Popular Culture Bullying and At-Risk Behaviors: Delinquency, Crime, Bullying and Cyberbullying

Size: px
Start display at page:

Download "Popular Culture Bullying and At-Risk Behaviors: Delinquency, Crime, Bullying and Cyberbullying"

Transcription

1 Murrieta Valley Unified School District Popular Culture Bullying and At-Risk Behaviors: Delinquency, Crime, Bullying and Cyberbullying Parent Awareness and Strategies

2 Presenters Paul Johnson Detective Murrieta Police Department Wayne Sakamoto Safe Schools Director Murrieta Valley Unified School District

3 Topics 1. Bullying 2. Cyberbullying 3. Technology and Internet Risks 4. General Strategies

4 Topics 1. Bullying 2. Cyberbullying 3. Technology and Internet Risks 4. General Strategies

5 Bad Behaviors Vs. Bullying Bullying has Become a Catch Phrase Not All Bad Behaviors or Aggression can be Called Bullying All Negative Behaviors will be Dealt With If We can Document that it Happened

6 Bullying Definition Specific Type of Aggression Verbal Physical Psychological Behavior is Intended to Harm or Disturb Carried Out Repeatedly and Over Time Imbalance of Power Physical Psychological

7 Direct Bullying Physical Acts Threats Intimidation Verbal Abuse Taunting Other?

8 Indirect Bullying Making Faces Obscene Gestures Exclusion Rumors Other?

9 Parent Tips - Bullying Get Information from Your Child Who, What, Where, When, and Why Did You Report This to an Adult? Work on Strategies With Your Child Have Them Think About and Discuss Their Ideas Ask Questions What Would You Do If That Didn t Work?

10 Parent Tips - Bullying List Options and Consequences Role Play Their Strategies Allow Them to Try Out Their Strategies Check in With Them Allow Them to Fail and Encourage Them to Try Again Resist the Urge to Immediately Intervene

11 Parent Tips Inform the School Administrator AND Teacher Provide Information Who, What, Where, When and Why Ask What Their Perspective of the Situation is Ask About Strategies Remember If They Have Not Investigated, They Will have To Prior to Strategies FERPA

12 Topics 1. Bullying 2. Cyberbullying 3. Technology and Internet Risks 4. General Strategies

13 Cyberbullying Definition Use of Modern Communication Technologies: Instant Messaging Chat Rooms Web Sites Social Networking Sites Cell Phones and other forms of technology To Intentionally Embarrass, Humiliate, Threaten or Intimidate an Individual or Group To Attempt to Gain Power and Control

14 Cyberbullying Is: Directly hurting someone s feelings or threatening them via technology Texting mean statements Posting up a website to harm someone Passing rumors to other people via text or Social Network sites Posting embarrassing pictures of someone without their permission What else?

15 Cyberbullying V. Bullying More Invasive Larger Audience Lengthens Duration of Bullying Potential for Greater Cruelty Source: Glen Stutzky, Michigan State University

16 isafe Survey i-safe America conducted a national survey of more than 1500 students -ranging from fourth to eighth grade. 58% of kids admit someone has said mean or hurtful things to them online 53% of kids admit having said something mean or hurtful things to another online 42% of kids have been bullied while online 34% were threatened

17 Who s Responsibility? School? Community? Law Enforcement? Parents?

18 Shivela Vs. Thompson

19

20 Murrtowns Burrnbook

21

22

23 Cyberbullying is out of control. People are saying all kinds of things online they would never say to someone in person. Something needs to be done. It is all about Facebook right now and it is crazy. October 2010, Vista Murrieta High School Senior Of course I spread rumors on my phone and on the internet, I m a seventh grade girl, that s what we are supposed to do! March 2007, Santee Leadership Student

24 School Responses to Cyberbullying Nexus to the School Victim Impact Statements How has this impacted your attendance How has this impacted your academics How has this impacted you at school Bystander/Friend/Perpetrator Statements Have Other Students Shared the Text, Video Etc. At School? Has the Cyberbullying Caused School Bullying

25 Parent Tips - Cyberbullying Have Children Sign a Contract on Appropriate Usage Discuss Scenarios With Them What Would You Do if Someone Posted Something Mean About Another Student? Do Not Allow them to Have an Social Media Account at an Early Age (FB is 13YO)

26 Parent Tips - Cyberbullying Monitor Their Social Network Postings Be Aware of Parent Page Vs. Real Page Empowerment Vs. Entitlement Have Children Check Cellphones In and Out (7PM)

27 Parent Tips - Cyberbullying Do Not Erase, Omit or Alter Texts or s This is Your Evidence Do Screen Shots of Social Network Sites Copy and Paste the URL and Provide to the School Teach Netiquette Online Manners Teach Them to Be Aware of Trolling Activities and Strategies

28 Parent Tips If a Threat of Violence has Been Made Contact Law Enforcement AND the School For the School To Take Action We Need to Show a Substantial Disruption to the Educational Process Most Cyberbullying is OUTSIDE the Jurisdiction of the School To Take Action

29 Parent Tips How We Investigate If on Social Networking We Will Gain Permission to Go Onto Your Students Site Unless it Is Open to All We Will Look at the Entire Thread and Into Other Folders for Information We Will Call in Other Students to Interview We Will Ask Permission for The Student to Allow Us on Their Site

30 Parent Tips If We Cannot Gain Permission or They will not Access Their Site We Will Call Parents If Permission is Not Given We Will Pursue Other Evidence if Possible Bring Us Screen Shots To Assist With Documenting Again, We Need to Show Substantial Disruption Before We Can Act

31 Cyberbullying Resources

32 Sexting Taking a provocative digital image of yourself Sending that image to friends Both males and females do this May be considered Child Pornography even if sent to and by willing minors

33 Instant Messaging Resources

34 Chat Rooms

35

36

37

38

39 Chat Roulette

40 Would Your Kids Answer: What s your name? Where do you live? What school do you go to? What are your parents names?

41 Go to Zabaseach.com

42 Topics 1. Bullying 2. Cyberbullying 3. Technology and Internet Risks 4. General Strategies

43 Parent Strategies Layered Approach to Safety and Security Trust, but Never Believe Not My Kid Have Ongoing Discussions with Your Children Have Children Sign Contracts with You Discuss Scenarios With Them Have Them Research Cyberbullying Online Have Them Research Internet Safety Online

44 Parent Strategies Secure Computer in a Family Room May Use Tracking/Screening Software Proxy Sites Cheats Check Web History Check Cell Phone Files Texts Pictures/Videos Monitor Your Cell Phone Bill Be Aware of Warning Signs of Cyberbullying and Cyber Addiction Increase Your Knowledge Do Not Rely Solely on Software

45

46

47

48

49

50 Parent Strategies Discuss Appropriate Use of Internet and Cyberbullying Have Your Child Sign a Contract or Agree to Keep You Informed Ask Them How Would You Questions Periodically Sit With Them as They Surf

51 Parent Strategies Have Them Teach You About the Computer and Internet Limit Chat Rooms Discuss Social Networking Sites Teach Them How to Do Screen Shots

52 Screen Shot CNTRL PrtScn SysRq Open Word Program Right Click Mouse Paste Save As

53

54

55 Talk to Your Kids Privacy!!! Only Add Real Friends You Know Give your Password ONLY to Your Parents Watch What You Post It is FOREVER If You Wouldn t Say it in Person, Don t Say it Online! Be Careful in Posing for Pictures With Friends

56 Talk to Your Kids Do NOT Cyberbully! Do NOT Spread Rumors! Do NOT Forward Mean Texts Protect Your Friends Learn How to Do Screen Shots Talk to Your Parents or Adults About Sites, Texts, s that Make You Uncomfortable Remember to TURN-OFF Electronics Give Yourself a Break!!!

57 Check Web History

58 Resources

59 Cyberbullying.us

Cyberbullying. How common is cyberbullying?

Cyberbullying. How common is cyberbullying? Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:

More information

School Bullying Survey

School Bullying Survey School Bullying Survey This survey is not required for your class. If you choose not to complete this survey, your grade in the class will not be affected in any way. If this is your decision, just leave

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 ) Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences

More information

CyberbullyNOT Student Guide to Cyberbullying

CyberbullyNOT Student Guide to Cyberbullying CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Guideline on Windows 7 Parental Controls

Guideline on Windows 7 Parental Controls CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius

More information

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary

More information

FAIRFIELD AREA SCHOOL DISTRICT

FAIRFIELD AREA SCHOOL DISTRICT No. 249 FAIRFIELD AREA SCHOOL DISTRICT SECTION: PUPILS TITLE: BULLYING / CYBERBULLYING ADOPTED: REVISED: August 11, 2015 249. BULLYING / CYBERBULLYING 1. Purpose 2. Definitions The Board is committed to

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour: #300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital

More information

Cyberbullying: What Parents Can Do to Protect Their Children

Cyberbullying: What Parents Can Do to Protect Their Children Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

School Policy Regarding Computer Use, Technology and Internet Access

School Policy Regarding Computer Use, Technology and Internet Access School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

OPENING ACTIVITY BALL OF STRING FLING

OPENING ACTIVITY BALL OF STRING FLING NWAC Youth Violence Prevention Workshop Bullying OPENING ACTIVITY BALL OF STRING FLING Acknowledgements Recognizing and Responding to Violence against Women in Aboriginal Communities created in conjunction

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY

GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Approved: 4 September 2014 Review Date: Page 1 of 7 GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Introduction Schools have a duty of care for pupils and

More information

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence)

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) The prohibition against hazing, dating violence, harassment, intimidation or bullying is publicized in student handbooks and in the publications

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

Eanes Independent School District Responsible Use Guidelines for Technology

Eanes Independent School District Responsible Use Guidelines for Technology Eanes Independent School District Responsible Use Guidelines for Technology My student and I are committed to the Responsible Use Guidelines. By signing this, we commit to discussing and reviewing the

More information

Girls & Cyber- bullying

Girls & Cyber- bullying MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts

More information

Idaho. Coalition Against Sexual & Domestic Violence Engaging Voices, Creating Change. Table of Contents

Idaho. Coalition Against Sexual & Domestic Violence Engaging Voices, Creating Change. Table of Contents stalking Most victims are stalked by someone they know. Stalking is serious, often violent, and can escalate over time. This handbook provides information on stalking and available resources. Idaho Coalition

More information

Cyberbullying. Welcome!

Cyberbullying. Welcome! Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also

More information

Cyber-bullying is covered by this policy: all members of the community need to be aware that

Cyber-bullying is covered by this policy: all members of the community need to be aware that DUKE OF KENT SCHOOL A8 ANTI-BULLYING POLICY Aims and Objectives: Duke of Kent School values every individual in the community and believes each deserves to be treated with respect. Sensitivity to the feelings

More information

Bullying 101: Guide for Middle and High School Students

Bullying 101: Guide for Middle and High School Students Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 1.0 Introduction St. Thomas Aquinas Catholic School recognizes that access to technology in school gives

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

Empowering young people to be safe on the Internet. Information for parents, teachers and community members

Empowering young people to be safe on the Internet. Information for parents, teachers and community members Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information

More information

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org CYBER SAFETY, CYBER ETHICS, CYBER SECURITY How to teach the kids about these concepts (a primer from staysafeonline.org program that is available free from the website) YOUR PRESENTERS Maryly Skallos Technology

More information

Bullying Prevention. When Your Child Is the Victim, the Bully, or the Bystander

Bullying Prevention. When Your Child Is the Victim, the Bully, or the Bystander Bullying Prevention When Your Child Is the Victim, the Bully, or the Bystander What Is Bullying? Bullying is not a conflict or a fight. Bullying is physical, verbal, or emotional abuse that is deliberate,

More information

Cyber Safety For Parents

Cyber Safety For Parents Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting

More information

Springfield Public Schools

Springfield Public Schools Springfield Public Schools BULLYING POLICY Approved by School Committee May 13, 2010 Amended March 6, 2014 Amended December 5, 2014 SPRINGFIELD PUBLIC SCHOOLS BULLYING PREVENTION POLICY INTRODUCTION Bullying

More information

www.xxxchurch.com Online Predators & Strangers

www.xxxchurch.com Online Predators & Strangers www.xxxchurch.com Online Predators & Strangers When children go online, they have direct access to their friends and family members, but they also may come into contact with complete strangers. Through

More information

Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence

Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence Cyber Bullying: A Prevention Curriculum for Grades 6-12 What is Cyber Bullying: A Prevention Curriculum for Grades 6-12? Cyber

More information

Know the Rules Before You Use the Tools: A Student User s Guide to Project Share

Know the Rules Before You Use the Tools: A Student User s Guide to Project Share Know the Rules Before You Use the Tools: A Student User s Guide to Project Share The Texas Education Agency 1 I. Welcome to Project Share Project Share is a group-learning website that lets you create,

More information

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human

More information

POLICY 5111 ANTI-BULLYING/HARASSMENT/HATE

POLICY 5111 ANTI-BULLYING/HARASSMENT/HATE POLICY 5111 Purpose/Introduction: The Kenosha Unified School District strives to provide a safe, secure and respectful learning environment for all students in school buildings, on school grounds, in school

More information

Baldwin County Public Schools. Acceptable Use Policy

Baldwin County Public Schools. Acceptable Use Policy Introduction Baldwin County Public Schools Acceptable Use Policy Baldwin County Public Schools (BCPS) recognizes that access to technology in school gives students greater opportunities to learn, engage,

More information

Predators will use information obtained from children to gain trust and friendship

Predators will use information obtained from children to gain trust and friendship 1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and

More information

How To Stop Cyberbullying

How To Stop Cyberbullying XCS - Objectionable Content Filtering Stop Cyber-Bullying in its Tracks - Protect Schools and the Workplace Technical Brief WatchGuard Technologies Published: January 2011 Cyber-Bullying Bullies are everywhere

More information

Brownsburg Community School Corporation Acceptable Use Policy 2012-2013

Brownsburg Community School Corporation Acceptable Use Policy 2012-2013 Introduction Brownsburg Community School Corporation Acceptable Use Policy 2012-2013 The Brownsburg Community School Corporation (BCSC) recognizes that access to technology in school gives students greater

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

RISKS OF ELECTRONIC COMMUNICATION 2

RISKS OF ELECTRONIC COMMUNICATION 2 Palacký University Olomouc FACULTY OF EDUCATION Centre for the Prevention of risky virtual communication Czech Republic RISKS OF ELECTRONIC COMMUNICATION 2 SURVEY RESEARCH REPORT CONDUCTED WITHIN A PROJECT

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

Technology Acceptable Use Policy

Technology Acceptable Use Policy Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop

More information

Expanding Bullying Prevention Partnerships for Federal, State and Local Action Elizabeth Edgerton, MD, MPH

Expanding Bullying Prevention Partnerships for Federal, State and Local Action Elizabeth Edgerton, MD, MPH Expanding Bullying Prevention Partnerships for Federal, State and Local Action Elizabeth Edgerton, MD, MPH April, 2011 www.stopbullying.gov Launched on March 10, 2011 The Story of Jamal 12 year old boy

More information

ONLINE SAFETY TEACHER S GUIDE:

ONLINE SAFETY TEACHER S GUIDE: TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.

More information

1.1 This policy applies to students/staff/volunteers/visitors/parents and student councils, including representatives of the Winnipeg School Division.

1.1 This policy applies to students/staff/volunteers/visitors/parents and student councils, including representatives of the Winnipeg School Division. PAGE: 1 of 7 1. GENERAL 1.1 This policy applies to students/staff/volunteers/visitors/parents and student councils, including representatives of the Winnipeg School Division. 1.2 The Winnipeg School Division

More information

HIGH SCHOOL FOR RECORDING ARTS

HIGH SCHOOL FOR RECORDING ARTS Adopted Revised High School for Recording Arts Bullying Prohibition Policy 1. Purpose Students have the right to be safe and free from threatening situations on school property and at school activities

More information

e-rate toolkit Cyberbullying: Crossing the Line

e-rate toolkit Cyberbullying: Crossing the Line e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview

More information

Digital Design Class Overview/Rules

Digital Design Class Overview/Rules Digital Design 1 4 Ms. Fuller, instructor Digital Design Class Overview/Rules Class procedures, policies, and information: Class Rules Passes Handouts Safety and Security ID Badges Lockdown Procedures

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

THE TRUTH ABOUT BULLIES

THE TRUTH ABOUT BULLIES THE TRUTH ABOUT BULLIES OVERVIEW: The goal of this activity is to inform and educate students about bullying. The lesson plan asks students to consider a list of statements about bullies and to decide

More information

A Guide for Parents. of Elementary and Secondary School Students

A Guide for Parents. of Elementary and Secondary School Students A Guide for Parents of Elementary and Secondary School Students The effects of bullying go beyond the school yard. As a parent, here s what to watch for, what you can do, and where you can go to get help.

More information

Bullying Awareness Lesson Plan Grades 4-6

Bullying Awareness Lesson Plan Grades 4-6 Bullying Awareness Lesson Plan Grades 4-6 1 Estimated Time of Completion: Two to three classroom periods, or stretched out throughout the school year. Each activity will take between 15-30 minutes. Bullying

More information

Social Networking Sites like Facebook, MSN

Social Networking Sites like Facebook, MSN Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and

More information

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper

Cyber-bullying. Cyber-bullying: A Digital Epidemic White Paper Cyber-bullying Cyber-bullying: A Digital Epidemic White Paper What is Cyber-bullying? The past two decades have witnessed a virtual explosion in new technology that has been eagerly embraced by adolescents

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)

More information

Finchley Catholic High School. Anti Bullying Policy

Finchley Catholic High School. Anti Bullying Policy Finchley Catholic High School Anti Bullying Policy Bullying can occur through many types of anti-social behaviour: Physical A student can be physically punched, kicked, hit, spat at etc Verbal This can

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

Whether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives.

Whether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives. Cyberbullying Whether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives. By Ted Feinberg and Nicole Robey Ted Feinberg is the assistant executive director

More information

Digital Citizenship: Etiquette. My Online code & Breaking Down Hate Speech Grades 9-12

Digital Citizenship: Etiquette. My Online code & Breaking Down Hate Speech Grades 9-12 Digital Citizenship: Etiquette My Online code & Breaking Down Hate Speech Grades 9-12 Essential Question: What does it mean to do the right thing online? How can you create a community culture in which

More information

ANTI-BULLYING POLICY. Every ThreeYears. Ratified by Governors: January 2014 Review date: January 2017. One part of the Safeguarding Policy portfolio

ANTI-BULLYING POLICY. Every ThreeYears. Ratified by Governors: January 2014 Review date: January 2017. One part of the Safeguarding Policy portfolio ANTI-BULLYING POLICY Responsible Committee: Every ThreeYears Student & Community Ratified by Governors: January 2014 Review date: January 2017 Safeguarding Health & Safety Financial Equalities Legal One

More information

Privacy vs. Safety: School Searches of Electronic Devices

Privacy vs. Safety: School Searches of Electronic Devices Privacy vs. Safety: School Searches of Electronic Devices / Rubén A. Villalobos Partner, Villalobos 2 Legal Group Trustee, Modesto City Schools ruben.villalobos@gmail.com 1 Introduction WELCOME Ask Questions!

More information

CYBERBULLYING TEACHER S GUIDE:

CYBERBULLYING TEACHER S GUIDE: TEACHER S GUIDE: CYBERBULLYING LEARNING OBJECTIVES Students will understand the meaning of cyberbully. Students will learn to recognize different forms of cyberbullying. Students will learn different strategies

More information

Online Reputation. Luke 29/09/2015. Never give out your personal information. www.thinkuknow.co.uk. www.ceop.police.uk

Online Reputation. Luke 29/09/2015. Never give out your personal information. www.thinkuknow.co.uk. www.ceop.police.uk Online Reputation Luke www.ceop.police.uk www.thinkuknow.co.uk Child Exploitation Online Protection Centre (CEOP) Never give out your personal information Parents 1 When should I report to CEOP? How to

More information

Crossing. the. L ne. Sexual Harassment at School

Crossing. the. L ne. Sexual Harassment at School Crossing the L ne Sexual Harassment at School Executive Summary Executive Summary A student is groped on the way to class. Kids call a student gay and faggot and just won t quit. A demeaning sexual rumor

More information

STANDING TALL. Cyberbullying: Protect Your Sons and Daughters FACTS:

STANDING TALL. Cyberbullying: Protect Your Sons and Daughters FACTS: FACTS: Up to 42% of teens report being bullied on-line STANDING TALL Cyberbullying: Protect Your Sons and Daughters 16% of adolescents report they cyberbully others Disrespect and namecalling occur most.

More information

Protect Your Privacy Online

Protect Your Privacy Online Protect Your Privacy Online By Kathiann M. Kowalski Keep personal information private for your own good! High school sophomore Karra H. never expected to see herself on a Web site featuring scantily clad

More information

Abuse & Takedown Policies and Procedures

Abuse & Takedown Policies and Procedures Abuse & Takedown Policies and Procedures Vox Populi Registry Ltd. 3-110 Governors Square 23 Lime Tree Bay Ave. Grand Cayman, Cayman Islands PO Box 1361, George Town, KY1-1108 www.registry.sucks Version

More information

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages. Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications

More information

Vail School District Acceptable Use Policy 2015 2016

Vail School District Acceptable Use Policy 2015 2016 Vail School District Acceptable Use Policy 2015 2016 You have a wonderful opportunity before you! You have the opportunity to use the school's technology resources for your education. These resources will

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

The webcast will begin shortly. Please stand by.

The webcast will begin shortly. Please stand by. The webcast will begin shortly. Please stand by. @Gaggle_K12 Making Student Safety A Priority @Gaggle_K12 Webcast Tips ü To switch from computer audio to your phone, locate the Audio Pane, select Use Telephone

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents June 2012 The Digital Divide: How the Online Behavior of Teens is Getting Past Parents Parent Disconnect Despite the obvious disconnect between teens online behaviors and parents knowledge of them, parents

More information

TAVISTOCK COLLEGE POLICIES & PROCEDURES

TAVISTOCK COLLEGE POLICIES & PROCEDURES TAVISTOCK COLLEGE POLICIES & PROCEDURES TITLE: ANTI CYBER BULYING POLICY MODEL POLICY STATEMENT This is not a Local Authority model policy Local changes have / have not been made to the model policy by

More information

Lee County School District

Lee County School District Lee County School District Acceptable Use Policy This Acceptable Use Policy outlines the guidelines and behaviors that users are expected to follow when using school technologies or when using personally-owned

More information

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus Telecommunication Tools TECHNOLOGY The Internet is like a giant web of computers connected. The Internet is also called the World Wide Web. There are good places to go on the Internet and there are some

More information

Godley Community Primary School. Anti-Bullying Policy

Godley Community Primary School. Anti-Bullying Policy Godley Community Primary School. Anti-Bullying Policy Delivering Excellence in a Happy and Nurturing Learning Environment Bullying is action taken by one or more children with the deliberate intention

More information

Stop Cyber-Bullying in its Tracks Protect Schools and the Workplace Presenter: Matthew See, Systems Engineer WatchGuard Technologies

Stop Cyber-Bullying in its Tracks Protect Schools and the Workplace Presenter: Matthew See, Systems Engineer WatchGuard Technologies Stop Cyber-Bullying in its Tracks Protect Schools and the Workplace Presenter: Matthew See, Systems Engineer WatchGuard Technologies 2010 WatchGuard Technologies Cyber-Bullying Stopcyberbullying.org, an

More information

What Is the Olweus Bullying Prevention Program?

What Is the Olweus Bullying Prevention Program? Dear Parent/Guardians, Your child s school will be using the Olweus Bullying Prevention Program. This research-based program reduces bullying in schools. It also helps to make school a safer, more positive

More information

SOCIAL MEDIA STRATEGY

SOCIAL MEDIA STRATEGY The Entertainment Industries Council s TEAM Up Social Media Guidelines for Mental Health Promotion and Suicide Prevention provide tips for organizations and individuals communicating about mental health

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

E-safety: Protecting your child online. Information for parents

E-safety: Protecting your child online. Information for parents E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

Appropriate Use of Social Media and Cell Phones

Appropriate Use of Social Media and Cell Phones Appropriate Use of Social Media and Cell Phones Karen Haase Harding & Shultz (402) 434-3000 khaase@hslegalfirm.com H & S School Law @KarenHaase Raise your hand if You have a cell phone You use text messaging

More information