5. Cyber-bully policy...
What is the Sierra College policy regarding cyber-bullying?
What is Sierra Collegeâs responsibility in protecting
employees and students?
6. Cyber-bully policy...
What is the Sierra College policy regarding cyber-bullying?
What is Sierra Collegeâs responsibility in protecting
employees and students?
What does Sierra College expect you to teach students?
7. Cyber-bully policy...
What is the Sierra College policy regarding cyber-bullying?
What is Sierra Collegeâs responsibility in protecting
employees and students?
What does Sierra College expect you to teach students?
Chief Murphyâs Safety Memo
8. Cyber-bully policy...
What is the Sierra College policy regarding cyber-bullying?
What is Sierra Collegeâs responsibility in protecting
employees and students?
What does Sierra College expect you to teach students?
Chief Murphyâs Safety Memo
Read, study, pop-quiz
13. Safety Memo
âUsing technology to harass, or bully someone else.â
Why people âcyber-bullyâ
Protect yourself 4 ways:
Use caution when posting personal information
14. Safety Memo
âUsing technology to harass, or bully someone else.â
Why people âcyber-bullyâ
Protect yourself 4 ways:
Use caution when posting personal information
Consider ignoring an online bully
15. Safety Memo
âUsing technology to harass, or bully someone else.â
Why people âcyber-bullyâ
Protect yourself 4 ways:
Use caution when posting personal information
Consider ignoring an online bully
Document activity
16. Safety Memo
âUsing technology to harass, or bully someone else.â
Why people âcyber-bullyâ
Protect yourself 4 ways:
Use caution when posting personal information
Consider ignoring an online bully
Document activity
Report to authorities
17. DeïŹne for this class...
Cyber-bully
cyber
bully
Libel
Slander
ID theft
18. Expand for this class...
Reputation / privacy
Online ID theft/Someone posing as you
Someone using your name but NOT posing as you
Information posted about you
Information/comments mistakenly attached to you
Mistaken identity
19. Other issues...
TMI
Stupid sh!t
The myth of âprivacy settingsâ
Think before you post
The Internet remembers everything forever
Who should be your friend? Should you âfriendâ students?
20. ...and more issues...
Sexting - illegal; under-age -- additional danger
Phishing - protect your passwords
Spam - costing us all $$$
Copyright Infringement - Oh, MY, word!!!
21. Who is most at risk?
Full-time students (18-24)
Dismiss risk of online crime
Computer security not utilized for crime prevention
Very active online - pre-occupied with social interaction
Open and adventurous and over-conïŹdent
ProïŹcient but not on security aspects
22. Protection
Just donât go online
Establish your brand
Keep tabs on your âbrandâ
Search engines, use multiple
Name registration checkers - social media sites
23. What schools can do...
Integrate cyber-bullying into other anti-bully programs
Review all existing policies
Integrate curriculum-based programs into classrooms
Educate staff
24. Education
Educate yourself
Pay attention: news, discussions, articles
Educate your students
Appropriate behavior for your class
Is there a school policy? Help create one.
Hinweis der Redaktion
Using technology to harass, or bully someone else
--> email, instant message, web pages, digital photos
Why cyber-bully?
--> anonimity of the Internet
--> lack of personal contact/risk
--> causes more damage because of speed and reach of Internet
--> amount of personal information found online
--> bullies may arbitrarily choose victims
--> “cyber” may not be the limit, may just be a testing ground that leads to violence
Protect yourself
--> Use caution
--> where do you post, what do you post and who has access?
--> limiting access to your info may make identifying bully easier
--> Consider ignoring the situation
--> Responding with hostility may escalate the situation
--> A bully may become energized by the attention
--> Change your accounts
-->if bully follows, may build stronger case for legal action
--> Document
--> what/how -- emails, web pages, IMs, etc.
--> dates and times
--> archive electronic version
--> consider archiving printed version
--> Report
--> Law enforcement agencies have different policies
--> Law enforcement officials can decide if it’s free speech or breaking law
--> in addition, report to Sierra College Police Dept.
--> bullied while on campus
--> bullied while at home in connection with your relationship w/SC
Using technology to harass, or bully someone else
--> email, instant message, web pages, digital photos
Why cyber-bully?
--> anonimity of the Internet
--> lack of personal contact/risk
--> causes more damage because of speed and reach of Internet
--> amount of personal information found online
--> bullies may arbitrarily choose victims
--> “cyber” may not be the limit, may just be a testing ground that leads to violence
Protect yourself
--> Use caution
--> where do you post, what do you post and who has access?
--> limiting access to your info may make identifying bully easier
--> Consider ignoring the situation
--> Responding with hostility may escalate the situation
--> A bully may become energized by the attention
--> Change your accounts
-->if bully follows, may build stronger case for legal action
--> Document
--> what/how -- emails, web pages, IMs, etc.
--> dates and times
--> archive electronic version
--> consider archiving printed version
--> Report
--> Law enforcement agencies have different policies
--> Law enforcement officials can decide if it’s free speech or breaking law
--> in addition, report to Sierra College Police Dept.
--> bullied while on campus
--> bullied while at home in connection with your relationship w/SC
Using technology to harass, or bully someone else
--> email, instant message, web pages, digital photos
Why cyber-bully?
--> anonimity of the Internet
--> lack of personal contact/risk
--> causes more damage because of speed and reach of Internet
--> amount of personal information found online
--> bullies may arbitrarily choose victims
--> “cyber” may not be the limit, may just be a testing ground that leads to violence
Protect yourself
--> Use caution
--> where do you post, what do you post and who has access?
--> limiting access to your info may make identifying bully easier
--> Consider ignoring the situation
--> Responding with hostility may escalate the situation
--> A bully may become energized by the attention
--> Change your accounts
-->if bully follows, may build stronger case for legal action
--> Document
--> what/how -- emails, web pages, IMs, etc.
--> dates and times
--> archive electronic version
--> consider archiving printed version
--> Report
--> Law enforcement agencies have different policies
--> Law enforcement officials can decide if it’s free speech or breaking law
--> in addition, report to Sierra College Police Dept.
--> bullied while on campus
--> bullied while at home in connection with your relationship w/SC
Using technology to harass, or bully someone else
--> email, instant message, web pages, digital photos
Why cyber-bully?
--> anonimity of the Internet
--> lack of personal contact/risk
--> causes more damage because of speed and reach of Internet
--> amount of personal information found online
--> bullies may arbitrarily choose victims
--> “cyber” may not be the limit, may just be a testing ground that leads to violence
Protect yourself
--> Use caution
--> where do you post, what do you post and who has access?
--> limiting access to your info may make identifying bully easier
--> Consider ignoring the situation
--> Responding with hostility may escalate the situation
--> A bully may become energized by the attention
--> Change your accounts
-->if bully follows, may build stronger case for legal action
--> Document
--> what/how -- emails, web pages, IMs, etc.
--> dates and times
--> archive electronic version
--> consider archiving printed version
--> Report
--> Law enforcement agencies have different policies
--> Law enforcement officials can decide if it’s free speech or breaking law
--> in addition, report to Sierra College Police Dept.
--> bullied while on campus
--> bullied while at home in connection with your relationship w/SC
Using technology to harass, or bully someone else
--> email, instant message, web pages, digital photos
Why cyber-bully?
--> anonimity of the Internet
--> lack of personal contact/risk
--> causes more damage because of speed and reach of Internet
--> amount of personal information found online
--> bullies may arbitrarily choose victims
--> “cyber” may not be the limit, may just be a testing ground that leads to violence
Protect yourself
--> Use caution
--> where do you post, what do you post and who has access?
--> limiting access to your info may make identifying bully easier
--> Consider ignoring the situation
--> Responding with hostility may escalate the situation
--> A bully may become energized by the attention
--> Change your accounts
-->if bully follows, may build stronger case for legal action
--> Document
--> what/how -- emails, web pages, IMs, etc.
--> dates and times
--> archive electronic version
--> consider archiving printed version
--> Report
--> Law enforcement agencies have different policies
--> Law enforcement officials can decide if it’s free speech or breaking law
--> in addition, report to Sierra College Police Dept.
--> bullied while on campus
--> bullied while at home in connection with your relationship w/SC
Using technology to harass, or bully someone else
--> email, instant message, web pages, digital photos
Why cyber-bully?
--> anonimity of the Internet
--> lack of personal contact/risk
--> causes more damage because of speed and reach of Internet
--> amount of personal information found online
--> bullies may arbitrarily choose victims
--> “cyber” may not be the limit, may just be a testing ground that leads to violence
Protect yourself
--> Use caution
--> where do you post, what do you post and who has access?
--> limiting access to your info may make identifying bully easier
--> Consider ignoring the situation
--> Responding with hostility may escalate the situation
--> A bully may become energized by the attention
--> Change your accounts
-->if bully follows, may build stronger case for legal action
--> Document
--> what/how -- emails, web pages, IMs, etc.
--> dates and times
--> archive electronic version
--> consider archiving printed version
--> Report
--> Law enforcement agencies have different policies
--> Law enforcement officials can decide if it’s free speech or breaking law
--> in addition, report to Sierra College Police Dept.
--> bullied while on campus
--> bullied while at home in connection with your relationship w/SC
Using technology to harass, or bully someone else
--> email, instant message, web pages, digital photos
Why cyber-bully?
--> anonimity of the Internet
--> lack of personal contact/risk
--> causes more damage because of speed and reach of Internet
--> amount of personal information found online
--> bullies may arbitrarily choose victims
--> “cyber” may not be the limit, may just be a testing ground that leads to violence
Protect yourself
--> Use caution
--> where do you post, what do you post and who has access?
--> limiting access to your info may make identifying bully easier
--> Consider ignoring the situation
--> Responding with hostility may escalate the situation
--> A bully may become energized by the attention
--> Change your accounts
-->if bully follows, may build stronger case for legal action
--> Document
--> what/how -- emails, web pages, IMs, etc.
--> dates and times
--> archive electronic version
--> consider archiving printed version
--> Report
--> Law enforcement agencies have different policies
--> Law enforcement officials can decide if it’s free speech or breaking law
--> in addition, report to Sierra College Police Dept.
--> bullied while on campus
--> bullied while at home in connection with your relationship w/SC
Cyber = ...
Bully = the act of intentionally causing harm to others, through verbal harassment, physical assault, or other more subtle methods of coercion such as manipulation
--> harass = more difficult because law (if any) varies by jurisdiction
--> psychological harassment = humiliating or abusive behavior that lowers a person's self-esteem or causes them torment... verbal comments, actions, gestures
--> stalking = the unauthorized following and surveillance of an individual, to the extent that the person's privacy is unacceptably intruded upon, and the victim fears for his/her safety.
Libel = a published false statement that is damaging to a person's reputation
Slander = the action or crime of making a false spoken statement damaging to a person's reputation
ID theft - ID not actually stolen, simply used -- stolen data is used to obtain goods and services
related to ID fraud -- someone poses as someone to commit fraud or to obtain goods and services
Using your ID on a social media site: each service has its own “Terms of Service”
You have to contact them when you discover someone using your “brand”
I found my name using a search engine with a link to a video sharing site that I used. In the search engine paragraph was my name and “Great fucking video,” a comment which I did not make and did not want appearing next to my name as though I had.
TMI = stalking. Keep in mind that the more unusual your name, the easier it is to track you.
Privacy settings
Do you understand them, do you use them, do they do what you expect?
If it’s on the web, you canNOT expect privacy. Too easy to share!
Post
Who else is on your network? If you’ve friended your boss, think about what you say about your job.
ReadWriteWeb article by Lidija Davis, “Say something in passing on a social site and it may come back to haunt you.”
ex:
James Andrews tweeted: “True confession but I’m in one of those towns where I scratch my head and say “I would die if I had to live here!” Turns out he was in Memphis to visit his client, FedEx, and some FedEx employees were deeply offended and sent an email to Mr. Andrews home office: {see print-out}
To “hoekstra”
Internet Archive -- Way Back Machine
Are the lives of teachers public or private?
A tv station in Arizona ran a November sweeps piece on what they found on Arizona teachers’ social network pages.
Not going online doesn’t protect you. Sorry.
Have you “Googled” yourself lately? Have you Googled your home phone number?
(Seth Godin’s Blog)
The first thing to do this year
Google yourself.
If you're a salesperson, your prospects already do. If you're looking for a job, your prospective employers already do. If you've got a job, your co-workers already do.
What do they see? Do you know?
If you don't like it, you can fix it. Start a blog, even if it's just a few pages worth.
http://usernamecheck.com/
http://namechk.com/
http://knowem.com/
http://www.cla.ca/casl/slic/254cyberbullying.html
Tell students that cyber-bullying is not okay and to follow the recommendations in the safety memo.