think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
|
|
|
- Noreen Ford
- 9 years ago
- Views:
Transcription
1 think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
2 think before you send! A Message from the District Attorney The use and capabilities of digital communication have exploded in just a short period of time. Clearly, the improved ability to communicate and greater access to information that the growth in technology has created are beneficial. However, there are also many risks associated with digital communication and it is important that all of us understand how to use digital communication safely and responsibly. Digital communication whether it is a text message on a cell phone or a comment on a social networking page can be altered and shared and is, therefore, not private. There are many ways that these messages and photographs, when shared, can have a negative consequence and, in some cases, violate the law. Some types of digital communication can facilitate bullying. It is easier to demean someone when you don t have to look them in the eye or actually say the words to them. Posting mean and hateful messages on social networking pages and forwarding inappropriate photographs are just some of the ways that bullying takes place. Also, we have seen an increase in dating abuse due, in part, to this technology because it allows a partner constantly to monitor the actions and whereabouts of another. This behavior can cross the legal line. For this reason, my Office has developed this presentation to encourage people to think before they send a potentially life-altering message. This presentation will inform students about how their use of technology could violate the law, as well as protect them from online predators and other dangers associated with the use of digital communication. Sincerely, Jonathan W. Blodgett, Essex District Attorney 2 Think before you send!
3 Introduction Think Before You Send: Using Digital Communication Responsibly is a PowerPoint presentation covering: n Privacy/disclosure of your personal information. n Predators. n Cyberbullying. n Digital dating abuse. n Sexting. This program was developed to raise awareness of these issues and discuss the possible legal consequences associated with each. This program is not meant to be used alone but rather to supplement existing programs or to assist in the development of comprehensive programs and policies. Materials This program includes a CD containing: n PowerPoint presentation. n PDF Facilitator s Guide. Preparation To facilitate the Think Before You Send: Using Digital Communication Responsibly program, we recommend that you first preview the presentation to familiarize yourself with its content. To properly display the presentation, you will need a computer with PowerPoint, a projector, speakers, and a screen or other projection surface. Think Before You Send: Using Digital Communication Responsibly runs for 45 minutes and may be facilitated by educators, school resource officers, counselors, and other school staff. To access the presentation and materials: Step Action 1 Insert the CD into your disk drive. The CD will automatically run the presentation. 2 To move to the next slide, click either the mouse or the right/down arrow buttons. Videos will automatically play throughout the presentation. 3 To access PDF versions of the facilitator s guide, press the Escape button, go to Start, Run, type d: in the space provided, and press Enter. The CD opens without starting the presentation. 4 To access the handout, click Facilitator s Guide. Further Resources n n n n n National Teen Dating Abuse Helpline at or 3 Think before you send!
4 Slide 1 Think before you send! Using Digital Communication Responsibly Slide 2 Digital Communication includes Cell phones, computers, and any other devices with access to the Internet on which you can n Text n Send photos n Watch videos n , instant message n Join a social networking site n Blog n Play online games n Enter chat rooms Slide 3 Risks of Digital Communication n Along with the benefits of digital communication, comes many risks n Be aware of these risks, and use cell phones and the Internet responsibly. 4 Think before you send!
5 Slide 4 Presentation Overview This presentation covers: n Privacy/disclosure of your personal. information n Predators. n Cyberbullying. n Digital dating abuse. n Sexting. n Legal consequences. Slide 5 Privacy You may think that you have privacy while online and on your cell phone, but IMs, s, photos, texts, wall posts all forms of digital communication can be forwarded, shared, altered, and printed. Nothing on the Internet or your cell phone is private. Explain that the Internet is a global communication network whose primary purpose is to share information. For this reason, there should be no expectation of privacy when posting or sharing information online. Slide 6 Who is looking 5 Think before you send!
6 Slide 7 Colleges and Potential Employers This presentation covers: n According to a 2008 Kaplan study, 1 in 10 college admissions officers routinely checks applicants social networking pages. n Of those colleges that look at online information, 38% report that what they saw negatively affected their views of the students. This information is from a 2008 Kaplan Higher Education Study of 401 admissions officers from US News and World Report s America s Best Colleges and Barron s Profiles of American Colleges. Slide 8 Law Enforcement and Press Information and photos posted on social networking sites can be reviewed by law enforcement and used as evidence in court or could be published in the media. In Rhode Island, a 20-year-old was involved in a drunk driving accident that severely injured another young person. Two weeks after the accident and while the victim was still in the hospital, the prosecutor found pictures of the defendant at a Halloween party, dressed in a prisoner costume and drinking alcohol. He received the harsher sentence of two years in state prison and he was denied parole. (MSNBC, 01/27/2009) 6 Think before you send!
7 Slide 9 Did you know n 71% of teens reported receiving messages online from someone they don t know. n 45% of teens have been asked for personal information by someone they don t know. n 30% of teens have considered meeting someone that they ve only talked to online. n 14% of teens have actually met a person face-to-face that they have only spoken to on the Internet. According to a 2006 survey conducted by the National Center for Missing and Exploited Children Slide 10 Keeping Yourself Safe Online n Never meet someone in person that you met online. n Do not respond to dangerous or offensive s, chats, posts or text messages. n If you receive something that makes you feel scared or uncomfortable, talk to a trusted adult. Slide 11 Things to consider 7 Think before you send!
8 Slide 12 How Do People Reveal Personal Information? n Choosing screen names (kateny13 vs. soxrule230). n Talking about specific activities and vacation plans. n Sharing private emotions or photos in a public forum. Remember: The Internet is NOT private. For public chat rooms it is best to use a screen name that does not reveal your name, age, or location. In addition, posting or sharing the name of your baseball team or school could reveal your location. Photographs could show a school or town name in the background or on clothing. Example: An adult posted as her Facebook status that she was going on vacation. When she returned, her home had been robbed. Sharing private emotions, such as personal family information or feelings about another student, could result in ridicule, bullying, or embarrassment. Slide 13 Tracking Teresa Video Tracking Teresa is a based on an experiment by a state trooper who wanted to see how difficult it was to track someone online. Ask the audience to think about the content they have posted on their profiles while to video is playing. 8 Think before you send!
9 Slide 14 Not So Private n Even a private social networking page can still be seen by friends and in some cases friends of friends and friends and networks. n Always check privacy settings for any cell phone or Internet activity. Privacy settings vary from site to site and can change without the user being notified. It is good practice to check from time to time who has access to information you share online. When you have a lot of friends online, there is always a possibility that your information will be shared with people you don t know. Slide 15 This is a Facebook page where the user selects the privacy settings. Note that the default setting is friends and networks and that settings must be selected for each part of a Facebook page. This is just one example of a social networking site. Users should look for settings or preferences on a web page that they are using. Slide 16 Friends n An online friend is anyone who requests to be your friend who you accept. n How are online friends different from offline friends? To illustrate this point, approach an audience member and introduce yourself and shake hands. Now ask the audience to identify what this person knows about you based on that interaction. (Your approximate age, your gender, etc.) Now compare that to a friend request online. What do you really know about someone who friend requests you online? 9 Think before you send!
10 Slide 17 Friend List n Sometimes people will compete to see who has the most friends and will add friends to their list that they don t know in person. n Even with the appropriate privacy settings in place, accepting a large number of people as your friends may result in your personal information, pictures, and posts being seen by many people you did not consider. Slide 18 Keep in mind n Without tone of voice, facial expression, or body language, misunderstandings can occur. n Anyone can say anything. People are not always who they say they are. n Images and messages can be shared and altered without your knowledge. n Deleting an image or a post doesn t mean it is permanently removed. Slide 19 Using digital communication can give you a false sense of privacy and could lead to n Saying things you would not say in person. n Talking to people you would never speak to in person. n Revealing information about yourself to people you don t know. 10 Think before you send!
11 Slide 20 Everyone Knows Your Name Video Everyone Knows Your Name shows what happens to Sarah because she posted too much information online. Slide 21 Crossing the Criminal Line Slide 22 Digital Communication Crimes n The increase in the use of technology has resulted in an increase in the number of digital communication-related crimes. n Some people using this technology might not realize that they could be committing a crime. 1 1 Think before you send!
12 Slide 23 Crossing the Legal Line Annoying Phone Calls (MGL Ch. 269, Sec. 14A) Stalking (MGL Ch. 265, Sec. 43) Criminal Harassment (MGL Ch. 265, Sec. 43A) Unauthorized Access to a Computer System (MGL Ch. 266, Sec. 120F) Use of Personal Identification of Another (Identity Theft) (MGL Ch. 266, Sec. 37E) Threats (MGL Ch. 275, Sec. 2) Violation of Restraining Order (MGL Ch. 209A, Sec. 7) Violation of Civil Rights (MGL Ch. 265, Sec. 37) Possession of Child Pornography (MGL Ch. 272, Sec. 29C) Dissemination of Child Pornography (MGL Ch. 272, Sec. 29B) There are many laws that apply to digital communication. Slide 24 Cyberbullying n Like bullying, cyberbullying is intentional and repeated behavior. n Examples of cyberbullying are: Sending or posting harmful, cruel, or threatening messages or images. Creating fake screen names or social networking pages for the purpose of harassment. n These acts can cross the legal line. n Victims of cyberbullying may feel helpless and depressed and may even contemplate suicide. If there are recent media stories about cyberbullying, you may want to mention them. 1 2 Think before you send!
13 Slide 25 Cyberbullying Advice n Don t retaliate or forward the message. n Involve a trusted adult. n Don t open messages from cyberbullies. n Block or unfriend someone who is bullying you. n Contact the school or police. If you are the target of cyberbullying, it can be very difficult to tell an adult because you may feel embarrassed or afraid. However, it is very important to tell someone. If you are a witness to cyberbullying, don t participate by forwarding, posting, or joining. Involve a trusted adult. Slide 26 Can t Take It Back Video Can t Take It Back is about a young man who participates in a form of cyberbullying and sees firsthand the effect it can have on the victim. Slide 27 Digital Dating Abuse n 1 in 3 teens in a dating relationship reports being texted up to 30 times an hour by a partner to find out where they are, what they are doing, and whom they are with. n 1 in 4 teens reports being put down or harassed via cell phone by their partner. n 17% of teens say they are afraid of what their partners might do if they don t respond to a cell phone call, IM, , or text. This information is from a June 2009 Survey by Teenage Research Unlimited for the Family Violence Prevention Fund and Liz Claiborne Inc. 1 3 Think before you send!
14 Slide 28 That s Not Cool Video This is Public Service Announcement by That s Not Cool, The Family Violence Prevention Fund, The Ad Council, and the Office on Violence Against Women, that illustrates how constant texting is not part of a healthy relationship. Slide 29 Digital Dating Abuse Advice n Talk to someone you trust: parent, friend, coach, teacher. n If you are afraid or feel unsafe, call the police. Explain that sometimes teens can confuse a dating partner s constant texting with love. This can become a harmful situation, with one partner trying to control another and can sometimes escalate to violence. Slide 30 Sexting Could Be Criminal n Sending, posting, or forwarding certain images, including sexual, nude, or partially nude images of yourself or someone else, could result in criminal charges. n Photos of a nude or partially nude person under 18 years of age may be considered child pornography. 1 4 Think before you send!
15 Slide 31 Sexting is Hard to Delete or Control n Once you send a photo, you have no way of controlling who sees it and what happens to it. n Once a photo is on the web, it can never truly be removed. n Anyone who takes, possesses, or sends a sexual, nude, or partially nude photo (even of themselves) may be charged with a crime. The most serious charge that could result from this behavior is dissemination of child pornography, which is a felony. If convicted of this crime, a person must register as a sex offender. Slide 32 Sexts Are Almost Always Shared n Nearly 1 in 5 sext recipients (17%) reports that he/she has passed images along to someone else. n More than half (55%) of those who passed the images to someone else say they shared them with more than one person. This information is from an Associated Press/MTV Poll of 1,247 respondents, ages 14-24, who were interviewed online in a survey conducted in September The poll is part of an MTV campaign, A Thin Line, which aims to stop the spread of digital abuse. Slide 33 Sexting Advice n Before you hit send, THINK about where the image could end up. n Don t forward images. Forwards can last forever. n Involve a trusted adult. 1 5 Think before you send!
16 Slide 34 Protect Your Privacy n Passwords are PRIVATE. n The Internet and are NEVER private. n Once you send or post something digitally, you have lost control of who sees it. n Don t send or post anything that you wouldn t want to see on a billboard. Slide 35 Broken Friendship Video Broken Friendship shows why it is not a good idea to share private information, particularly passwords, with anyone. Slide 36 Protect Yourself n If you would not say it to someone s face, don t send it. n Don t text or post when you are angry. n Don t forward messages or images that are mean or embarrassing. n If something makes you uncomfortable or concerned, tell a trusted adult. 1 6 Think before you send!
17 Slide 37 THINK BEFORE YOU SEND n n n n n National Teen Dating Abuse Helpline at or Think before you send!
18 think before you send! n n n n n National Teen Dating Abuse Helpline at or Think before you send!
Online Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12
Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Essential Question: What are the risks and responsibilities when you share online in a relationship? How can you respect
EADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
Affirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
HEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )
Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.
Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:
#300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital
Digital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices
Office of the Attorney General of Virginia Sexting Protecting Yourself on the Internet and Mobile Devices Websites Often Used for Social Networking Monthly Visitors to Social Networking Sites 1. 750,000,000
What is DOMESTIC VIOLENCE?
What is DOMESTIC VIOLENCE? Domestic violence is a pattern of control used by one person to exert power over another. Verbal abuse, threats, physical, and sexual abuse are the methods used to maintain power
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
County Court Restraining Orders
Answers to Your Questions About County Court Restraining Orders Excellence in Customer Service Colorado Judicial Branch http://www.courts.state.co.us June 2002 CIVIL LAW In a civil case, the person seeking
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
Chapter 3. Online Bullying
Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.
Eanes Independent School District Responsible Use Guidelines for Technology
Eanes Independent School District Responsible Use Guidelines for Technology My student and I are committed to the Responsible Use Guidelines. By signing this, we commit to discussing and reviewing the
A Time to Tell Troop Meeting Guide
A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
CyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
Social Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
Girls & Cyber- bullying
MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts
SOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
Bullying 101: Guide for Middle and High School Students
Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org
Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
E-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
The Digital Divide: How the Online Behavior of Teens is Getting Past Parents
June 2012 The Digital Divide: How the Online Behavior of Teens is Getting Past Parents Parent Disconnect Despite the obvious disconnect between teens online behaviors and parents knowledge of them, parents
Teen Online & Wireless Safety Survey
Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications [email protected] 404-269-8057 Cox Communications
effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor
Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences
FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
e-rate toolkit Cyberbullying: Crossing the Line
e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF
INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF go.qub.ac.uk/socialmedia WHY ARE SOCIAL MEDIA TOOLS IMPORTANT TO QUEEN S UNIVERSITY? The term social media is used to describe a range of communication
Internet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
Today s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
REPUTATION MANAGEMENT SURVIVAL GUIDE. A BEGINNER S GUIDE for managing your online reputation to promote your local business.
REPUTATION MANAGEMENT SURVIVAL GUIDE A BEGINNER S GUIDE for managing your online reputation to promote your local business. About Main Street Hub: Main Street Hub is the voice for more local businesses
How To Deal With Social Media At Larks Hill J & I School
LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers
Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction
Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual
Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.
Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human
Age Race/Ethnicity Male / Female
Handout # 1 Dating Violence Pre Test Age Race/Ethnicity Male / Female True False 1. Possessiveness is a common warning sign of an abusive relationship. 2. Abuse happens more often in adult relationships
What Rights Do I Have As An LGBT Victim of Domestic Violence?
Section of Individual Rights and Responsibilities Commission on Domestic Violence Criminal Justice Section In collaboration with What Rights Do I Have As An LGBT Victim of Domestic Violence? How do I
Digital Citizenship: Etiquette. My Online code & Breaking Down Hate Speech Grades 9-12
Digital Citizenship: Etiquette My Online code & Breaking Down Hate Speech Grades 9-12 Essential Question: What does it mean to do the right thing online? How can you create a community culture in which
Understand What s Going On
Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud
Statutory Rape: What You Should Know
Statutory Rape: What You Should Know 2013 Why Do You Need To Read This? Many teens are concerned about the laws regarding something commonly called statutory rape. This brochure will explain what statutory
Cyberbullying. How common is cyberbullying?
Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:
September 2015 2 A 8.1 - Anti Bullying (Cyber Bullying) version 9
Cyber-bullying The rapid development of, and widespread access to, technology has provided a new medium for virtual bullying, which can occur in or outside school. Cyber-bullying is a different form of
Internet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
Sexual Assault of a Child VOIR DIRE QUESTIONS
ATTORNEYS Sexual Assault of a Child VOIR DIRE QUESTIONS 1. What are your feelings or opinions about criminal defense attorneys? 2. Have you ever had a bad experience with a criminal defense attorney? If
A Guide for Parents. of Elementary and Secondary School Students
A Guide for Parents of Elementary and Secondary School Students The effects of bullying go beyond the school yard. As a parent, here s what to watch for, what you can do, and where you can go to get help.
Information about INTERVENTION ORDERS
Information about INTERVENTION ORDERS This publication has been prepared as a public service initiated by South Australia Police and, while every care has been taken in its preparation, no warranty is
Springfield Public Schools
Springfield Public Schools BULLYING POLICY Approved by School Committee May 13, 2010 Amended March 6, 2014 Amended December 5, 2014 SPRINGFIELD PUBLIC SCHOOLS BULLYING PREVENTION POLICY INTRODUCTION Bullying
Cyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
Bring Your Own Device (BYOD) Guidelines Gettys Middle School
Bring Your Own Device (BYOD) Guidelines Gettys Middle School BYOD At Gettys As we work to prepare students for the 21 st century, we must challenge students with increased rigor and personalized academic
Cyberbullying: What Parents Can Do to Protect Their Children
Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,
Social Networking Sites like Facebook, MSN
Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and
Internet Safety Guidelines
Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can
A Publication of the GCPS Information Management Division
GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,
Related KidsHealth Links
Grades 9 to 12 Personal Health Series KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible Materials Standards
Common Facebook issues
Common Facebook issues and how to resolve them Introduction Love it or loathe it, with over 28 million users in the UK alone, Facebook cannot be ignored. It is the social network of choice for many young
Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
What Is the Olweus Bullying Prevention Program?
Dear Parent/Guardians, Your child s school will be using the Olweus Bullying Prevention Program. This research-based program reduces bullying in schools. It also helps to make school a safer, more positive
A Parents' Guide to. Snapchat. 2013 ConnectSafely.org
A Parents' Guide to Snapchat 2013 ConnectSafely.org Top 5 Questions Parents Have About Snapchat 1. Why do kids love Snapchat? They love the spontaneity of it. It s been (rightfully) drummed into their
Teacher Guide TEEN SAFETY
The Vulnerable Teacher Guide TEEN SAFETY This companion to the online course provides questions and topics for classroom discussion and activities. 2012 ShieldTheVulnerable.org 1277 Treat Blvd #530 Walnut
Appropriate Use of Social Media and Cell Phones. Karen Haase. [email protected] KSB School Law @KarenHaase
Appropriate Use of Social Media and Cell Phones Karen Haase [email protected] KSB School Law @KarenHaase Raise your hand if You have a cell phone You use text messaging You ve taken photos with a
ONLINE SAFETY TEACHER S GUIDE:
TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.
Social Media Curriculum Overview
Lessons in K 2 Social Media Curriculum Overview 1. Going Places Safely ( KINDERGARTEN) https://www.commonsensemedia.org/educators/lesson/going places safely k 2 How do I go places safely on the computer?
Edward W. Brooke Charter School Bullying Prevention and Intervention Plan 12.14.2010
I. LEADERSHIP & PROCESS Priority Statement Edward W. Brooke Charter School has always been and will continue to be a place where students are held to the highest behavioral standards and where we work
Guidelines for Preventing and Dealing with Bullying Issues
Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.
Social Media Guidelines
Purpose for Social Media Guidelines: Guilford County Schools (GCS) realizes that part of 21st century learning is adapting to the changing methods of communication. The importance of teachers, students
Staying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
DOMESTIC VIOLENCE AND THE NEW MEXICO FAMILY VIOLENCE PROTECTION ACT
DOMESTIC VIOLENCE AND THE NEW MEXICO FAMILY VIOLENCE PROTECTION ACT This information guide is general in nature and is not designed to give legal advice. The court does not guarantee the legal sufficiency
Teen Online Safety & Digital Reputation Survey
Teen Online Safety & Digital Reputation Survey Cox Communications Teen Online Safety & Digital Reputation Survey in Partnership with the National Center for Missing & Exploited Children (NCMEC) (Fielded
Orders of Protection
Orders of Protection Hotline: (212) 343-1122 www.liftonline.org This guide answers questions that you may have if an order of protection has been filed against you in Criminal Court or Family Court. The
PREA COMPLIANCE AUDIT TOOL QUESTIONS FOR INMATES. Prisons and Jails 05/03/2013
Prisons and Jails 05/03/2013 RANDOM SAMPLE OF INMATES... 2 YOUTHFUL INMATES... 4 DISABLED AND LIMITED ENGLISH PROFICIENT INMATES... 5 TRANSGENDER AND INTERSEX INMATES; GAY, LESBIAN, AND BISEXUAL INMATES...
HAZING AND BULLYING (Harassment, Intimidation and Dating Violence)
HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) The prohibition against hazing, dating violence, harassment, intimidation or bullying is publicized in student handbooks and in the publications
Understanding Consent to Sexual Activity. Public Legal Education and Information Service of New Brunswick
Understanding Consent to Sexual Activity Public Legal Education and Information Service of New Brunswick NO means NO Understanding Consent to Sexual Activity This pamphlet provides information on what
ANSWERS TO COMMON LEGAL QUESTIONS AND RESOURCES FOR VICTIMS OF DOMESTIC VIOLENCE
ANSWERS TO COMMON LEGAL QUESTIONS AND RESOURCES FOR VICTIMS OF DOMESTIC VIOLENCE WHAT IS DOMESTIC VIOLENCE? Domestic Violence or family violence is the abuse of power or control. It is behavior used by
