behavior both: Causes mental or physical harm to the other student/school personnel; and Is sufficiently severe, persistent or pervasive that it creates an intimidating, threatening or abusive educational environment for the other student/school personnel.

12 A child may be a victim of cyber bullying if he or she unexpectedly stops using the computer appears nervous or jumpy when an Instant Message, text message, or appears appears uneasy about going to school or outside in general appears to be angry, depressed, or frustrated complains of not feeling well, headaches, upset stomach shows a decline in school homework or grades discusses revenge avoids discussions about what they are doing on the computer becomes abnormally withdrawn from usual friends and family members 42% of students have been bullied while online. Only 30% of older students tell parents. Source: Isafe- Leader in e-safety Education

13 CYBER BULLYING HOW TO RESPOND? INVESTIGATE REPORTS OF CYBER BULLYING IMMEDIATELY. REMEMBER THAT CYBER BULLYING IS BULLYING. DEAL WITH CYBER BULLYING AS YOU WOULD WITH OTHER INSTANCES OF BULLYING. If cyber bullying occurs on-campus or through the school district s internet system, you must take action follow the district s bully prevention procedures and protocol. If the cyber bullying occurs off-campus, you are obligated to take action if it causes mental or physical harm to the other student/school personnel; and is sufficiently severe, persistent or pervasive that it creates an intimidating, threatening or abusive educational environment for the other student/school personnel.

14 CYBER BULLYING HOW TO RESPOND? INVESTIGATE REPORTS OF CYBER BULLYING IMMEDIATELY. Closely monitor the behavior of the students involved at school for all forms of bullying. Follow formal bullying complaint procedures. Investigate to see if those who are cyber bullied need support from a school counselor or school based health professional. Notify parents of students involved in cyber bullying. Talk with all students about the negative effects of cyber bullying.

15 CYBER BULLYING HOW TO RESPOND? Notify the police if the aggressive behavior is criminal. The following may constitute a crime: Threats of violence Child pornography and sexting Taking a photo image of someone in a place where he or she would expect privacy Harassment, stalking, or hate crimes Obscene or harassing phone calls or text messages Sexual exploitation Extortion

16 Take a stand and do not join in. Make it clear that you do not support what is going on. Do not watch someone being bullied. If you feel safe, tell the person to stop. If you do not feel safe saying something, walk away and get others to do the same. If you walk away and do not join in, you have taken their audience and power away. Support the person being bullied. Tell them that you are there to help. Offer to either go with them to report the bullying or report it for them. Talk to an adult you trust. Talking to someone could help you figure out the best ways to deal with the problem. Reach out to a parent, teacher or another adult that you trust to discuss the problem, especially if you feel like the person may be at risk of serious harm to themselves or others. Source: Stopbullying.gov Take a stand and do not join in. Make it clear that you do not support what is going on. Do not watch someone being bullied. If you feel safe, tell the person to stop. If you do not feel safe saying something, walk away and get others to do the same. If you walk

17 Tell your child not to respond to rude e mails, messages, and comments. Save the evidence, such as e mail and text messages, and take screenshots of comments and images. Also, take note of the date and time when the harassment occurs. Contact your Internet service provider (ISP) or cell phone provider. Ask the website administrator or ISP to remove any Web page created to hurt your child. If harassment is via e mail, social networking sites, IM, and chat rooms, instruct your child to block bullies or delete your child s Take a stand and do not join in. Make it clear that you do not support what is going on. Do current not watch account someone and being open bullied. a new If you one. feel safe, tell the person to stop. If you do not feel safe saying something, walk away and get others to do the same. If you walk

18 If harassment is via text and phone messages, change the phone number and instruct your child to only share the new number with trustworthy people. Also, check out phone features that may allow the number to be blocked. Get your child s school involved. Learn the school s policy on cyber bullying and urge administrators to take a stance against all forms of bullying. Make a report to and if you feel something illegal has occurred, inform law enforcement.

19 TAKE ACTION: Requires a change in the school climate and in norms for behavior. A comprehensive, school wide effort involving the entire school community Encourage individual differences and change the social norms with regard to bullying. It must become uncool to bully, cool to help out students who are bullied, and normative for staff and students to notice when a child is bullied or left out. This requires the efforts of everyone in the school environment teachers, administrators, counselors, other non teaching staff (such as bus drivers, nurses, school resource officers, custodians, cafeteria workers, and school librarians), parents, and students.

20 Provide time and opportunity for students to learn about the dangers of cyber bullying during the school day. Discuss cyber bullying with students. They may be knowledgeable about cyber bullying and they may have good ideas about how to prevent and address it. Educate school staff and parents about cyber bullying, its dangers, and what to do if someone is cyber bullied. Be sure that your school s expectations and guidelines address cyber bullying. Closely monitor students use of computers at school. Nearly 9 out of 10 LGBT youth reported being verbally harassed at school in the past year because of their sexual orientation. Of those who did report the incident, 31.1 percent said the school staff did nothing in response. Source: GLSEN, 2007 School Climate Survey

21 Our youth live in a digital world. They do not always distinguish between real and cyber or digital experiences in the same way as adults. They often see them as the same. As a result, what schools see and discipline as a fight or physical conflict may actually be the result of ongoing cyber bullying. School Safety Center: Middle school victims of cyber-bullying score higher on a suicidal ideation scale. Teen suicide was the 3rd leading cause of death among young adults and adolescents 15 to 24 years of age.

22 Help your child understand bullying. Explain what bullying is. It is more than physical; it can be done in person or over the phone or computer. Keep open lines of communication with your child. Check in with your child and listen to any concerns about friends and other students. Encourage your child to pursue their interests. Doing what they love may help your child be more confident among their peers and make friends with other kids with similar interests. Teach your child to take a stand against bullying. Give guidance about how to stand up to those who bully if it is safe to do so. Over 70 percent of teens said being able to block cyber bullies was the most effective method of prevention.

23 Talk to your child about seeking help from a trusted adult when feeling threatened by a bully. Talk with your child to identify a trusted school staff member your child can go to for help and role play what they should say. Assure your child that they should not be afraid to tell an adult when someone they know is being bullied. Know what is going on in your child's school. Visit the school and school website, participate in teacher conferences and open house, join the PTA listserv or mailing list, get to know the parent consultant or other parents, school counselors, and staff. Contact the school by phone or e mail if you have suggestions to make the school a safer and better learning place. Source: Stopbullying.gov Almost 80 percent of teens said that they either did not have parental rules about Internet use or found ways around the rules.

24

25 CYBER BULLYING: Bully Prevention... It s EVERYBODY S Business 24/7/365 TAKE ACTION

CyberbullyNOT Student Guide to Cyberbullying

CyberbullyNOT Student Guide to Cyberbullying CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

Cyberbullying. How common is cyberbullying?

Cyberbullying. How common is cyberbullying? Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:

More information

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 ) Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences

More information

Cyberbullying: What Parents Can Do to Protect Their Children

Cyberbullying: What Parents Can Do to Protect Their Children Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,

More information

FIRBANK GRAMMAR SCHOOL

FIRBANK GRAMMAR SCHOOL FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...

More information

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence)

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) The prohibition against hazing, dating violence, harassment, intimidation or bullying is publicized in student handbooks and in the publications

More information

Bullying Prevention. When Your Child Is the Victim, the Bully, or the Bystander

Bullying Prevention. When Your Child Is the Victim, the Bully, or the Bystander Bullying Prevention When Your Child Is the Victim, the Bully, or the Bystander What Is Bullying? Bullying is not a conflict or a fight. Bullying is physical, verbal, or emotional abuse that is deliberate,

More information

Chapter 3. Online Bullying

Chapter 3. Online Bullying Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

Parent Guide to Cyber bullying and Cyber threats

Parent Guide to Cyber bullying and Cyber threats School Address: 4450 S Mendenhall Rd Memphis, TN 38141 Tel: (901) 367 7814 Fax: (901) 367 7816 www.sememphis.org MEMPHIS SCHOOL OF EXCELLENCE Parent Guide to Cyber bullying and Cyber threats Young people

More information

What Is the Olweus Bullying Prevention Program?

What Is the Olweus Bullying Prevention Program? Dear Parent/Guardians, Your child s school will be using the Olweus Bullying Prevention Program. This research-based program reduces bullying in schools. It also helps to make school a safer, more positive

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

Finchley Catholic High School. Anti Bullying Policy

Finchley Catholic High School. Anti Bullying Policy Finchley Catholic High School Anti Bullying Policy Bullying can occur through many types of anti-social behaviour: Physical A student can be physically punched, kicked, hit, spat at etc Verbal This can

More information

Springfield Public Schools

Springfield Public Schools Springfield Public Schools BULLYING POLICY Approved by School Committee May 13, 2010 Amended March 6, 2014 Amended December 5, 2014 SPRINGFIELD PUBLIC SCHOOLS BULLYING PREVENTION POLICY INTRODUCTION Bullying

More information

Guidelines for Preventing and Dealing with Bullying Issues

Guidelines for Preventing and Dealing with Bullying Issues Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.

More information

Bullying 101: Guide for Middle and High School Students

Bullying 101: Guide for Middle and High School Students Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org

More information

Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty

Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty Nancy Willard, M.S., J.D., Director Center for Safe and Responsible Internet Use URL: http://cyberbully.org or http://csriu.org

More information

Wisconsin Anti-Bullying Center

Wisconsin Anti-Bullying Center Patrick Evans, M.S. CESA 7 - Project Management Consultant Green Bay, Wisconsin Certified Trainer Wisconsin Emergency Management Multi-Hazard Emergency Planning for Schools Writer, Editor, Contributor,

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

This report provides the executive summary for Indicators of School Crime and Safety: 2014.

This report provides the executive summary for Indicators of School Crime and Safety: 2014. 1 Liability Report Number: LB-10-66 Release Date: August 6, 2015 Section Title: General Information Abstract School violence not only has a direct impact on students, but also on educators, parents, and

More information

Bullying Prevention: Steps to Address Bullying in Schools. Getting Started

Bullying Prevention: Steps to Address Bullying in Schools. Getting Started Bullying Prevention: Steps to Address Bullying in Schools Getting Started Bullying can threaten students physical and emotional safety at school and can negatively impact their ability to learn. The best

More information

A Guide for Parents. of Elementary and Secondary School Students

A Guide for Parents. of Elementary and Secondary School Students A Guide for Parents of Elementary and Secondary School Students The effects of bullying go beyond the school yard. As a parent, here s what to watch for, what you can do, and where you can go to get help.

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

Girls & Cyber- bullying

Girls & Cyber- bullying MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts

More information

BULLYING/ANTI-HARASSMENT

BULLYING/ANTI-HARASSMENT BULLYING/ANTI-HARASSMENT The state of Mississippi has established legislation requiring Bullying Prevention to be taught in schools. Executive Summary The purpose of this policy is to assist the Mississippi

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

e-rate toolkit Cyberbullying: Crossing the Line

e-rate toolkit Cyberbullying: Crossing the Line e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview

More information

Whether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives.

Whether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives. Cyberbullying Whether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives. By Ted Feinberg and Nicole Robey Ted Feinberg is the assistant executive director

More information

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com PARENTING IN THE DIGITAL AGE Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com Teens and Technology Use 78% have a cell phone 95% use the Internet 91% have an email address 74% access the

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

TAVISTOCK COLLEGE POLICIES & PROCEDURES

TAVISTOCK COLLEGE POLICIES & PROCEDURES TAVISTOCK COLLEGE POLICIES & PROCEDURES TITLE: ANTI CYBER BULYING POLICY MODEL POLICY STATEMENT This is not a Local Authority model policy Local changes have / have not been made to the model policy by

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9

September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9 Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of

More information

GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY

GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Approved: 4 September 2014 Review Date: Page 1 of 7 GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Introduction Schools have a duty of care for pupils and

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Cyberbullying. Welcome!

Cyberbullying. Welcome! Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also

More information

Cyberbullying, Sexting & Predators Oh My!

Cyberbullying, Sexting & Predators Oh My! Cyberbullying, Sexting & Predators Oh My! Addressing Youth Risk in the Digital Age in a Positive and Restorative Manner Nancy Willard Center for Safe and Responsible Internet Use Cyber Savvy Cyber Savvy

More information

STANDING TALL. Cyberbullying: Protect Your Sons and Daughters FACTS:

STANDING TALL. Cyberbullying: Protect Your Sons and Daughters FACTS: FACTS: Up to 42% of teens report being bullied on-line STANDING TALL Cyberbullying: Protect Your Sons and Daughters 16% of adolescents report they cyberbully others Disrespect and namecalling occur most.

More information

Idaho. Coalition Against Sexual & Domestic Violence Engaging Voices, Creating Change. Table of Contents

Idaho. Coalition Against Sexual & Domestic Violence Engaging Voices, Creating Change. Table of Contents stalking Most victims are stalked by someone they know. Stalking is serious, often violent, and can escalate over time. This handbook provides information on stalking and available resources. Idaho Coalition

More information

AN ACT RELATIVE TO BULLYING IN SCHOOLS.

AN ACT RELATIVE TO BULLYING IN SCHOOLS. Senate, No. 2404 [Senate, Wednesday, April 28, 2010 Report of the committee of conference on the disagreeing votes of the two branches, with reference to the House amendments to the Senate Bill relative

More information

Predators will use information obtained from children to gain trust and friendship

Predators will use information obtained from children to gain trust and friendship 1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and

More information

School Bullying Survey

School Bullying Survey School Bullying Survey This survey is not required for your class. If you choose not to complete this survey, your grade in the class will not be affected in any way. If this is your decision, just leave

More information

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual

More information

A Time to Tell Troop Meeting Guide

A Time to Tell Troop Meeting Guide A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as

More information

Burlington Public Schools. Bullying Prevention and Intervention Plan

Burlington Public Schools. Bullying Prevention and Intervention Plan Burlington Public Schools Bullying Prevention and Intervention Plan The Burlington Public Schools adopted the Department of Elementary and Secondary Education s (Department) Model Bullying Prevention and

More information

Edward W. Brooke Charter School Bullying Prevention and Intervention Plan 12.14.2010

Edward W. Brooke Charter School Bullying Prevention and Intervention Plan 12.14.2010 I. LEADERSHIP & PROCESS Priority Statement Edward W. Brooke Charter School has always been and will continue to be a place where students are held to the highest behavioral standards and where we work

More information

Information Brief. Cyberbullying and School Policy. Introduction. Examples and Impact

Information Brief. Cyberbullying and School Policy. Introduction. Examples and Impact Information Brief AU GU ST 2 0 0 8 Cyberbullying and School Policy Introduction The Commonwealth of Virginia has been concerned with student Internet safety since the General Assembly first enacted legislation

More information

Class 2: Manage Your Digital Footprint. Student Handbook

Class 2: Manage Your Digital Footprint. Student Handbook Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal

More information

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper Cyber-bullying Cyber-bullying: A Digital Epidemic White Paper What is Cyber-bullying? The past two decades have witnessed a virtual explosion in new technology that has been eagerly embraced by adolescents

More information

OPENING ACTIVITY BALL OF STRING FLING

OPENING ACTIVITY BALL OF STRING FLING NWAC Youth Violence Prevention Workshop Bullying OPENING ACTIVITY BALL OF STRING FLING Acknowledgements Recognizing and Responding to Violence against Women in Aboriginal Communities created in conjunction

More information

A Parents' Guide to. Snapchat. 2013 ConnectSafely.org

A Parents' Guide to. Snapchat. 2013 ConnectSafely.org A Parents' Guide to Snapchat 2013 ConnectSafely.org Top 5 Questions Parents Have About Snapchat 1. Why do kids love Snapchat? They love the spontaneity of it. It s been (rightfully) drummed into their

More information

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour: #300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital

More information

ONLINE PREDATORS & PREDATORS

ONLINE PREDATORS & PREDATORS the myths and realities of ONLINE PREDATORS & PREDATORS Center For Child Advocacy Sixth Annual National Conference Crimes Against Children: The Multiple Faces of Child Victimization Joseph Hanley B.A.

More information

Be it enacted by the People of the State of Illinois,

Be it enacted by the People of the State of Illinois, AN ACT concerning education. Be it enacted by the People of the State of Illinois, represented in the General Assembly: Section 5. The School Code is amended by changing Section 27-23.7 as follows: (105

More information

Teen Online & Wireless Safety Survey

Teen Online & Wireless Safety Survey Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications

More information

Website. cybersafekids.com.au WELCOME TO CYBERIA. Queensland University of Technology. 2007. really doing online?

Website. cybersafekids.com.au WELCOME TO CYBERIA. Queensland University of Technology. 2007. really doing online? WELCOME TO CYBERIA ONLINE WORLD OF DIGITAL NATIVE Website Robyn Treyvaud robynt@cse.edu.au cybersafekids.com.au CURRENT BOOKMARKS http://del.icio.us/rtreyvaud Queensland University of Technology. 2007

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

Cranmere Primary School ANTI-BULLYING POLICY

Cranmere Primary School ANTI-BULLYING POLICY Cranmere Primary School reviewed Autumn 2015 Governors committee: Learning and Achievement Part i) Advice for children ANTI-BULLYING POLICY Bullying is never right. If you are being bullied tell someone.

More information

OHIO ANTI -HARASSMENT, INTIMIDATION, AND BULLYING INITIATIVE

OHIO ANTI -HARASSMENT, INTIMIDATION, AND BULLYING INITIATIVE OHIO ANTI -HARASSMENT, INTIMIDATION, AND BULLYING INITIATIVE The Ohio Department of Education The Ohio Office of the Attorney General The Ohio Commission on Dispute Resolution and Conflict Resolution Overview

More information

Bullying. Introduction

Bullying. Introduction Bullying 1 Introduction In recent years, bullying has become a topic of greater public concern. Research has shown the damaging long-term effects that bullying behavior can have on its victims. Approximately

More information

POLICY 5111 ANTI-BULLYING/HARASSMENT/HATE

POLICY 5111 ANTI-BULLYING/HARASSMENT/HATE POLICY 5111 Purpose/Introduction: The Kenosha Unified School District strives to provide a safe, secure and respectful learning environment for all students in school buildings, on school grounds, in school

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

A Parents' Guide to Cyberbullying: Addressing Online Social Cruelty

A Parents' Guide to Cyberbullying: Addressing Online Social Cruelty A Parents' Guide to Cyberbullying: Addressing Online Social Cruelty Young people have fully embraced the Internet as both an environment and a tool for socializing. They create their own Web sites, post

More information

Crossing. the. L ne. Sexual Harassment at School

Crossing. the. L ne. Sexual Harassment at School Crossing the L ne Sexual Harassment at School Executive Summary Executive Summary A student is groped on the way to class. Kids call a student gay and faggot and just won t quit. A demeaning sexual rumor

More information

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS BYOD Bring Your Own Device AUP Authorized Use Policy User includes anyone, including employees, students, and guests, using

More information

Landmark School Bullying Prevention & Intervention Plan

Landmark School Bullying Prevention & Intervention Plan I. Introduction Landmark School Bullying Prevention & Intervention Plan Landmark School believes that a healthy environment depends upon every student's trust in the safety and integrity of the community.

More information

MEAN TEENS. Middle and High School Comics Workbook. Prevention of Social Aggression at School. Worksheet for comics MEAN TEENS

MEAN TEENS. Middle and High School Comics Workbook. Prevention of Social Aggression at School. Worksheet for comics MEAN TEENS MEAN TEENS Middle and High School Comics Workbook Prevention of Social Aggression at School Stuart W. Twemlow, Ph.D. & Frank C. Sacco, M.D. SOCIAL BULLYING Name: When you arrive at Middle, Junior, or High

More information

Preventing Bullying and Harassment of Targeted Group Students. COSA August 2013 John Lenssen

Preventing Bullying and Harassment of Targeted Group Students. COSA August 2013 John Lenssen Preventing Bullying and Harassment of Targeted Group Students COSA August 2013 John Lenssen Definition Bullying is unfair and one-sided. It happens when someone keeps hurting, frightening, threatening,

More information

Empowering young people to be safe on the Internet. Information for parents, teachers and community members

Empowering young people to be safe on the Internet. Information for parents, teachers and community members Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information

More information

School Policy Regarding Computer Use, Technology and Internet Access

School Policy Regarding Computer Use, Technology and Internet Access School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school

More information

Lesson 3 Preventing Bullying

Lesson 3 Preventing Bullying Lesson 3 Preventing Bullying Overview This lesson focuses on bullying. Students read and react to the thoughts of someone who is a target of bullying. They identify key elements of bullying and discuss

More information

Cyber-bullying is covered by this policy: all members of the community need to be aware that

Cyber-bullying is covered by this policy: all members of the community need to be aware that DUKE OF KENT SCHOOL A8 ANTI-BULLYING POLICY Aims and Objectives: Duke of Kent School values every individual in the community and believes each deserves to be treated with respect. Sensitivity to the feelings

More information

Anti-Bullying Policy. Page 1 of 6

Anti-Bullying Policy. Page 1 of 6 Anti-Bullying Policy Date of Last Review: May 2016 Reviewed by: Mr R Beattie Agreed by Governors: Frequency of Review: Annually Date of Next Review: May 2017 Page 1 of 6 Statement of Intent 1 We are committed

More information

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices Office of the Attorney General of Virginia Sexting Protecting Yourself on the Internet and Mobile Devices Websites Often Used for Social Networking Monthly Visitors to Social Networking Sites 1. 750,000,000

More information

Cyberbullying Policy Considerations for Boards

Cyberbullying Policy Considerations for Boards July 2007 Cyberbullying Policy Considerations for Boards Schools have long had to deal with bullying among students, including hitting, teasing, name-calling, intimidation, harassment and social exclusion.

More information

A U.S. Postal Inspector s Guide to Internet Safety for Children

A U.S. Postal Inspector s Guide to Internet Safety for Children A U.S. Postal Inspector s Guide to Internet Safety for Children A U.S. Postal Inspector s Guide to INTERNET SAFETY FOR CHILDREN The Internet is a global community that allows people to share information

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

FAIRFIELD AREA SCHOOL DISTRICT

FAIRFIELD AREA SCHOOL DISTRICT No. 249 FAIRFIELD AREA SCHOOL DISTRICT SECTION: PUPILS TITLE: BULLYING / CYBERBULLYING ADOPTED: REVISED: August 11, 2015 249. BULLYING / CYBERBULLYING 1. Purpose 2. Definitions The Board is committed to

More information

Bullying. Take Action Against. stealing money. switching seats in the classroom. spreading rumors. pushing & tripping

Bullying. Take Action Against. stealing money. switching seats in the classroom. spreading rumors. pushing & tripping switching seats in the classroom stealing money Take Action Against Bullying spreading rumors pushing & tripping U.S. DEPARTMENT OF HEALTH & HUMAN SERVICES Substance Abuse and Mental Health Services Administration

More information

Grade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4

Grade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4 Cyberbullying and Harrassment 30 Minutes* Curriculum Expectations Health and Physical Education - 1.3, C2.2, C3.2 Language: Media - 1.5 Lesson 2 Learning Goals By the end of this lesson, students will

More information

Parent / Guardian Consent for Technology Use in Schools

Parent / Guardian Consent for Technology Use in Schools Parent / Guardian Consent for Technology Use in Schools Our school uses computers and other mobile devices in the classroom to help increase student motivation and achievement. We will use laptop sets,

More information

Lydiate Primary School. Anti-Bullying Policy. This document outlines the practises to be followed in tackling bullying at

Lydiate Primary School. Anti-Bullying Policy. This document outlines the practises to be followed in tackling bullying at Lydiate Primary School Anti-Bullying Policy Introduction This document outlines the practises to be followed in tackling bullying at Lydiate Primary School. A Policy-Statement For Bullying And A Statement

More information

CYBERBULLYING TEACHER S GUIDE:

CYBERBULLYING TEACHER S GUIDE: TEACHER S GUIDE: CYBERBULLYING LEARNING OBJECTIVES Students will understand the meaning of cyberbully. Students will learn to recognize different forms of cyberbullying. Students will learn different strategies

More information

Campus and Workplace Violence Prevention

Campus and Workplace Violence Prevention Campus and Workplace Violence 1 Prevention SECTION I Policy SUNYIT is committed to providing a safe learning and work environment for the college community. The College will respond promptly to threats,

More information

Social Networking Policy

Social Networking Policy Feltonfleet School Social Networking Policy Introduction Objectives This policy sets out Feltonfleet School s policy on social networking. New technologies are an integral part of our lives and are powerful

More information

Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence

Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence Cyber Bullying: A Prevention Curriculum for Grades 6-12 What is Cyber Bullying: A Prevention Curriculum for Grades 6-12? Cyber

More information