Popular Culture Bullying and At-Risk Behaviors: Delinquency, Crime, Bullying and Cyberbullying
|
|
- Amy Cummings
- 7 years ago
- Views:
Transcription
1 Murrieta Valley Unified School District Popular Culture Bullying and At-Risk Behaviors: Delinquency, Crime, Bullying and Cyberbullying Parent Awareness and Strategies
2 Presenters Paul Johnson Detective Murrieta Police Department Wayne Sakamoto Safe Schools Director Murrieta Valley Unified School District
3 Topics 1. Bullying 2. Cyberbullying 3. Technology and Internet Risks 4. General Strategies
4 Topics 1. Bullying 2. Cyberbullying 3. Technology and Internet Risks 4. General Strategies
5 Bad Behaviors Vs. Bullying Bullying has Become a Catch Phrase Not All Bad Behaviors or Aggression can be Called Bullying All Negative Behaviors will be Dealt With If We can Document that it Happened
6 Bullying Definition Specific Type of Aggression Verbal Physical Psychological Behavior is Intended to Harm or Disturb Carried Out Repeatedly and Over Time Imbalance of Power Physical Psychological
7 Direct Bullying Physical Acts Threats Intimidation Verbal Abuse Taunting Other?
8 Indirect Bullying Making Faces Obscene Gestures Exclusion Rumors Other?
9 Parent Tips - Bullying Get Information from Your Child Who, What, Where, When, and Why Did You Report This to an Adult? Work on Strategies With Your Child Have Them Think About and Discuss Their Ideas Ask Questions What Would You Do If That Didn t Work?
10 Parent Tips - Bullying List Options and Consequences Role Play Their Strategies Allow Them to Try Out Their Strategies Check in With Them Allow Them to Fail and Encourage Them to Try Again Resist the Urge to Immediately Intervene
11 Parent Tips Inform the School Administrator AND Teacher Provide Information Who, What, Where, When and Why Ask What Their Perspective of the Situation is Ask About Strategies Remember If They Have Not Investigated, They Will have To Prior to Strategies FERPA
12 Topics 1. Bullying 2. Cyberbullying 3. Technology and Internet Risks 4. General Strategies
13 Cyberbullying Definition Use of Modern Communication Technologies: Instant Messaging Chat Rooms Web Sites Social Networking Sites Cell Phones and other forms of technology To Intentionally Embarrass, Humiliate, Threaten or Intimidate an Individual or Group To Attempt to Gain Power and Control
14 Cyberbullying Is: Directly hurting someone s feelings or threatening them via technology Texting mean statements Posting up a website to harm someone Passing rumors to other people via text or Social Network sites Posting embarrassing pictures of someone without their permission What else?
15 Cyberbullying V. Bullying More Invasive Larger Audience Lengthens Duration of Bullying Potential for Greater Cruelty Source: Glen Stutzky, Michigan State University
16 isafe Survey i-safe America conducted a national survey of more than 1500 students -ranging from fourth to eighth grade. 58% of kids admit someone has said mean or hurtful things to them online 53% of kids admit having said something mean or hurtful things to another online 42% of kids have been bullied while online 34% were threatened
17 Who s Responsibility? School? Community? Law Enforcement? Parents?
18 Shivela Vs. Thompson
19
20 Murrtowns Burrnbook
21
22
23 Cyberbullying is out of control. People are saying all kinds of things online they would never say to someone in person. Something needs to be done. It is all about Facebook right now and it is crazy. October 2010, Vista Murrieta High School Senior Of course I spread rumors on my phone and on the internet, I m a seventh grade girl, that s what we are supposed to do! March 2007, Santee Leadership Student
24 School Responses to Cyberbullying Nexus to the School Victim Impact Statements How has this impacted your attendance How has this impacted your academics How has this impacted you at school Bystander/Friend/Perpetrator Statements Have Other Students Shared the Text, Video Etc. At School? Has the Cyberbullying Caused School Bullying
25 Parent Tips - Cyberbullying Have Children Sign a Contract on Appropriate Usage Discuss Scenarios With Them What Would You Do if Someone Posted Something Mean About Another Student? Do Not Allow them to Have an Social Media Account at an Early Age (FB is 13YO)
26 Parent Tips - Cyberbullying Monitor Their Social Network Postings Be Aware of Parent Page Vs. Real Page Empowerment Vs. Entitlement Have Children Check Cellphones In and Out (7PM)
27 Parent Tips - Cyberbullying Do Not Erase, Omit or Alter Texts or s This is Your Evidence Do Screen Shots of Social Network Sites Copy and Paste the URL and Provide to the School Teach Netiquette Online Manners Teach Them to Be Aware of Trolling Activities and Strategies
28 Parent Tips If a Threat of Violence has Been Made Contact Law Enforcement AND the School For the School To Take Action We Need to Show a Substantial Disruption to the Educational Process Most Cyberbullying is OUTSIDE the Jurisdiction of the School To Take Action
29 Parent Tips How We Investigate If on Social Networking We Will Gain Permission to Go Onto Your Students Site Unless it Is Open to All We Will Look at the Entire Thread and Into Other Folders for Information We Will Call in Other Students to Interview We Will Ask Permission for The Student to Allow Us on Their Site
30 Parent Tips If We Cannot Gain Permission or They will not Access Their Site We Will Call Parents If Permission is Not Given We Will Pursue Other Evidence if Possible Bring Us Screen Shots To Assist With Documenting Again, We Need to Show Substantial Disruption Before We Can Act
31 Cyberbullying Resources
32 Sexting Taking a provocative digital image of yourself Sending that image to friends Both males and females do this May be considered Child Pornography even if sent to and by willing minors
33 Instant Messaging Resources
34 Chat Rooms
35
36
37
38
39 Chat Roulette
40 Would Your Kids Answer: What s your name? Where do you live? What school do you go to? What are your parents names?
41 Go to Zabaseach.com
42 Topics 1. Bullying 2. Cyberbullying 3. Technology and Internet Risks 4. General Strategies
43 Parent Strategies Layered Approach to Safety and Security Trust, but Never Believe Not My Kid Have Ongoing Discussions with Your Children Have Children Sign Contracts with You Discuss Scenarios With Them Have Them Research Cyberbullying Online Have Them Research Internet Safety Online
44 Parent Strategies Secure Computer in a Family Room May Use Tracking/Screening Software Proxy Sites Cheats Check Web History Check Cell Phone Files Texts Pictures/Videos Monitor Your Cell Phone Bill Be Aware of Warning Signs of Cyberbullying and Cyber Addiction Increase Your Knowledge Do Not Rely Solely on Software
45
46
47
48
49
50 Parent Strategies Discuss Appropriate Use of Internet and Cyberbullying Have Your Child Sign a Contract or Agree to Keep You Informed Ask Them How Would You Questions Periodically Sit With Them as They Surf
51 Parent Strategies Have Them Teach You About the Computer and Internet Limit Chat Rooms Discuss Social Networking Sites Teach Them How to Do Screen Shots
52 Screen Shot CNTRL PrtScn SysRq Open Word Program Right Click Mouse Paste Save As
53
54
55 Talk to Your Kids Privacy!!! Only Add Real Friends You Know Give your Password ONLY to Your Parents Watch What You Post It is FOREVER If You Wouldn t Say it in Person, Don t Say it Online! Be Careful in Posing for Pictures With Friends
56 Talk to Your Kids Do NOT Cyberbully! Do NOT Spread Rumors! Do NOT Forward Mean Texts Protect Your Friends Learn How to Do Screen Shots Talk to Your Parents or Adults About Sites, Texts, s that Make You Uncomfortable Remember to TURN-OFF Electronics Give Yourself a Break!!!
57 Check Web History
58 Resources
59 Cyberbullying.us
Cyberbullying. How common is cyberbullying?
Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:
More informationSchool Bullying Survey
School Bullying Survey This survey is not required for your class. If you choose not to complete this survey, your grade in the class will not be affected in any way. If this is your decision, just leave
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationCyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )
Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.
More informationSarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
More informationthink before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
More informationeffects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor
Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences
More informationCyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
More informationOnly talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
More informationDallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informationGuideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
More informationBy Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
More informationFAIRFIELD AREA SCHOOL DISTRICT
No. 249 FAIRFIELD AREA SCHOOL DISTRICT SECTION: PUPILS TITLE: BULLYING / CYBERBULLYING ADOPTED: REVISED: August 11, 2015 249. BULLYING / CYBERBULLYING 1. Purpose 2. Definitions The Board is committed to
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationReview VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:
#300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital
More informationCyberbullying: What Parents Can Do to Protect Their Children
Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,
More informationEADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
More informationSchool Policy Regarding Computer Use, Technology and Internet Access
School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school
More informationYouth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
More informationLt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
More informationOPENING ACTIVITY BALL OF STRING FLING
NWAC Youth Violence Prevention Workshop Bullying OPENING ACTIVITY BALL OF STRING FLING Acknowledgements Recognizing and Responding to Violence against Women in Aboriginal Communities created in conjunction
More informationInternet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
More informationHEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
More informationGRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY
GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Approved: 4 September 2014 Review Date: Page 1 of 7 GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Introduction Schools have a duty of care for pupils and
More informationHAZING AND BULLYING (Harassment, Intimidation and Dating Violence)
HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) The prohibition against hazing, dating violence, harassment, intimidation or bullying is publicized in student handbooks and in the publications
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationToday s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
More informationE-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
More informationEanes Independent School District Responsible Use Guidelines for Technology
Eanes Independent School District Responsible Use Guidelines for Technology My student and I are committed to the Responsible Use Guidelines. By signing this, we commit to discussing and reviewing the
More informationGirls & Cyber- bullying
MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts
More informationIdaho. Coalition Against Sexual & Domestic Violence Engaging Voices, Creating Change. Table of Contents
stalking Most victims are stalked by someone they know. Stalking is serious, often violent, and can escalate over time. This handbook provides information on stalking and available resources. Idaho Coalition
More informationCyberbullying. Welcome!
Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also
More informationCyber-bullying is covered by this policy: all members of the community need to be aware that
DUKE OF KENT SCHOOL A8 ANTI-BULLYING POLICY Aims and Objectives: Duke of Kent School values every individual in the community and believes each deserves to be treated with respect. Sensitivity to the feelings
More informationBullying 101: Guide for Middle and High School Students
Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org
More informationi-safe America Internet Safety Tips for Parents
i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and
More informationDiocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016
Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 1.0 Introduction St. Thomas Aquinas Catholic School recognizes that access to technology in school gives
More informationAppropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
More informationEmpowering young people to be safe on the Internet. Information for parents, teachers and community members
Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information
More informationYOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org
CYBER SAFETY, CYBER ETHICS, CYBER SECURITY How to teach the kids about these concepts (a primer from staysafeonline.org program that is available free from the website) YOUR PRESENTERS Maryly Skallos Technology
More informationBullying Prevention. When Your Child Is the Victim, the Bully, or the Bystander
Bullying Prevention When Your Child Is the Victim, the Bully, or the Bystander What Is Bullying? Bullying is not a conflict or a fight. Bullying is physical, verbal, or emotional abuse that is deliberate,
More informationCyber Safety For Parents
Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting
More informationSpringfield Public Schools
Springfield Public Schools BULLYING POLICY Approved by School Committee May 13, 2010 Amended March 6, 2014 Amended December 5, 2014 SPRINGFIELD PUBLIC SCHOOLS BULLYING PREVENTION POLICY INTRODUCTION Bullying
More informationwww.xxxchurch.com Online Predators & Strangers
www.xxxchurch.com Online Predators & Strangers When children go online, they have direct access to their friends and family members, but they also may come into contact with complete strangers. Through
More informationCyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence
Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence Cyber Bullying: A Prevention Curriculum for Grades 6-12 What is Cyber Bullying: A Prevention Curriculum for Grades 6-12? Cyber
More informationKnow the Rules Before You Use the Tools: A Student User s Guide to Project Share
Know the Rules Before You Use the Tools: A Student User s Guide to Project Share The Texas Education Agency 1 I. Welcome to Project Share Project Share is a group-learning website that lets you create,
More informationHuman trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.
Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human
More informationPOLICY 5111 ANTI-BULLYING/HARASSMENT/HATE
POLICY 5111 Purpose/Introduction: The Kenosha Unified School District strives to provide a safe, secure and respectful learning environment for all students in school buildings, on school grounds, in school
More informationBaldwin County Public Schools. Acceptable Use Policy
Introduction Baldwin County Public Schools Acceptable Use Policy Baldwin County Public Schools (BCPS) recognizes that access to technology in school gives students greater opportunities to learn, engage,
More informationPredators will use information obtained from children to gain trust and friendship
1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and
More informationHow To Stop Cyberbullying
XCS - Objectionable Content Filtering Stop Cyber-Bullying in its Tracks - Protect Schools and the Workplace Technical Brief WatchGuard Technologies Published: January 2011 Cyber-Bullying Bullies are everywhere
More informationBrownsburg Community School Corporation Acceptable Use Policy 2012-2013
Introduction Brownsburg Community School Corporation Acceptable Use Policy 2012-2013 The Brownsburg Community School Corporation (BCSC) recognizes that access to technology in school gives students greater
More informationInternet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
More informationRISKS OF ELECTRONIC COMMUNICATION 2
Palacký University Olomouc FACULTY OF EDUCATION Centre for the Prevention of risky virtual communication Czech Republic RISKS OF ELECTRONIC COMMUNICATION 2 SURVEY RESEARCH REPORT CONDUCTED WITHIN A PROJECT
More informationSocial Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
More informationTechnology Acceptable Use Policy
Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop
More informationExpanding Bullying Prevention Partnerships for Federal, State and Local Action Elizabeth Edgerton, MD, MPH
Expanding Bullying Prevention Partnerships for Federal, State and Local Action Elizabeth Edgerton, MD, MPH April, 2011 www.stopbullying.gov Launched on March 10, 2011 The Story of Jamal 12 year old boy
More informationONLINE SAFETY TEACHER S GUIDE:
TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.
More information1.1 This policy applies to students/staff/volunteers/visitors/parents and student councils, including representatives of the Winnipeg School Division.
PAGE: 1 of 7 1. GENERAL 1.1 This policy applies to students/staff/volunteers/visitors/parents and student councils, including representatives of the Winnipeg School Division. 1.2 The Winnipeg School Division
More informationHIGH SCHOOL FOR RECORDING ARTS
Adopted Revised High School for Recording Arts Bullying Prohibition Policy 1. Purpose Students have the right to be safe and free from threatening situations on school property and at school activities
More informatione-rate toolkit Cyberbullying: Crossing the Line
e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview
More informationDigital Design Class Overview/Rules
Digital Design 1 4 Ms. Fuller, instructor Digital Design Class Overview/Rules Class procedures, policies, and information: Class Rules Passes Handouts Safety and Security ID Badges Lockdown Procedures
More informationCyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
More informationTHE TRUTH ABOUT BULLIES
THE TRUTH ABOUT BULLIES OVERVIEW: The goal of this activity is to inform and educate students about bullying. The lesson plan asks students to consider a list of statements about bullies and to decide
More informationA Guide for Parents. of Elementary and Secondary School Students
A Guide for Parents of Elementary and Secondary School Students The effects of bullying go beyond the school yard. As a parent, here s what to watch for, what you can do, and where you can go to get help.
More informationBullying Awareness Lesson Plan Grades 4-6
Bullying Awareness Lesson Plan Grades 4-6 1 Estimated Time of Completion: Two to three classroom periods, or stretched out throughout the school year. Each activity will take between 15-30 minutes. Bullying
More informationSocial Networking Sites like Facebook, MSN
Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and
More informationCyber-bullying. Cyber-bullying: A Digital Epidemic White Paper
Cyber-bullying Cyber-bullying: A Digital Epidemic White Paper What is Cyber-bullying? The past two decades have witnessed a virtual explosion in new technology that has been eagerly embraced by adolescents
More informationAffirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
More informationCYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito
CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)
More informationFinchley Catholic High School. Anti Bullying Policy
Finchley Catholic High School Anti Bullying Policy Bullying can occur through many types of anti-social behaviour: Physical A student can be physically punched, kicked, hit, spat at etc Verbal This can
More informationC-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
More informationWhether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives.
Cyberbullying Whether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives. By Ted Feinberg and Nicole Robey Ted Feinberg is the assistant executive director
More informationDigital Citizenship: Etiquette. My Online code & Breaking Down Hate Speech Grades 9-12
Digital Citizenship: Etiquette My Online code & Breaking Down Hate Speech Grades 9-12 Essential Question: What does it mean to do the right thing online? How can you create a community culture in which
More informationANTI-BULLYING POLICY. Every ThreeYears. Ratified by Governors: January 2014 Review date: January 2017. One part of the Safeguarding Policy portfolio
ANTI-BULLYING POLICY Responsible Committee: Every ThreeYears Student & Community Ratified by Governors: January 2014 Review date: January 2017 Safeguarding Health & Safety Financial Equalities Legal One
More informationPrivacy vs. Safety: School Searches of Electronic Devices
Privacy vs. Safety: School Searches of Electronic Devices / Rubén A. Villalobos Partner, Villalobos 2 Legal Group Trustee, Modesto City Schools ruben.villalobos@gmail.com 1 Introduction WELCOME Ask Questions!
More informationCYBERBULLYING TEACHER S GUIDE:
TEACHER S GUIDE: CYBERBULLYING LEARNING OBJECTIVES Students will understand the meaning of cyberbully. Students will learn to recognize different forms of cyberbullying. Students will learn different strategies
More informationOnline Reputation. Luke 29/09/2015. Never give out your personal information. www.thinkuknow.co.uk. www.ceop.police.uk
Online Reputation Luke www.ceop.police.uk www.thinkuknow.co.uk Child Exploitation Online Protection Centre (CEOP) Never give out your personal information Parents 1 When should I report to CEOP? How to
More informationCrossing. the. L ne. Sexual Harassment at School
Crossing the L ne Sexual Harassment at School Executive Summary Executive Summary A student is groped on the way to class. Kids call a student gay and faggot and just won t quit. A demeaning sexual rumor
More informationSTANDING TALL. Cyberbullying: Protect Your Sons and Daughters FACTS:
FACTS: Up to 42% of teens report being bullied on-line STANDING TALL Cyberbullying: Protect Your Sons and Daughters 16% of adolescents report they cyberbully others Disrespect and namecalling occur most.
More informationProtect Your Privacy Online
Protect Your Privacy Online By Kathiann M. Kowalski Keep personal information private for your own good! High school sophomore Karra H. never expected to see herself on a Web site featuring scantily clad
More informationAbuse & Takedown Policies and Procedures
Abuse & Takedown Policies and Procedures Vox Populi Registry Ltd. 3-110 Governors Square 23 Lime Tree Bay Ave. Grand Cayman, Cayman Islands PO Box 1361, George Town, KY1-1108 www.registry.sucks Version
More informationParents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
More informationVail School District Acceptable Use Policy 2015 2016
Vail School District Acceptable Use Policy 2015 2016 You have a wonderful opportunity before you! You have the opportunity to use the school's technology resources for your education. These resources will
More informationStaying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
More informationThe webcast will begin shortly. Please stand by.
The webcast will begin shortly. Please stand by. @Gaggle_K12 Making Student Safety A Priority @Gaggle_K12 Webcast Tips ü To switch from computer audio to your phone, locate the Audio Pane, select Use Telephone
More informationFAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
More informationThe Digital Divide: How the Online Behavior of Teens is Getting Past Parents
June 2012 The Digital Divide: How the Online Behavior of Teens is Getting Past Parents Parent Disconnect Despite the obvious disconnect between teens online behaviors and parents knowledge of them, parents
More informationTAVISTOCK COLLEGE POLICIES & PROCEDURES
TAVISTOCK COLLEGE POLICIES & PROCEDURES TITLE: ANTI CYBER BULYING POLICY MODEL POLICY STATEMENT This is not a Local Authority model policy Local changes have / have not been made to the model policy by
More informationLee County School District
Lee County School District Acceptable Use Policy This Acceptable Use Policy outlines the guidelines and behaviors that users are expected to follow when using school technologies or when using personally-owned
More informationTECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus
Telecommunication Tools TECHNOLOGY The Internet is like a giant web of computers connected. The Internet is also called the World Wide Web. There are good places to go on the Internet and there are some
More informationGodley Community Primary School. Anti-Bullying Policy
Godley Community Primary School. Anti-Bullying Policy Delivering Excellence in a Happy and Nurturing Learning Environment Bullying is action taken by one or more children with the deliberate intention
More informationStop Cyber-Bullying in its Tracks Protect Schools and the Workplace Presenter: Matthew See, Systems Engineer WatchGuard Technologies
Stop Cyber-Bullying in its Tracks Protect Schools and the Workplace Presenter: Matthew See, Systems Engineer WatchGuard Technologies 2010 WatchGuard Technologies Cyber-Bullying Stopcyberbullying.org, an
More informationWhat Is the Olweus Bullying Prevention Program?
Dear Parent/Guardians, Your child s school will be using the Olweus Bullying Prevention Program. This research-based program reduces bullying in schools. It also helps to make school a safer, more positive
More informationSOCIAL MEDIA STRATEGY
The Entertainment Industries Council s TEAM Up Social Media Guidelines for Mental Health Promotion and Suicide Prevention provide tips for organizations and individuals communicating about mental health
More informationNortheast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY
Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have
More informationE-safety: Protecting your child online. Information for parents
E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools
More informationFireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]
1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.
More informationNational Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
More informationAppropriate Use of Social Media and Cell Phones
Appropriate Use of Social Media and Cell Phones Karen Haase Harding & Shultz (402) 434-3000 khaase@hslegalfirm.com H & S School Law @KarenHaase Raise your hand if You have a cell phone You use text messaging
More information