1 / 34

School Safety Coordinator Training

Department of School Safety and Student Discipline. School Safety Coordinator Training. Forsyth County Schools Todd Shirley, Director Tim Monroe, Assistant Director Steve Honn, School Safety Manager Ola Shadburn, General Administrative School Safety and Student Discipline.

maxine
Télécharger la présentation

School Safety Coordinator Training

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Department of School Safety and Student Discipline School Safety Coordinator Training Forsyth County Schools Todd Shirley, Director Tim Monroe, Assistant Director Steve Honn, School Safety Manager Ola Shadburn, General Administrative School Safety and Student Discipline Dr. L. C. (Buster) Evans Superintendent of Schools Session #5 Joey Pirkle Associate Superintendent Educational Leadership

  2. Cyber Safety

  3. SOCIAL MEDIA • Facebook • Twitter • Instagram-online photo-sharing, video-sharing and social networking service that enables its users to take pictures and videos, apply digital filters to them, and share them on a variety of social networking services, such as Facebook, Twitter, Tumblr and Flickr • Vine-Owned by Twitter, enables its users to create and post short video clips • Snapchat-Allows users to take photos or short videos, then share them with friends for up to 10 seconds before the image self-destructs. If a recipient screenshots the photo, the app alerts the original sender, though hacks to interrupt this function do exist. • Askfm-social networking website where users can ask other users questions, with the option of anonymity used in foreign countries mostly • KIK-allows users to send texts via the Internet without having to use a cellular telephone • Yik Yak-social media site that gives you an anonymous live feed of what people are saying and doing. Users create all the content.

  4. Risks • Bullies can use your information • Predators can use the information • Comments – sued for defamation • Info – arrested or school discipline • No reasonable expectation of privacy • Future employers and schools can use information as “instant background checks”

  5. Connor Riley had a job offer from Cisco on the table. She tweeted: “Cisco just offered me a job! Now I have to weigh the utility of a fatty paycheck against the daily commute to San Jose and hating the work.” Shortly after that, there was a reply from Cisco employee Tim Levad: “Who is the hiring manager? I’m sure they would love to know that you will hate the work. We here at Cisco are versed in the Web.” Don't tweet bad things about your potential employer Connor Riley MSNBC

  6. ParentingMonitor Your Child's Cell Phone and Internet ActivitySexting, a scary new trend where teens send nude or semi-nude photos via cell phone, is popping up throughout the country. Children can be prosecuted and marked as criminals for the rest of their lives if they're caught with a provocative photo on their cell phone. Could your child be participating in this act? Are you aware of what your child is doing online? The following programs can help you monitor your kids' cell phone and Internet activity:DadGuardInstall on the computer you'd like to monitor — from anywhere in the world. DadGuard recordings are organized into an easy-to-read Activity Report that is automatically sent to any email address you choose, as often as you'd like. You'll receive an exact copy of their emails, chats and instant messages, as they occur.TextGuardThis is an application you install on your child's cell phone. Once the program is running, you can log into the Web site and watch all incoming and outgoing calls, text messages, e-mails and Web browsing history. You can select a certain phone number and block any activity to that number as well, so if you suspect suspicious communication, you can make sure your child cannot text, e-mail or call that person. My Mobile WatchdogThis is also an application that you install on a cell phone. On its Web site, It gives you a listing of all activity on a given phone. It also alerts you if calls or messages come in from a specific number. For instance, if you see a suspicious or unauthorized person calling, texting, or e-mailing your child, that call is routed through the My Mobile Watchdog Data Center. Notifications are then sent to all persons you have established from your Web application, such as parents, teachers, police, etc. From your Web application or mobile phone application, you can see all suspicious activity, along with full content, including images. You can also print out reports to pass on to law enforcement or school officials. iWonder SurfThis computer application lets you control and monitor the Web sites your child is visiting. You can not only see where they go, but when, how often and what they are seeing. You can logon to obtain a log of their activity. Every time they go to a Web site, it records it and instantly sends traffic reports to you.

  7. What to do? • Eliminate all identifying information • Anything that allows you to be located • Anything that pairs the profile to your name • Delete inappropriate information • Read your information to determine what impression it gives • Your site may appeal to someone you didn’t intend for it to impress

  8. What to do • Choose appropriate photos • Setting privacy settings appropriately • For privacy: • Develop your profile to be associated with a nickname rather than your official name

  9. SMARTPHONE PICTURES POSE PRIVACY RISKS

  10. Social Networking Rules • Protect your friends’ info – no name, location, birthday wish, phone numbers, etc. • Don’t write anything you wouldn’t want your parents or principal to read (because they can and MIGHT!) • Set your profile to private so you control who views your profile. • Be careful when you post pics

  11. What’s ok to write? • What sport you play, the movies you like, your music…that would be okay • Remember that these facts can be used to fool you • Be smarter than them • Always tell a trusted adult if you have problems online

  12. Sexting Definition • High-tech version of flirting, teens texting explicit messages or photos to each other • Experimental • Aggravated http://www.unh.edu/ccrc/pdf/CV231_Sexting Typology Bulletin_4-6-11_revised.pdf

  13. In the News • Pennsylvania -Sept. 6, 2013 State police slapped three Dauphin County teenagers with child pornography charges. That was a felony and a rarity for prosecutors. • TAMPA — Sept. 17, 2013 a Riverview teacher accused of sex acts with a 12-year-old student had an unforeseen explanation for hundreds of explicit text messages she sent the boy. She wanted to get his attention for the purpose of education. • COLUMBUS, GA-Sept. 18, 2013Teacher Tucker Hearn officially terminated from North side High School on Sept. 27th charged with attempted sexual assault. The female student is 16-years-old. Sources say the student and Hearn were sexting and planned to get together, but their plans were intercepted by police. His bond was set at $10,000.

  14. Florida-14 year old girl charged in connection with the suicide of a 12 year old schoolmate after months of bullying plead not guilty. • The girl was one of two Polk County students, ages 12 and 14, arrested and charged with aggravated stalking for “maliciously harassing” Rebecca Ann Sedwick, 12, with verbal and physical abuse and cyber-bullying, according to Polk County Sheriff Grady Judd. Charges were dropped. • Sedwick, 12, died after jumping from a third-story cement plant structure on Sept. 10, 2013. • St. Petersburg-Nov. 7, 2013 A 15-year-old girl was arrested and accused of sending hundreds of threatening text messages to three other 15-year-old girls who are students at the same St. Petersburg high school, in what police say is a case of cyber-bullying. Using a software application called KIK, allows users to send texts via the Internet without having to use a cellular telephone

  15. Tuesday, March 4, 2014 • Bond was set at $50,000 for a suspended Douglas County elementary school principal who was arrested in an undercover child sex sting. John Harold McGill is facing child porn and exploitation charges and made a first appearance in DeKalb County Court. He was one of 14 people who were arrested in a sting the Georgia Bureau of Investigation called "Operation Broken Heart.“

  16. Obscene Child Pornography What is obscene? 413 US 15, OCGA § 16-12-80 OCGA § 16-12-100 • Average person would find it wrong • It depicts sexual conduct • It has no literary, artistic, political or scientific value • Images of sexual conduct • Under 18 years

  17. What to do • If someone sends you something • Inappropriate – delete • Obscene and/or makes you uncomfortable – alert your parent or authority • If you sent something • Ask recipient to delete it and not to forward it • Never send inappropriate text or images • In 2010, 20 percent of teenagers (22 % of girls and 18 % of boys) sent naked/seminude images of themselves or posted them online. • Nearly 1 in 6 teens between the ages of 12 and 17 have received naked or nearly nude pictures via text message from someone they know. (FBI Law Enforcement Bulletin)

  18. GBI tracking apparent nude pics of Gwinnett teens Pictures have appeared on Twitter and Instagram WSB-TV GWINNETT COUNTY, Ga. — Tuesday, Dec. 17, 2013 • The GBI investigating social media accounts that started distributing nude pictures of Gwinnett teenagers. Gwinnett County school police say a parent filed a report after a 3-year-old nude photo of their daughter started circulating. • The victimized students appear to come from a variety of high schools in Gwinnett County. It's possible that the girls willingly took the photos without realizing where they would end up or what would happen • The GBI is actively trying to identify the girls and determine their ages to determine what crime has been committed. If the girls are under 18, a simple retweet could constitute charges for distributing child pornography.

  19. What is Cyberbullying? • Cyber bullying: One form of bullying • Youth use technology to: • Send Text Messages • Make Web Postings • Stalk Others • Post Unauthorized Photos • Online Deception and Violence • Cyber-ostracism http://www.smlinks.com/sotw/why/

  20. Three Players • One mistreating others – usually someone that the target knows • Target – can be anyone • Bystander • Harmful-if complacent • Helpful-if report to adult

  21. Criminal Law • Making threats of violence to people or property • Engaging in coercion • Making obscene or harassing text messages • Harassment or stalking Nancy Willard, Cyberbullying and Cyberthreats, Effectively Managing Internet Use Risks in Schools, Center for Safe and Responsible Use of the Internet, January 2007

  22. Criminal Law cont. • Hate or bias crime • Creating or sending sexually explicit images of teens or children • Sexual exploitation • Taking a photo of someone in a place where privacy is expected Nancy Willard, Cyberbullying and Cyberthreats, Effectively Managing Internet Use Risks in Schools, Center for Safe and Responsible Use of the Internet, January 2007

  23. Research • 10% to 20% of youth have been targets and/or aggressors • Cyberbullying peaks in the middle school years (grades 6-8) • Girls are more likely to be the target • Looks and body shape are the most targeted characteristics • While there is an increase in cyberbullying, it is likely because there is an increase in use of technology http://cyberbullying.us/blog www.unh.edu/ccrc

  24. Phishing scams

  25. Since January 23, 2004, criminals have been using the FDIC's name and reputation to perpetrate various "phishing" schemes. It is important to note that the FDIC will never ask for personal or confidential information in this manner.

  26. If you suspect an e-mail or Web site is fraudulent, relay that information to the real bank, company or government agency, using a phone number or e-mail address from a reliable source. Example: If your bank's Web page looks different or unusual, contact the institution directly to confirm that you haven't landed on a copycat Web site set up by criminals. Also, contact the Internet Crime Complaint Center (www.ic3.gov), a partnership between the FBI and the National White Collar Crime Center. • If you suspect that you have been a victim of identity theft, perhaps because you submitted personal information in response to a suspicious, unsolicited e-mail or you see unauthorized charges on your credit card, immediately contact your financial institution and, if necessary, close existing accounts and open new ones. Also contact the police and request a copy of any police report or case number for later reference.

  27. March 05, 2014 • Pre-installed malware turns up on new Android devices • Fake version of Netflix that steals personal data and sends it to Russia has been found on some smartphones and tablets from Samsung, Motorola, and LG

  28. Safeguarding your child’s future • Child Identity Theft • Credit Reports • www.annualcreditreport.com • Federal Law allows you to get a free copy of your credit report every 12 months from each credit reporting company. • Credit Reporting Agencies • Equifax 800-525-6285 • Experian 888-397-3742 • TransUnion 800-680-7289

  29. SUGGESTIONS • Make sure your child does not spend all of his/her time on the computer. People, not computers, should be their best friends and companions. • Keep the computer in an area where it can be monitored, like the family room, kitchen or living room, not in your child’s bedroom. • Learn enough about computers so you can enjoy them together with your kids. • Teach them never to meet an online friend offline unless you are with them. • Watch your children when they’re online and see where they go. • Make sure that your children feel comfortable coming to you with questions and don’t over react if things go wrong. • Keep kids out of chatrooms unless they are monitored. • Encourage discussions between you and your child about what they enjoy online. Next page

  30. Teach them what information they can share with others online and what they can’t (like telephone numbers, address, their full name and school) • Get to know their “online friends” just as you get to know all of their other friends. • Warn them that people may not be what they seem to be and that people they chat with are not their friends, they are just people they chat with. • Discuss these rules, get your children to agree to adhere to them, and post them near the computer as a reminder. www.cyber-safety.com

  31. Fight Back Four steps you can start taking now to make ID security a priority — and a practice: • 1. Change weak passwords. Do not use your birth date or part of your address or phone number. Strongest passwords combine upper- and lowercase letters, numbers and special characters. • 2. Make sure your home Wi-Fi network is password-protected. Be careful how you use your devices at public hot spots. Most aren't secure — which means any information you send is only protected if you're on an encrypted website. To be sure a website is encrypted, look for "https" in the address before you log in or send any personal info. • 3.Don't click on links in unsolicited emails. Don't give out information over the phone or online unless you've verified the source. • 4.Keep your eye on debit and credit cards when paying for purchases. If anything seems out of the ordinary, be cautious using your card. www.ftc.gov/idtheft

  32. HELPFUL WEBSITES • ConnectSafely Smart Socializing Starts Here • http://www.connectsafely.org/safety-tips-advice/ • National Center for Missing & Exploited Children • http://www.netsmartz.org/InternetSafety • FBI-Internet Crime Complaints • www.FBI.GOV • Internet Monitoring Software (Free) • http://www.qustodio.com/internet_monitoring_software/ • http://www.nchsoftware.com/childmonitoring/index.html • http://www.monitor.us/en/website-monitoring • https://onlinefamily.norton.com/familysafety/basicpremium.fs • Internet Monitoring Software-All have mixed reviews • 1. Net Nanny $28.99 • 2. WebWatcher $97.00 • 3. McAfee Safe Eyes $49.95 • 4. Spectorsoft-eblaster $99.95

  33. QUESTIONS?

More Related