SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Kennedy Park
School #24
Open House
September 22, 2015
Affirmative Action
Presentation
A Guide to Social Media, Schools, and
the Law.
Woodbridge Township School
District
Worldwide Statistics
Each day Facebook users spend 10.5 billion minutes
(almost 20,000 years) online, on the social network.
There are approximately 58 million Tweets sent per
day.
About 350 million photos are uploaded to Facebook
each day.
95% of teens ages 12-17 are using internet. 26% are
using twitter, and 11% are on instagram.
Students who used social networking sites while
studying scored 20% lower on tests and students
who used social media had an average GPA of 3.06
versus non-users who had an average GPA of 3.82.
Definition
Social Media – Is a category of online media
where people are talking, participating,
sharing, networking and bookmarking online.
Examples: email, instant messaging, text or picture
messages, social networking sites, picture tagging,
websites, gaming sites, blogs, chat rooms, and
skype.
Continued…
88% of private sexual images have been stolen by
pornography websites and posted to social media
sights.
29% of relationships involving a sex crime were
initiated on a social networking site.
25% of teens between ages 11-17 have forwarded a
“sext”. 68% of girls were asked to send a picture,
whereas 42% of boys have been asked to send
pictures.
Pros of Social Media
Global connectivity (instant communication)
Enhances technology skills
Opportunities for community engagement
Immediate access to all types of information
Fostering of socialization skills
Continued…
In 100% of the cases, teens that are the victims of sexual
predators have gone willingly to meet with them.
There are over 747,408 Registered Sex Offenders in the United
States (2013).
Teens are willing to meet with strangers: 16% of teens
considered meeting someone they've only talked to online and
8% have actually met someone they only knew online.
75% of children are willing to share personal information online
about themselves and their family in exchange for goods and
services.
Cons of Social Media
Messages can become viral in a matter of minutes
Images and texts can remain online indefinitely
(public & permanent)
Innocent pictures can be photo-shopped into sexual
pictures (public & permanent)
Identity theft
Online harassment (cyberbullying) and stalking
Messages can be taken out of context
Impulsivity can lead to regretability
You never really know who you are talking to
Cyberbullying
Cyberbullying is deliberately using digital media to communicate
false, embarrassing, hurtful, harmful or hostile information
about another person.
50% of teens have reported being cyberbullied.
Simply visiting a website that bashes a student is considered
cyberbullying.
Only 1 in 10 teens will tell a parent if they have been
cyberbullied.
70% of teens have witnessed cyberbullying.
Over 20% of cyberbullying victims and 15% of “sexting” victims
have contemplated suicide.
The Dangers of Sexting
Sexting is the act of sending sexually explicit messages or photos
electronically, primarily between mobile phones (sex + texting).
Sexting can have serious, and in some cases, disastrous consequences.
Reputations, social lives, future academics, and careers can be ruined as a
result of nude pictures going public. There can also be serious implications
for the victim’s mental health. Victims may feel humiliation, low self
esteem, and in some instances, suicide has been attributed directly
to sexting.
Many teens are embarrassed and feel regret once they realize what they
have done during a momentary lapse in judgment. Once the image has
been posted and starts circulating there is no telling where it will end up.
And, there is no way to “take it back” or delete it.
How Online Predators Operate
Find kids through social networking, blogs, chat rooms (even monitored kids chat rooms), instant
messaging, email, and other websites, often using information in their targets’ personal profiles.
Seduce their targets through attention, flattery, affection, kindness, and even gifts. These types of
manipulation will cause kids to lose their sense of awareness, and help the predators to get from bad
intentions to sexual exploitation (this is called “grooming” and may continue over extended time
periods).
Are familiar with the latest music, hobbies, fashion, etc. that are likely to interest kids, and may
impersonate other youths in order to convince minors to meet with them.
Look for children that are emotionally vulnerable due to problems at school or home.
Listen to and sympathize with kids' problems, while building a pseudo friendship, taking the kids’
side vis-Ă -vis their parents or teachers.
Gradually introduce sexual content into conversations or show sexually explicit material that may
even involve children engaging in sexual activity – in order to convince kids that this type of behavior is
acceptable.
If the victim tries to cut off communication, predators scare the victim into continuing the
relationship by convincing them that they will tell their parents what they have been doing online and
that they have viewed pornographic pictures, etc.
Online Predators
Online predators are individuals who primarily collect and trade child-
pornographic images, while others seek face-to-face meetings with children.
Be aware of the fact that your children may be at potential risk of
encountering online predators. This is especially true for those times when
kids use social media in order to “meet new friends,” and it’s not always easy for
them to tell when “new friends” have bad intentions.
Anonymity is the main characteristic of predators. Anyone can very easily take
on a false identity and pretend to be someone else. Having anonymity can
facilitate a sense of intimacy but can also serve to hide the true
identity of an online predator. Someone posing as a 15 year old teenager
can in actuality be a 37 year old male. Online predators take advantage of this
to build trust and intimacy and to develop online relationships with innocent
young boys and girls of all ages.
Signs Your Child Could be in Contact with
an Online Predator
Children who spend a lot of time online are at the greatest risk during the evening hours.
While offenders are online around the clock, most work during the day and spend their
evenings online trying to locate and lure children or seeking pornography.
Finding pornographic materials on the computer - child pornography may be used to show
the victim that sex between children and adults is "normal."
Receives phone calls, mail, gifts from people you do not know
Withdraws from normal activity
Switches screen quickly when you approach, or turns the monitor off
Uses other accounts for email or Instant Messaging
If your kids do meet an online predator, don't blame them.
It’s always the offender’s responsibility.
Take decisive action to stop your child from any further contact with this person.
Could Your Student/Child be a Victim?
Warning Signs
Not wanting to be involved in family or school activities
Exhibiting unusual mood swings (nervous, jumpy)
Shows a decline in homework or grades
Trouble sleeping
Unexpectedly stops or is reluctant to use the computer
Quickly switches screens or closes programs when an adult is
present (secretive of their digital life)
Unusual interest in self-harm or suicide
Displays unusual anger, sadness , depression, and/or a
decrease in self-esteem
May discuss revenge
Change in appetite
Prevention
• Before giving children wireless devices, parents
should learn how to limit or restrict the products and
services.
• Tell children to think before posting.
• Always set and check privacy settings.
• Children should not have a computer in their
bedroom and should always be visible to parents
while they are online.
• Review your child’s list of friends.
• Don’t assume anything you post will remain private.
Prevention Continued…
Never open unidentified or unsolicited messages.
Remember to log out of online accounts.
When not in use, make sure webcams are shut off to prevent
spying/hacking.
Do not share personal information online (phone number,
address, social security number, or school information).
Check for pornography, sexual communication, or any other
inappropriate content on your child’s computer.
You can ultimately be held liable for any misuse of your social
media accounts committed by a third party.
Teach children to trust their instincts if they feel
something is wrong.
Prevention Continued…
Google yourself occasionally to see what is written
about you online (Oovoo, Kik, Instagram).
Remember that all the texts, photos, and videos you
create are saved and available as digital evidence.
NEVER plan to meet a stranger or online “friend” in
person.
How to Respond to Victimization
Do not reply to sender and save the evidence.
Block offending email addresses, cell phone numbers,
or change your child’s phone number and email
address.
Do not attempt to handle the matter yourself! Report
incidents and file complaints with communication
services, schools, and law enforcement.
Get legal advice.
Quotes
“Safety is not a gadget but a state of mind”
- Eleanor Everet
“The door to safety swings on the hinges of common
sense” - Unknown
“Safety first is safety always” - Charles M. Hayes
“Safety does not happen by accident “ - Unknown
“Safety is as simple as A-B-C = Always Be Careful”
- Unknown
For More Information….
http://www.Thinkuknow.co.uk
http://www.puresight.com
http://www.commonsensemedia.org
http://www.netsmartz.org
Woodbridge Township Board of Education
The policy on Affirmative Action (#104) EQUAL
OPPORTUNITY / NON-DISCRIMINATION / SEXUAL
HARASSMENT can be found in the WTSD policy
manual.
The policy manual is available in each school and in
the Superintendent’s Office.
It can also be viewed on the school district’s Web
site, located at www.woodbridge.k12.nj.us .
Resources
http://co.middlesex.nj.us/prosecutor
http://www.state.nj.us/njsp/tech/safeteens.html
http://www.netsmartz.org
http://www.commonsense.org
http://www.puresight.com
http://www.safekids.com
http://www.cyberbullying.us
http://www.pediatrics.aappublications.org
http://growingwireless.com
www.hubinternational.com
http://www.digitalbuzzblog.com
http://www.socialnetworking.procon.org
Guerry, Richard. “Today’s Kids+Digital Dangers+Unprepared
Adults = Trouble X 3” Seminar Handout. 2012

Weitere ähnliche Inhalte

Ă„hnlich wie Social media details.ppt

Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
miliarguelles1
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)
Chris Jagger
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-children
Janet Weninger
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
CharanBobby69CB
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
UNC-Greensboro
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
bolan1jt
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
Megan Townes
 

Ă„hnlich wie Social media details.ppt (20)

Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)savethechildrensweden_netsmart (1)
savethechildrensweden_netsmart (1)
 
NetSmart [English]
NetSmart [English]NetSmart [English]
NetSmart [English]
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-children
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
C Y B E R B U L L Y I N G
C Y B E R B U L L Y I N GC Y B E R B U L L Y I N G
C Y B E R B U L L Y I N G
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public Program
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 

KĂĽrzlich hochgeladen

4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
Cara Menggugurkan Kandungan 087776558899
 

KĂĽrzlich hochgeladen (20)

What is Google Search Console and What is it provide?
What is Google Search Console and What is it provide?What is Google Search Console and What is it provide?
What is Google Search Console and What is it provide?
 
Distribution Ad Platform_ The Role of Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of  Distribution Ad Network.pdfDistribution Ad Platform_ The Role of  Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of Distribution Ad Network.pdf
 
The Science of Landing Page Messaging.pdf
The Science of Landing Page Messaging.pdfThe Science of Landing Page Messaging.pdf
The Science of Landing Page Messaging.pdf
 
Best 5 Graphics Designing Course In Chandigarh
Best 5 Graphics Designing Course In ChandigarhBest 5 Graphics Designing Course In Chandigarh
Best 5 Graphics Designing Course In Chandigarh
 
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
 
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptxUnveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
 
Social Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendaySocial Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh Benday
 
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night ServiceVIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
 
Unraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxUnraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptx
 
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
 
Busty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 
Rise and fall of Kulula.com, an airline won consumers by different marketing ...
Rise and fall of Kulula.com, an airline won consumers by different marketing ...Rise and fall of Kulula.com, an airline won consumers by different marketing ...
Rise and fall of Kulula.com, an airline won consumers by different marketing ...
 
2024 Social Trends Report V4 from Later.com
2024 Social Trends Report V4 from Later.com2024 Social Trends Report V4 from Later.com
2024 Social Trends Report V4 from Later.com
 
Analysis of Sineing Website and how to fix
Analysis of Sineing Website and how to fixAnalysis of Sineing Website and how to fix
Analysis of Sineing Website and how to fix
 
20180928 Hofstede Insights Conference Milan The Power of Culture Led Brands.pptx
20180928 Hofstede Insights Conference Milan The Power of Culture Led Brands.pptx20180928 Hofstede Insights Conference Milan The Power of Culture Led Brands.pptx
20180928 Hofstede Insights Conference Milan The Power of Culture Led Brands.pptx
 
The+State+of+Careers+In+Retention+Marketing-2.pdf
The+State+of+Careers+In+Retention+Marketing-2.pdfThe+State+of+Careers+In+Retention+Marketing-2.pdf
The+State+of+Careers+In+Retention+Marketing-2.pdf
 
Discover Ardency Elite: Elevate Your Lifestyle
Discover Ardency Elite: Elevate Your LifestyleDiscover Ardency Elite: Elevate Your Lifestyle
Discover Ardency Elite: Elevate Your Lifestyle
 
Unlocking the Mystery of the Voynich Manuscript
Unlocking the Mystery of the Voynich ManuscriptUnlocking the Mystery of the Voynich Manuscript
Unlocking the Mystery of the Voynich Manuscript
 
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best PracticesInstant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
 
Social Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendaySocial Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh Benday
 

Social media details.ppt

  • 1. Kennedy Park School #24 Open House September 22, 2015
  • 2. Affirmative Action Presentation A Guide to Social Media, Schools, and the Law. Woodbridge Township School District
  • 3. Worldwide Statistics Each day Facebook users spend 10.5 billion minutes (almost 20,000 years) online, on the social network. There are approximately 58 million Tweets sent per day. About 350 million photos are uploaded to Facebook each day. 95% of teens ages 12-17 are using internet. 26% are using twitter, and 11% are on instagram. Students who used social networking sites while studying scored 20% lower on tests and students who used social media had an average GPA of 3.06 versus non-users who had an average GPA of 3.82.
  • 4. Definition Social Media – Is a category of online media where people are talking, participating, sharing, networking and bookmarking online. Examples: email, instant messaging, text or picture messages, social networking sites, picture tagging, websites, gaming sites, blogs, chat rooms, and skype.
  • 5. Continued… 88% of private sexual images have been stolen by pornography websites and posted to social media sights. 29% of relationships involving a sex crime were initiated on a social networking site. 25% of teens between ages 11-17 have forwarded a “sext”. 68% of girls were asked to send a picture, whereas 42% of boys have been asked to send pictures.
  • 6. Pros of Social Media Global connectivity (instant communication) Enhances technology skills Opportunities for community engagement Immediate access to all types of information Fostering of socialization skills
  • 7. Continued… In 100% of the cases, teens that are the victims of sexual predators have gone willingly to meet with them. There are over 747,408 Registered Sex Offenders in the United States (2013). Teens are willing to meet with strangers: 16% of teens considered meeting someone they've only talked to online and 8% have actually met someone they only knew online. 75% of children are willing to share personal information online about themselves and their family in exchange for goods and services.
  • 8. Cons of Social Media Messages can become viral in a matter of minutes Images and texts can remain online indefinitely (public & permanent) Innocent pictures can be photo-shopped into sexual pictures (public & permanent) Identity theft Online harassment (cyberbullying) and stalking Messages can be taken out of context Impulsivity can lead to regretability You never really know who you are talking to
  • 9. Cyberbullying Cyberbullying is deliberately using digital media to communicate false, embarrassing, hurtful, harmful or hostile information about another person. 50% of teens have reported being cyberbullied. Simply visiting a website that bashes a student is considered cyberbullying. Only 1 in 10 teens will tell a parent if they have been cyberbullied. 70% of teens have witnessed cyberbullying. Over 20% of cyberbullying victims and 15% of “sexting” victims have contemplated suicide.
  • 10. The Dangers of Sexting Sexting is the act of sending sexually explicit messages or photos electronically, primarily between mobile phones (sex + texting). Sexting can have serious, and in some cases, disastrous consequences. Reputations, social lives, future academics, and careers can be ruined as a result of nude pictures going public. There can also be serious implications for the victim’s mental health. Victims may feel humiliation, low self esteem, and in some instances, suicide has been attributed directly to sexting. Many teens are embarrassed and feel regret once they realize what they have done during a momentary lapse in judgment. Once the image has been posted and starts circulating there is no telling where it will end up. And, there is no way to “take it back” or delete it.
  • 11. How Online Predators Operate Find kids through social networking, blogs, chat rooms (even monitored kids chat rooms), instant messaging, email, and other websites, often using information in their targets’ personal profiles. Seduce their targets through attention, flattery, affection, kindness, and even gifts. These types of manipulation will cause kids to lose their sense of awareness, and help the predators to get from bad intentions to sexual exploitation (this is called “grooming” and may continue over extended time periods). Are familiar with the latest music, hobbies, fashion, etc. that are likely to interest kids, and may impersonate other youths in order to convince minors to meet with them. Look for children that are emotionally vulnerable due to problems at school or home. Listen to and sympathize with kids' problems, while building a pseudo friendship, taking the kids’ side vis-Ă -vis their parents or teachers. Gradually introduce sexual content into conversations or show sexually explicit material that may even involve children engaging in sexual activity – in order to convince kids that this type of behavior is acceptable. If the victim tries to cut off communication, predators scare the victim into continuing the relationship by convincing them that they will tell their parents what they have been doing online and that they have viewed pornographic pictures, etc.
  • 12. Online Predators Online predators are individuals who primarily collect and trade child- pornographic images, while others seek face-to-face meetings with children. Be aware of the fact that your children may be at potential risk of encountering online predators. This is especially true for those times when kids use social media in order to “meet new friends,” and it’s not always easy for them to tell when “new friends” have bad intentions. Anonymity is the main characteristic of predators. Anyone can very easily take on a false identity and pretend to be someone else. Having anonymity can facilitate a sense of intimacy but can also serve to hide the true identity of an online predator. Someone posing as a 15 year old teenager can in actuality be a 37 year old male. Online predators take advantage of this to build trust and intimacy and to develop online relationships with innocent young boys and girls of all ages.
  • 13. Signs Your Child Could be in Contact with an Online Predator Children who spend a lot of time online are at the greatest risk during the evening hours. While offenders are online around the clock, most work during the day and spend their evenings online trying to locate and lure children or seeking pornography. Finding pornographic materials on the computer - child pornography may be used to show the victim that sex between children and adults is "normal." Receives phone calls, mail, gifts from people you do not know Withdraws from normal activity Switches screen quickly when you approach, or turns the monitor off Uses other accounts for email or Instant Messaging If your kids do meet an online predator, don't blame them. It’s always the offender’s responsibility. Take decisive action to stop your child from any further contact with this person.
  • 14. Could Your Student/Child be a Victim? Warning Signs Not wanting to be involved in family or school activities Exhibiting unusual mood swings (nervous, jumpy) Shows a decline in homework or grades Trouble sleeping Unexpectedly stops or is reluctant to use the computer Quickly switches screens or closes programs when an adult is present (secretive of their digital life) Unusual interest in self-harm or suicide Displays unusual anger, sadness , depression, and/or a decrease in self-esteem May discuss revenge Change in appetite
  • 15. Prevention • Before giving children wireless devices, parents should learn how to limit or restrict the products and services. • Tell children to think before posting. • Always set and check privacy settings. • Children should not have a computer in their bedroom and should always be visible to parents while they are online. • Review your child’s list of friends. • Don’t assume anything you post will remain private.
  • 16. Prevention Continued… Never open unidentified or unsolicited messages. Remember to log out of online accounts. When not in use, make sure webcams are shut off to prevent spying/hacking. Do not share personal information online (phone number, address, social security number, or school information). Check for pornography, sexual communication, or any other inappropriate content on your child’s computer. You can ultimately be held liable for any misuse of your social media accounts committed by a third party. Teach children to trust their instincts if they feel something is wrong.
  • 17. Prevention Continued… Google yourself occasionally to see what is written about you online (Oovoo, Kik, Instagram). Remember that all the texts, photos, and videos you create are saved and available as digital evidence. NEVER plan to meet a stranger or online “friend” in person.
  • 18. How to Respond to Victimization Do not reply to sender and save the evidence. Block offending email addresses, cell phone numbers, or change your child’s phone number and email address. Do not attempt to handle the matter yourself! Report incidents and file complaints with communication services, schools, and law enforcement. Get legal advice.
  • 19. Quotes “Safety is not a gadget but a state of mind” - Eleanor Everet “The door to safety swings on the hinges of common sense” - Unknown “Safety first is safety always” - Charles M. Hayes “Safety does not happen by accident “ - Unknown “Safety is as simple as A-B-C = Always Be Careful” - Unknown
  • 21. Woodbridge Township Board of Education The policy on Affirmative Action (#104) EQUAL OPPORTUNITY / NON-DISCRIMINATION / SEXUAL HARASSMENT can be found in the WTSD policy manual. The policy manual is available in each school and in the Superintendent’s Office. It can also be viewed on the school district’s Web site, located at www.woodbridge.k12.nj.us .