Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
|
|
- Nancy Norman
- 8 years ago
- Views:
Transcription
1 Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain to you: - What cyberbullying is. - What is contributing to this new phenomenon. - Tools and mediums being used by our kids. - How you should react to cyberbullying when you come across it. - How law enforcement responds to these incidents. - And finally I will provide you with some real-life cyberbullying stories. 1
2 Cyber Bullying Is Defined As: Using electronic communications to harass, threaten, antagonize, or intimidate another person. This includes s, instant messages, text messages, chat room and/or web log postings, i.e. myspace.com, etc Posing as someone else for purposes of harassing them or others. Using a persons picture or a digitally enhanced image without their permission. CYBER BULLYING IS DEFINED AS: Bullet 1: Using electronic communications to harass, threaten, antagonize, or intimidate another person. Bullet 2: This includes s, instant messages, text messages, chat room and/or web log postings, such as myspace.com, etc Bullet 3: Posing as someone else for purposes of harassing them or others. Bullet 4: Using a persons picture or a digitally enhanced image without their permission. 2
3 Contributing Factors The Internet: A New Medium for Harassment The Availability of Electronic Communication Devices and Access Points Perceived Anonymity Provides a False Sense of Security Popularity of the Internet THE INTERNET IS A NEW MEDIUM FOR HARASSMENT, LET S LOOK AT THE CONTRIBUTING FACTORS. Bullet 1: The availability of electronic communication devices and access points such as laptops, PDA s, cell phones, digital cameras, digital recorders, wireless internet access. Bullet 2: Perceived anonymity provides a false sense of security. Cryptic screen names, false identities, and online lingo only provide anonymity on the surface. Every packet of information sent back and forth across the Internet has the address of the senders computer and the address of the receivers computer. You are NOT really anonymous. Bullet 3: Popularity of the Internet. There are approximately 1 Billion users on the Internet today. There are over 200 Million in the United States alone and many are up to no good. 3
4 Once Something Is Posted Online It Can NEVER Be Retracted Once Something Is Posted Online It Can NEVER Be Retracted. 4
5 Tools of the Always On Generation What are the Tools of the Always On Generation? 5
6 Instant Messaging & Chat Rooms: ICQ AIM MSN Yahoo! INSTANT MESSAGING & CHAT ROOMS While you may be amazed at how your child is capable of multi-tasking 12 conversations at once, Instant Messaging and Chat Rooms can be dangerous and addicting when unregulated and under supervised. 6
7 MySpace.com MYSPACE.COM Known as an Online Social Networking website, MySpace alone claims 41 million subscribers worldwide already - more than 90 percent between age 14 and 30 - and is pulling in 150,000 more each day. That is how "you can tell who the popular kids are," said one high school freshman. She also asked for anonymity, not only because of racyphotos but also because she lists herself in her profile as 16, which she hardly is. 7
8 friendster.com FRIENDSTER.COM We are conditioned to follow each other's lives through the Web. said Steven Friedman, a high school senior. "It is," as he put it, "just the next evolution of social interaction." 8
9 facebook.com FACEBOOK.COM Facebook requires your school address in order to participate, which forces most of the older predators to hunt elsewhere, but does little to stop the exuberantly charged youth. 9
10 Hate Websites HATE WEBSITES Getting pages like this taken offline is easy for the most part. The problem that created this situation may also be resolved offline. Sometimes simply talking face to face with authorities is all that is needed. Arresting and prosecuting children is not a solution we aspire to achieve, stopping the behavior is. 10
11 Text Messaging & Camera Phones TEXT MESSAGING & CAMERA PHONES Text Messaging attacks can cause increased charges on your phone bill. Cell phone cameras are used for upskirting humiliation and locker room antics which can quickly spread nude photos of your child around the world. 11
12 Polling Sites POLLING SITES Polling Web sites, which are growing in number, invite students to identify individuals by both flattering and unflattering characteristics, such as the most obese person at their school, the boys mostly likely to be gay, and the girls who have slept with the most boys. The predictable consequences for students subjected to this shameful treatment are depression, hopelessness, and withdrawal. 12
13 Bias Intimidation BIAS INITIMIDATION Victimization because of race, color, religion, gender, handicap, sexual orientation or ethnicity in combination with another crime will raise the level of the crime by one degree. This means a fourth degree harassment complaint that includes bias intimidation becomes a crime of the third degree with higher penalties. 13
14 We All Play a Role in Internet Safety Students Educators Parents Law Enforcement WE ALL PLAY A ROLE IN INTERNET SAFETY Awareness Programs Such as these, teach parents what s going on. School Policies Creating and implementing active, living policy documents that everyone must regularly read and acknowledge eliminates the fear of reporting bullying incidents by students. Supervision by Parents Computers that are in plain view with parental oversight and daily interaction. Communicate about activities and have them regularly identify their online friends to you. Teaching Programs Schools must teachchildren netiquette, values, and good communication skills with empathy toward the child s environment. 14
15 Reacting to Cyber Threats DO NOT respond, this just entices the sender. Report the sender to the Internet Service Provider and Local Authorities. Save any messages so they may be properly investigated. Print or save the chat or web page. REACTING TO CYBER THREATS Bullet 1: DO NOT respond to what has been sent, this just entices the sender. Bullet 2: Report the sender to the Internet Service Provider and Local Authorities. Bullet 3: Save any messages so they may be properly investigated. Bullet 4: Print or save the chat or web page. Not all incidents are criminal. Freedom of speech is still a constitutional right for ALL Americans. Call a legal or law enforcement professional to determine if the intent of the incident has crossed the lines where it warrants civil or criminal action. REMEMBER: Tinkering with potential computer evidence could result in it being inadmissible in court CALL A PROFESSIONAL RIGHT AWAY. 15
16 Responding to Cyber Threats 2C:12-3 Terroristic Threats 2C:12-10 Stalking 2C:13-6 Luring (Child) 2C:13-7 Luring (Adult) 2C:16-1 Bias Intimidation 2C:20-25 Computer Criminal Activity 2C:20-31 Wrongful Access, Disclosure of Information 2C:21-1 Forgery/Possession of Forgery Devices 2C:21-17 Impersonation: Theft of Identity 2C:24-4 Endangering Welfare of Children 2C:29-3 Hindering Apprehension 2C:33-4 Harassment RESPONDING TO CYBER THREATS Depending on circumstances, one or more of these criminal charges may be applied. Civil actions may be taken in addition to criminal actions. REMEMBER: Parents and guardians are ultimately responsible for their child s activities. 16
17 There is NO right to privacy on the Internet There is NO right to privacy on the Internet. 17
18 Here is a real life story provided by the National Center for Missing and Exploited Children entitled "Cyberbullying: You Can't Take It Back. Video Source: 18
19 Here is another real life scenario provided by the National Center for Missing and Exploited Children entitled Cyberbullying: Broken Friendship. Video Source: 19
20 Thank you and Welcome to Parenting in the 21 st Century! Lt. Anthony Ritter New Jersey State Police Thank you for your attention. Questions and Handouts. 20
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
More informationCyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )
Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.
More informationAffirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
More informationSarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
More informationChapter 3. Online Bullying
Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.
More informationCyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction
Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual
More informationBy Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
More informationTeen Online & Wireless Safety Survey
Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications
More informationFireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]
1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.
More informationNortheast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY
Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have
More informationInternet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informationToday s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationi-safe America Internet Safety Tips for Parents
i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informatione-rate toolkit Cyberbullying: Crossing the Line
e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview
More informationStaying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
More informationE-safety: Protecting your child online. Information for parents
E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools
More informationCyberbullying. Welcome!
Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also
More informationInternet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
More informationHow to Protect Students from Sexual Harassment: A Primer for Schools
How to Protect Students from Sexual Harassment: A Primer for Schools This fact sheet is part of a series of tools designed by the National Women s Law Center to help schools address the dropout crisis.
More informationCyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
More informationthink before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
More informationCharles Williams Church in Wales Primary School. Bullying Prevention Policy. June 2014 Review date June 2016. A Definition Of Bullying
Charles Williams Church in Wales Primary School Bullying Prevention Policy June 2014 Review date June 2016 This Bullying Prevention Policy acknowledges the Welsh Government s Respecting Others: Anti- Bullying
More informationSocial Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
More informationE-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
More informationAPPENDIX C. HARASSMENT, BULLYING, DISCRIMINATION, AND HATE CRIMES (Adaptedfrom the Attorney General's Safe Schools initiative)
APPENDIX C HARASSMENT, BULLYING, DISCRIMINATION, AND HATE CRIMES (Adaptedfrom the Attorney General's Safe Schools initiative) This section of the Code of Conduct has been adapted from the Greenfield Public
More informationYouth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationAppropriate Use of Social Media and Cell Phones
Appropriate Use of Social Media and Cell Phones Karen Haase Harding & Shultz (402) 434-3000 khaase@hslegalfirm.com H & S School Law @KarenHaase Raise your hand if You have a cell phone You use text messaging
More informationFIRBANK GRAMMAR SCHOOL
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
More informationOutsmarting On-line Predators. Christina Kilbourne
Outsmarting On-line Predators Christina Kilbourne Some Surprising Stats 26% believe their parents would be concerned if they knew what they were doing on-line over half have given out personal information
More informationAppropriate Use of Social Media and Cell Phones. Karen Haase. karen@ksbschoollaw.com KSB School Law @KarenHaase
Appropriate Use of Social Media and Cell Phones Karen Haase karen@ksbschoollaw.com KSB School Law @KarenHaase Raise your hand if You have a cell phone You use text messaging You ve taken photos with a
More informationCYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito
CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)
More informationSeptember 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9
Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of
More informationHAZING AND BULLYING (Harassment, Intimidation and Dating Violence)
HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) The prohibition against hazing, dating violence, harassment, intimidation or bullying is publicized in student handbooks and in the publications
More informationCyber Vetting Employees & Candidates. KJB Computer Forensics Consultancy
Cyber Vetting Employees & Candidates KJB Computer Forensics Consultancy Background Since the beginning of the century the ease and speed of electronically searching for information on an individual has
More informationParents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
More informationEmpowering young people to be safe on the Internet. Information for parents, teachers and community members
Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information
More informationCyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
More informationInternet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force
Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Crimes Against Children Unit SECTIONS CPU ICAC DFU WVMCC WV3C Crimes Against Children Unit WVSP Organizational Change December 1, 2009
More informationFinchley Catholic High School. Anti Bullying Policy
Finchley Catholic High School Anti Bullying Policy Bullying can occur through many types of anti-social behaviour: Physical A student can be physically punched, kicked, hit, spat at etc Verbal This can
More informationHarmful digital communications, cyber bullying and digital harassment can take a variety of forms.
FAQs - Harmful Digital Communications Bill What are harmful digital communications? Harmful digital communications, cyber bullying and digital harassment can take a variety of forms. Examples include sending
More informationeffects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor
Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences
More informationHIGH SCHOOL FOR RECORDING ARTS
Adopted Revised High School for Recording Arts Bullying Prohibition Policy 1. Purpose Students have the right to be safe and free from threatening situations on school property and at school activities
More informationParent Guide to Cyber bullying and Cyber threats
School Address: 4450 S Mendenhall Rd Memphis, TN 38141 Tel: (901) 367 7814 Fax: (901) 367 7816 www.sememphis.org MEMPHIS SCHOOL OF EXCELLENCE Parent Guide to Cyber bullying and Cyber threats Young people
More informationTAVISTOCK COLLEGE POLICIES & PROCEDURES
TAVISTOCK COLLEGE POLICIES & PROCEDURES TITLE: ANTI CYBER BULYING POLICY MODEL POLICY STATEMENT This is not a Local Authority model policy Local changes have / have not been made to the model policy by
More informationCOPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act
The Children s Online Privacy Protection Act COPPA How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online A uknow White Paper by Tim Woda, co founder of uknow.com, Inc Overview
More informationInternet Safety Kit. A wake-up call for safer surfing online for the young people in your life.
Internet Safety Kit A wake-up call for safer surfing online for the young people in your life. From the Polly Klaas Foundation Includes free download of Wired With Wisdom, an Internet safety program for
More informationGirls & Cyber- bullying
MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts
More informationGuidelines for Preventing and Dealing with Bullying Issues
Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.
More informationVictims of Crime. support and advice in Gloucestershire CRIMINAL JUSTICE SYSTEM
3 Victims of Crime support and advice in Gloucestershire The police will pass information about you to Victim Support so that they can offer you help and support, unless you ask the police not to. The
More informationVIDEO SCRIPT. Bullying, Harassment, & Civil Rights: An Overview of School Districts Federal Obligation to Respond to Harassment
SCRIPT TITLE: PREPARED BY: LEGEND: Bullying, Harassment, & Civil Rights: An Overview of School Districts Federal Obligation to Respond to Harassment National Center on Safe Supportive Learning Environments,
More informationSCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
More informationYOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org
CYBER SAFETY, CYBER ETHICS, CYBER SECURITY How to teach the kids about these concepts (a primer from staysafeonline.org program that is available free from the website) YOUR PRESENTERS Maryly Skallos Technology
More informationHow To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
More informationYou ve reported a crime so what happens next?
You ve reported a crime so what happens next? This booklet tells you what you can expect from the Criminal Justice System, and explains: what happens now how to get advice and support your rights where
More informationGlossary: Cybersafety and Technology
Glossary: Cybersafety and Technology 3G and 4G G stands for Generation, as in a generation of mobile technology. 1G was analogue mobile phones, 2G was digital phones. 3G and 4G mobile technologies brought
More informationSpringfield Public Schools
Springfield Public Schools BULLYING POLICY Approved by School Committee May 13, 2010 Amended March 6, 2014 Amended December 5, 2014 SPRINGFIELD PUBLIC SCHOOLS BULLYING PREVENTION POLICY INTRODUCTION Bullying
More information2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood
K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying
More informationCommon Facebook issues
Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young
More informationEducator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty
Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty Nancy Willard, M.S., J.D., Director Center for Safe and Responsible Internet Use URL: http://cyberbully.org or http://csriu.org
More informationDiocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016
Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy 2015-2016 1.0 Introduction St. Thomas Aquinas Catholic School recognizes that access to technology in school gives
More information2012 NCSA / McAfee Online Safety Survey
2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security
More informationDomestic Violence: Can the Legal System Help Protect Me?
Domestic Violence: Can the Legal System Help Protect Me? What is domestic violence? Domestic violence is a pattern of physically and/or emotionally abusive behavior used to control another person with
More informationCLERY ACT CAMPUS SECURITY
CLERY ACT CAMPUS SECURITY 2015 ANNUAL SECURITY REPORT / CRIME STATISTICS Heritage College, Kansas City, Missouri 2012 2013 2014 CRIMINAL OFFENSES ON CAMPUS Burglary 0 0 0 Arrests for liquor law violations,
More informationCyberbullying: What Parents Can Do to Protect Their Children
Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,
More informationPOLICY 5111 ANTI-BULLYING/HARASSMENT/HATE
POLICY 5111 Purpose/Introduction: The Kenosha Unified School District strives to provide a safe, secure and respectful learning environment for all students in school buildings, on school grounds, in school
More informationANNUAL PUBLIC NOTICES
ANNUAL PUBLIC NOTICES SAFE ENVIRONMENT PROGRAM - EMPLOYEES AND VOLUNTEERS All employees of the diocese, parishes or schools, as well as volunteers, who have regular contact with children, are required
More informationSafety Tips for Social Networking
Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and
More informationONA Position Statement
ONA Position Statement Photography, Video and Audio Taping of ONA Members Providing Care Need for Employer Policy The Ontario Nurses Association (ONA) takes the position that all employers should have
More informationSocial Networking Sites A Predator s Playground?
Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every
More informationSeeking Protection from Domestic Violence in New York s. Information for Immigrant Victims with Limited English Proficiency
Seeking Protection from Domestic Violence in New York s Family Court: Information for Immigrant Victims with Limited English Proficiency What is domestic violence? If your current or former intimate partner
More informationA guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children. A joint initiative by:
A guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children A joint initiative by: 30-01 11/08 (50,000) Brunswick Press Ltd. (21848) CONTENTS PAGE 1.
More informationEADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
More informationPredators will use information obtained from children to gain trust and friendship
1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and
More informationCyber Safety For Parents
Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting
More informationCyberbullying Policy Considerations for Boards
July 2007 Cyberbullying Policy Considerations for Boards Schools have long had to deal with bullying among students, including hitting, teasing, name-calling, intimidation, harassment and social exclusion.
More informationHEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
More informationChicago Homeless Management Information System (HMIS) Privacy Packet
Chicago Homeless Management Information System (HMIS) Privacy Packet Table of Contents Standard Agency Privacy Practices Notice... 3 Chicago Standard HMIS Privacy Posting... 6 Client Consent Form for Data
More informationParent / Guardian Consent for Technology Use in Schools
Parent / Guardian Consent for Technology Use in Schools Our school uses computers and other mobile devices in the classroom to help increase student motivation and achievement. We will use laptop sets,
More informationCYBERSAFETY CYBERSAFETY. Brian Regli, Ph.D, Drakontas LLC March 18, 2015 C2P2FL
CYBERSAFETY CYBERSAFETY Brian Regli, Ph.D, Drakontas LLC March 18, 2015 C2P2FL Social Media Technical Landscape Social Bookmarking Social News Wikis Communication Blogs Micro-blogging Geo-social Networking
More informationSTOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationJune 2008. Canadian Teachers Federation Fédération canadienne des enseignantes et des enseignants
Addressing Cyberconduct A Brief to the Department of Justice Canada June 2008 Canadian Teachers Federation Fédération canadienne des enseignantes et des enseignants Brief to the Canadian Ministry of Justice:
More informationBERKELEY COLLEGE Equal Opportunity Policy
BERKELEY COLLEGE Equal Opportunity Policy Purpose Recognizing that its diversity greatly enhances the workplace and opportunities for learning, Berkeley is firmly committed to providing all associates,
More informationPolicy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy
More informationC-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
More informationBe it enacted by the People of the State of Illinois,
AN ACT concerning education. Be it enacted by the People of the State of Illinois, represented in the General Assembly: Section 5. The School Code is amended by changing Section 27-23.7 as follows: (105
More informationPARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com
PARENTING IN THE DIGITAL AGE Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com Teens and Technology Use 78% have a cell phone 95% use the Internet 91% have an email address 74% access the
More informationCurrent Internet Facts
Current Internet Facts Facts about Online Predators and Strangers online: Twenty-eight percent of tweens (ages 8 to 12) have been contacted over the Internet by someone they don t know (COX Tween Internet
More informationHuman trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.
Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human
More informationRISKS OF ELECTRONIC COMMUNICATION 2
Palacký University Olomouc FACULTY OF EDUCATION Centre for the Prevention of risky virtual communication Czech Republic RISKS OF ELECTRONIC COMMUNICATION 2 SURVEY RESEARCH REPORT CONDUCTED WITHIN A PROJECT
More informationNational Cybersecurity Awareness Campaign Families Presentation
National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security
More informationVirginia Primary School Learning Together, Learning for our Future
Virginia Primary School Learning Together, Learning for our Future RESPECT CARING FAIRNESS ACHIEVEMENT DIVERSITY Information Technology - Cyber-Safety Policy The measures to ensure the cyber-safety of
More informationCounty Court Restraining Orders
Answers to Your Questions About County Court Restraining Orders Excellence in Customer Service Colorado Judicial Branch http://www.courts.state.co.us June 2002 CIVIL LAW In a civil case, the person seeking
More informationAppropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
More informationEASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour
More informationVerizon and Online Safety: Protecting Children in the 21 st Century
Verizon and Online Safety: Protecting Children in the 21 st Century APEC-OECD Joint Symposium on Promoting Safer Internet Environment for Children Leslie Martinkovics Director, Verizon International Public
More informationSelected Findings from the Indicators of School Crime and Safety: 2014
Selected Findings from the Indicators of School Crime and Safety: 2014 CEBCP Symposium, August 17, 2015 Simone A. Robers Associate Director, Education Institute for Public Research, CNA Today! Importance
More information