Presentation is loading. Please wait.

Presentation is loading. Please wait.

School Safety Coordinator Training

Similar presentations


Presentation on theme: "School Safety Coordinator Training"— Presentation transcript:

1 School Safety Coordinator Training
Department of School Safety and Student Discipline Forsyth County Schools Todd Shirley, Director Tim Monroe, Assistant Director Steve Honn, School Safety Manager Ola Shadburn, General Administrative School Safety and Student Discipline Dr. L. C. (Buster) Evans Superintendent of Schools Session #5 Joey Pirkle Associate Superintendent Educational Leadership 1 1

2 Cyber Safety Because of juvenoia, social networking is often considered to be dangerous because of the stranger danger phenomenon. However, as we see it, the biggest risk to our students is the online reputation that they build on these sites and the impact on their future.

3 SOCIAL MEDIA Facebook Twitter
Instagram-online photo-sharing, video-sharing and social networking service that enables its users to take pictures and videos, apply digital filters to them, and share them on a variety of social networking services, such as Facebook, Twitter, Tumblr and Flickr Vine-Owned by Twitter, enables its users to create and post short video clips Snapchat-Allows users to take photos or short videos, then share them with friends for up to 10 seconds before the image self-destructs. If a recipient screenshots the photo, the app alerts the original sender, though hacks to interrupt this function do exist. Askfm-social networking website where users can ask other users questions, with the option of anonymity used in foreign countries mostly KIK-allows users to send texts via the Internet without having to use a cellular telephone Yik Yak-social media site that gives you an anonymous live feed of what people are saying and doing. Users create all the content.

4 Risks Bullies can use your information
Predators can use the information Comments – sued for defamation Info – arrested or school discipline No reasonable expectation of privacy Future employers and schools can use information as “instant background checks” Some of the risks associated with posting on the Internet is that the information can be used against you in different ways. A bully can use it to harass or a predator can try to find where you are. You could be sued for some of you comments if you say something that is not completely true even if you meant it as a “joke”. If it is deemed to be threatening in any way you could have school disciplinary actions taken or even be arrested for the comments. You should know that you do not have a reasonable expectation of privacy even if you have the setting set to be secure. One of the biggest concerns is to your future. Employers and schools are using the information as instant background checks.

5 Don't tweet bad things about your potential employer
Social Networking 4/12/2017 Don't tweet bad things about your potential employer Connor Riley had a job offer from Cisco on the table. She tweeted: “Cisco just offered me a job! Now I have to weigh the utility of a fatty paycheck against the daily commute to San Jose and hating the work.” Shortly after that, there was a reply from Cisco employee Tim Levad: “Who is the hiring manager? I’m sure they would love to know that you will hate the work. We here at Cisco are versed in the Web.” Colleges and businesses routinely “google” or search the web for information online about applicants. Connor Riley MSNBC Sue Dowling - Internet Safety Presentation - Albany ETTC

6 Parenting Monitor Your Child's Cell Phone and Internet Activity Sexting, a scary new trend where teens send nude or semi-nude photos via cell phone, is popping up throughout the country. Children can be prosecuted and marked as criminals for the rest of their lives if they're caught with a provocative photo on their cell phone. Could your child be participating in this act? Are you aware of what your child is doing online? The following programs can help you monitor your kids' cell phone and Internet activity: DadGuard Install on the computer you'd like to monitor — from anywhere in the world. DadGuard recordings are organized into an easy-to-read Activity Report that is automatically sent to any address you choose, as often as you'd like. You'll receive an exact copy of their s, chats and instant messages, as they occur TextGuard This is an application you install on your child's cell phone. Once the program is running, you can log into the Web site and watch all incoming and outgoing calls, text messages, s and Web browsing history. You can select a certain phone number and block any activity to that number as well, so if you suspect suspicious communication, you can make sure your child cannot text, or call that person My Mobile Watchdog This is also an application that you install on a cell phone. On its Web site, It gives you a listing of all activity on a given phone. It also alerts you if calls or messages come in from a specific number. For instance, if you see a suspicious or unauthorized person calling, texting, or ing your child, that call is routed through the My Mobile Watchdog Data Center. Notifications are then sent to all persons you have established from your Web application, such as parents, teachers, police, etc. From your Web application or mobile phone application, you can see all suspicious activity, along with full content, including images. You can also print out reports to pass on to law enforcement or school officials iWonder Surf This computer application lets you control and monitor the Web sites your child is visiting. You can not only see where they go, but when, how often and what they are seeing. You can logon to obtain a log of their activity. Every time they go to a Web site, it records it and instantly sends traffic reports to you.

7 What to do? Eliminate all identifying information
Social Networking 4/12/2017 What to do? Eliminate all identifying information Anything that allows you to be located Anything that pairs the profile to your name Delete inappropriate information Read your information to determine what impression it gives Your site may appeal to someone you didn’t intend for it to impress When a profile is developed, it is best to do so intelligently with attention given to how it will impress others. Limit personal information that would allow someone to determine your real identity or to find you. Delete any inappropriate information from your page. Remember others are going to be reading this and you sometimes do not have control over that. Step back away from yourself. Read the information, what impression does it give. Is it impressing the right people? Sue Dowling - Internet Safety Presentation - Albany ETTC

8 What to do Choose appropriate photos
Setting privacy settings appropriately For privacy: Develop your profile to be associated with a nickname rather than your official name Make sure that the pictures are appropriate for ALL to see. Would you want your mom or dad, pastor, Sunday school teacher, school teacher and so on to see that picture. If it is not appropriate for them to see, then it is not appropriate to be posted. Period, the end. What about the pictures other people put up of you? Are they appropriate? If you can not do any thing about that, then at least Un-tag them so they are not connected to you when someone searches. Ask your friends to not post pics of you unless you approve them and use the same restrictions as you do when you post them. Choose photos that you won’t regret having posted. Think ahead because what you post today may be found in several years from now – very likely by your children. Think about it – if your profile and pictures belonged to your parents, how would you feel now if you viewed it? Make sure all of your settings are set to private. This will mean checking often to make sure the social networking site you are currently using has not decided to make changes undoing all of your privacy settings. This has happened and probably will again. You could even go to the lengths as to set up a profile to be associated with a nickname rather than your official name. This would be a good idea if you know that you are going into some field where you will be in the public domain. There have been cases of famous people being sought out by people and they did it using Internet searches.

9 Sue Dowling - Internet Safety Presentation - Albany ETTC
Social Networking 4/12/2017 Look at these profiles and determine the message they send to you and to others. (ALLOW PROFILES TO SHOW - LAST ONE IS BLOG), Along with the backgrounds and photos, a predator will read the paragraphs posted. Sue Dowling - Internet Safety Presentation - Albany ETTC

10 SMARTPHONE PICTURES POSE PRIVACY RISKS

11 Social Networking Rules
Middle School Presentation June 19, 2006 Social Networking Rules Protect your friends’ info – no name, location, birthday wish, phone numbers, etc. Don’t write anything you wouldn’t want your parents or principal to read (because they can and MIGHT!) Set your profile to private so you control who views your profile. Be careful when you post pics Let’s talk about some smart ways to use social networking sites. Always remember to protect your own information and your friends’ information. When you go to their site and post the comment, “Happy 14th birthday, Janice!”, you just gave someone her age, her birthday, and her first name. You have to think before you post, and decide if other persons can discover information from what you write. These pages are online, which makes them in the “public domain”. This means that anyone and everyone has the ability to read your sites. You have no “expectation of privacy”. So don’t be upset when your parents, teachers, principal, strangers, and/or enemies read what you wrote or view the pictures that you put online. If you have the option, only let persons view your profile that are your friends. There are other security options that you can choose. Learn now how to go into your “Account Settings” or your “Privacy Settings” (depending on the site you use) and to choose the safest settings they allow. If you post a pic of yourself, post normal, clean ones that would not attract attention from those types of persons you would not want to attract. You can put other pics there, like avatars or a pic you like, so that it is not a pic of yourself. Sue Dowling,

12 Middle School Presentation
June 19, 2006 What’s ok to write? What sport you play, the movies you like, your music…that would be okay Remember that these facts can be used to fool you Be smarter than them Always tell a trusted adult if you have problems online The fun part of social networking sites is discussing what is going on, what you enjoy, etc. So what is okay to talk about? You can mention the music, sports, movies you like. Just be careful not to say what theater you went to, or where your team played last Friday night or who you played against. Those pieces of information are valuable to put together with other pieces to find you. Be aware that when you put information, like you love soccer and the beach, that a predator may assume the same likes to make you think that they are similar to you. They want to be your new best friend. So if you do write about these things, don’t be gullible if someone you don’t know posts comments to you about how much you are alike. You should only speak to persons you know in real life. Also, only put persons you know in real life on your friends list (or buddy list in Instant Messaging). If you find yourself in a situation that disturbs you or you’re not sure about, tell a trusted adult, like your parents. Adults have life experiences that help then discern a bad situation. Ask for their help. Sue Dowling,

13 GaCSI: Youth Internet Trends and Myths
Sexting Definition High-tech version of flirting, teens texting explicit messages or photos to each other Experimental Aggravated The definition is that sexting is a high tech version of flirting - teens texting explicit messages or photos to each other. According to a study by the Crimes Against Children Research Center, Janis Wolak and David Finkelhor in March of 2011, This can be broadly divided into two categories, which is termed ‘Aggravated’ and ‘Experimental’. Aggravated incidents involved criminal or abusive elements beyond the creation, sending or possession of youth‐produced sexual images. These additional elements included 1) adult involvement; or 2) criminal or abusive behavior by minors such as sexual abuse, extortion, threats; malicious conduct arising from interpersonal conflicts; or creation or sending or showing of images without the knowledge or against the will of a minor who was pictured. In Experimental incidents, by contrast, youth took pictures of themselves to send to established boy‐ or girlfriends, to create romantic interest in other youth, or for reasons such as attention‐seeking, but there was no criminal behavior beyond the creation or sending of images, no apparent malice and no lack of willing participation by youth who were pictured. Typology Bulletin_4-6-11_revised.pdf March 2012

14 In the News Pennsylvania -Sept. 6, 2013 State police slapped three Dauphin County teenagers with child pornography charges. That was a felony and a rarity for prosecutors. TAMPA — Sept. 17, 2013 a Riverview teacher accused of sex acts with a 12-year-old student had an unforeseen explanation for hundreds of explicit text messages she sent the boy. She wanted to get his attention for the purpose of education. COLUMBUS, GA-Sept. 18, 2013Teacher Tucker Hearn officially terminated from North side High School on Sept. 27th charged with attempted sexual assault. The female student is 16-years-old. Sources say the student and Hearn were sexting and planned to get together, but their plans were intercepted by police. His bond was set at $10,000. First, keep in mind that what can happen legally depends a lot on the jurisdiction you live in and how police and prosecutors are applying the law to this bizarre legal conundrum where a child can be both perpetrator and victim at the same time. This is just one case of someone being charged. (go over case on slide). For example, students involved in a sexting incident in Perry County, Pa., where Susquenita High School is, received felony charges from their district attorney last year, while students involved in a separate sexting case in neighboring Franklin County, a different jurisdiction, were not prosecuted as felons. There are solid indicators that the tide is turning toward not treating juvenile sexting as a felony crime, but the possibility remains: People involved with creating, sending or even receiving a nude or sexually explicit photo of someone under 18 can be charged with production, distribution, or possession of child pornography.

15 Florida-14 year old girl charged in connection with the suicide of a 12 year old schoolmate after months of bullying plead not guilty. The girl was one of two Polk County students, ages 12 and 14, arrested and charged with aggravated stalking for “maliciously harassing” Rebecca Ann Sedwick, 12, with verbal and physical abuse and cyber-bullying, according to Polk County Sheriff Grady Judd. Charges were dropped. Sedwick, 12, died after jumping from a third-story cement plant structure on Sept. 10, 2013. St. Petersburg-Nov. 7, 2013 A 15-year-old girl was arrested and accused of sending hundreds of threatening text messages to three other 15-year-old girls who are students at the same St. Petersburg high school, in what police say is a case of cyber-bullying. Using a software application called KIK, allows users to send texts via the Internet without having to use a cellular telephone

16 Tuesday, March 4, 2014 Bond was set at $50,000 for a suspended Douglas County elementary school principal who was arrested in an undercover child sex sting. John Harold McGill is facing child porn and exploitation charges and made a first appearance in DeKalb County Court. He was one of 14 people who were arrested in a sting the Georgia Bureau of Investigation called "Operation Broken Heart.“

17 GaCSI: Youth Internet Trends and Myths
What is obscene? Obscene Average person would find it wrong It depicts sexual conduct It has no literary, artistic, political or scientific value Child Pornography Images of sexual conduct Under 18 years Is SEXTING obscene - What is obscene? Georgia and federal law requires that 3 conditions are met for an image to be obscene: The average person would find it wrong, it is sexual in nature, and it has no defined value. It is child pornography if the images are of someone under 18 years of age. 413 US 15, OCGA § OCGA § March 2012

18 What to do If someone sends you something If you sent something
Inappropriate – delete Obscene and/or makes you uncomfortable – alert your parent or authority If you sent something Ask recipient to delete it and not to forward it Never send inappropriate text or images In 2010, 20 percent of teenagers (22 % of girls and 18 % of boys) sent naked/seminude images of themselves or posted them online. Nearly 1 in 6 teens between the ages of 12 and 17 have received naked or nearly nude pictures via text message from someone they know. (FBI Law Enforcement Bulletin) What can you do? If someone sends you something that you think is inappropriate, delete it immediately. Do not show it around. Do not ask what to do. Just delete it. If it is something that is obscene and/or makes you feel uncomfortable in any way, you need to alert someone in authority. That can be the parent, teacher, or police. Whichever you feel it warrants. If you have sent something, you need to try to get any remnant of it deleted from any place it might have been placed. Go to the person that you sent it to and try to make sure they not only delete it but if they sent it that they get them to delete it. Then never, ever do that again. If you know someone who has done this, help them clean it up. What if it happened to you? You would want the help. Be a friend.

19 GBI tracking apparent nude pics of Gwinnett teens
Pictures have appeared on Twitter and Instagram WSB-TV GWINNETT COUNTY, Ga. — Tuesday, Dec. 17, 2013 The GBI investigating social media accounts that started distributing nude pictures of Gwinnett teenagers. Gwinnett County school police say a parent filed a report after a 3- year-old nude photo of their daughter started circulating. The victimized students appear to come from a variety of high schools in Gwinnett County. It's possible that the girls willingly took the photos without realizing where they would end up or what would happen The GBI is actively trying to identify the girls and determine their ages to determine what crime has been committed. If the girls are under 18, a simple retweet could constitute charges for distributing child pornography.  

20 Middle School Presentation
June 19, 2006 What is Cyberbullying? Cyber bullying: One form of bullying Youth use technology to: Send Text Messages Make Web Postings Stalk Others Post Unauthorized Photos Online Deception and Violence Cyber-ostracism One way technology is misused is to bully another person. In New Jersey, a soccer player, Mary Ellen, attended a private girls’ high school. A misunderstanding about a boy triggered a campaign of harassment that made her life miserable. Photos were posted on a social networking site with horns drawn on her head and “tramp” added below. Embarrassing IMs were sent that looked like she sent them. Her was flooded with insulting messages. Two of her classmates were harassed so much because of their friendship with her that they transferred to another school. Cyberbullying is very difficult for the victim, as there is often no escape…things posted online are 24/7 and are available for the world to see. These are just some of the ways that technology can be used to do the wrong things. Sue Dowling,

21 GaCSI: Youth Internet Trends and Myths
Three Players One mistreating others – usually someone that the target knows Target – can be anyone Bystander Harmful-if complacent Helpful-if report to adult There are three types of people involved in the act: the bully, the target and the bystander. The person mistreating others usually knows the target. Sometimes they have been bullied themselves and online they can feel empowered. The target can be anyone. A lot of times it is someone who is different in some form or fashion. Maybe it is the way they look, or the way they act. Or even their belief system. And then you have the bystander who is probably the most important person in this equation. There are two kinds, Harmful and Helpful. The harmful bystander is the one who encourages and supports the wrong doing but the one who is the most harmful is the one who just watches and does nothing even if they are thinking to themselves just how awful this is. Then the helpful bystander, this is the one who can make all the difference. Sometimes they seek to stop the offender. This may be a little too out there for most people. They can fear the retaliation so there are other ways that you can be helpful. One is just to provide support to the target. A phone call, text or IM just saying that you saw the incident and that you thought it was wrong is said to be one of the most important things that can help the target to not feel like they are all alone in the world. You could do something as easy as going up when you see them being mistreated and telling them that one of the teachers is looking for them. This gives them a way to escape and also makes the person doing the bad thing think that someone might be just around the corner. The bystander could tell an adult. The target may not tell so if you don’t’ do it, it might not get done. There are two quotes that I like. One is “All that is needed for evil to flourish is for good men to do nothing” and the other is from Martin Luther King Jr. “In the end, we will remember not the words of our enemies, but the silence of our friends.” March 2012

22 GaCSI: Youth Internet Trends and Myths
Criminal Law Making threats of violence to people or property Engaging in coercion Making obscene or harassing text messages Harassment or stalking When should a school contact, or assist a parent in contacting, law enforcement officials? Extremely harmful online speech can violate criminal laws. The following kinds of speech can lead to arrest and prosecution: • Making threats of violence to people or their property. • Engaging in coercion (trying to force someone to do something he or she doesn’t want to do). • Making obscene or harassing telephone calls (this includes text messaging). • Harassment or stalking. Continued on next slide…. Nancy Willard, Cyberbullying and Cyberthreats, Effectively Managing Internet Use Risks in Schools, Center for Safe and Responsible Use of the Internet, January 2007 March 2012

23 GaCSI: Youth Internet Trends and Myths
Criminal Law cont. Hate or bias crime Creating or sending sexually explicit images of teens or children Sexual exploitation Taking a photo of someone in a place where privacy is expected • Hate or bias crimes. • Creating or sending sexually explicit images of teens (this is child pornography). • Sexual exploitation. • Taking a photo of someone in place where privacy is expected (like a locker room) Nancy Willard, Cyberbullying and Cyberthreats, Effectively Managing Internet Use Risks in Schools, Center for Safe and Responsible Use of the Internet, January 2007 March 2012

24 GaCSI: Youth Internet Trends and Myths
Research 10% to 20% of youth have been targets and/or aggressors Cyberbullying peaks in the middle school years (grades 6-8) Girls are more likely to be the target Looks and body shape are the most targeted characteristics While there is an increase in cyberbullying, it is likely because there is an increase in use of technology Research has a wide variation in the numbers associated with cyberbullying, usually as a result of the way the questions have been asked and the terms were defined in the research. But generally we can say about a third of the youth have been targets, and a tenth to a fifth have been bullies. Cyberbullying does peak in middle school. Some of the primary characteristics that children and youth select as items for bullying with include looks and body shape, to a lesser-extent youth also bully based on race, sexual orientation, religion, and family income. Most targets know or think they know who the cyberbully may be. Even though there is an increase in cyberbullying it does not mean that there are more bad people, it is more likely because the use of technology has increased. March 2012

25 Phishing scams

26 Since January 23, 2004, criminals have been using the FDIC's name and reputation to perpetrate various "phishing" schemes. It is important to note that the FDIC will never ask for personal or confidential information in this manner.

27 If you suspect an or Web site is fraudulent, relay that information to the real bank, company or government agency, using a phone number or address from a reliable source. Example: If your bank's Web page looks different or unusual, contact the institution directly to confirm that you haven't landed on a copycat Web site set up by criminals. Also, contact the Internet Crime Complaint Center (www.ic3.gov), a partnership between the FBI and the National White Collar Crime Center. If you suspect that you have been a victim of identity theft, perhaps because you submitted personal information in response to a suspicious, unsolicited or you see unauthorized charges on your credit card, immediately contact your financial institution and, if necessary, close existing accounts and open new ones. Also contact the police and request a copy of any police report or case number for later reference.

28 March 05, 2014 Pre-installed malware turns up on new Android devices Fake version of Netflix that steals personal data and sends it to Russia has been found on some smartphones and tablets from Samsung, Motorola, and LG

29 Safeguarding your child’s future
Child Identity Theft Credit Reports Federal Law allows you to get a free copy of your credit report every 12 months from each credit reporting company. Credit Reporting Agencies Equifax Experian TransUnion

30 SUGGESTIONS Make sure your child does not spend all of his/her time on the computer. People, not computers, should be their best friends and companions. Keep the computer in an area where it can be monitored, like the family room, kitchen or living room, not in your child’s bedroom. Learn enough about computers so you can enjoy them together with your kids. Teach them never to meet an online friend offline unless you are with them. Watch your children when they’re online and see where they go. Make sure that your children feel comfortable coming to you with questions and don’t over react if things go wrong. Keep kids out of chatrooms unless they are monitored. Encourage discussions between you and your child about what they enjoy online. Next page

31 Teach them what information they can share with others online and what they can’t (like telephone numbers, address, their full name and school) Get to know their “online friends” just as you get to know all of their other friends. Warn them that people may not be what they seem to be and that people they chat with are not their friends, they are just people they chat with. Discuss these rules, get your children to agree to adhere to them, and post them near the computer as a reminder.

32 Fight Back Four steps you can start taking now to make ID security a priority — and a practice: 1. Change weak passwords. Do not use your birth date or part of your address or phone number. Strongest passwords combine upper- and lowercase letters, numbers and special characters. 2. Make sure your home Wi-Fi network is password-protected. Be careful how you use your devices at public hot spots. Most aren't secure — which means any information you send is only protected if you're on an encrypted website. To be sure a website is encrypted, look for "https" in the address before you log in or send any personal info. 3. Don't click on links in unsolicited s. Don't give out information over the phone or online unless you've verified the source. 4. Keep your eye on debit and credit cards when paying for purchases. If anything seems out of the ordinary, be cautious using your card.

33 HELPFUL WEBSITES ConnectSafely Smart Socializing Starts Here
National Center for Missing & Exploited Children FBI-Internet Crime Complaints Internet Monitoring Software (Free) https://onlinefamily.norton.com/familysafety/basicpremium.fs Internet Monitoring Software-All have mixed reviews 1. Net Nanny $28.99 2. WebWatcher $97.00 3. McAfee Safe Eyes $49.95 4. Spectorsoft-eblaster $99.95

34 QUESTIONS?


Download ppt "School Safety Coordinator Training"

Similar presentations


Ads by Google