SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Cyberbullying, Sexting and Social Networking
© Arlen Kimmelman , Ed.M., M.A., NBCT                   NJASL, December 3-4, 2010

Program Objectives: What three things will participants learn from this session that can be
implemented?

   1. Familiarization with the applicable state and federal laws associated with potentially

      disrupting electronic communications

   2. Suggestions for implementing effective school or district policies regarding electronic

      communications

   3. Tips for safe use of electronic communications by both student and staff


              Adapted from presentation to CRHS administration on 3/30/2010
         by Arlen Kimmelman, Librarian, Clearview Regional HS: http://bit.ly/dn3IHA
Cyberbullying, Sexting and Social Networking
© Arlen Kimmelman , Ed.M., M.A., NBCT                   NJASL, December 3-4, 2010

Part 1: Familiarization with the applicable state and federal laws associated with
potentially disrupting electronic communications
NJ Legislature
      I. Bill Search: http://www.njleg.state.nj.us/Default.asp
     II. Statutes: http://bit.ly/1gmH4c
    III. Email notification for selected bills:
         http://www.njleg.state.nj.us/bills/BillsSubscriptionLogin.asp

NJ Cyberbullying Law as of July 2010                       : http://bit.ly/bvAEXM
Relevant NJ Bills in 2010-2011 Session:
Cyberbullying: http://www.njleg.state.nj.us/2010/Bills/A3500/3328_I1.HTM
Harassment: http://www.njleg.state.nj.us/2010/Bills/A3500/3409_I1.HTM
Sexting: http://www.njleg.state.nj.us/2010/Bills/A2000/1561_I1.HTM
Social networking: http://www.njleg.state.nj.us/2010/Bills/A3000/2689_I1.HTM
                    http://www.njleg.state.nj.us/2010/Bills/S0500/326_I1.HTM
Relevant Keyword Searches in NJ Statutes:
„Child‟/„Internet‟: 2C:43-3.8 : http://bit.ly/9pN8Uv and 2C:7-2: http://bit.ly/9d3x1G
„Bullying‟: 18A:37-15.1 : http://bit.ly/bh0Fes and
                     complete search results for „Bullying‟ http://bit.ly/8YxXxB
                       Note: definitions in 18A:37-14 http://bit.ly/cqM6OX
„Online‟: 52:17B-193: http://bit.ly/aglbL7 and 2C:43-3.8: http://bit.ly/9tiVKE
„Sexting‟: NONE!
„Texting‟: NONE!
„Social Networking‟: NONE!
NJ’s County Prosecutors: http://bit.ly/cc9phx
There Isn‘t A Moment To Lose: An Urgent Call for Legal Reform and Effective Practices to
Combat Bullying in New Jersey Schools, Report of the New Jersey Commission on Bullying in
Schools, December 15, 2009, http://bit.ly/azTkJX
      Table of Contents
      Brief Overview of Findings and Recommendations ..................................................1
      Summary of Findings ......................................................................................................5
      Summary of Recommendations ......................................................................................6
      Background on the New Jersey Commission on Bullying in Schools .............................8
      Overview of Current State of Laws Pertaining to Bullying Issues .........................11
      The New Jersey Law Against Discrimination (LAD) Also Provides
              Limited Protections for Some Victims of HIB .....................................................12
      The New Jersey Bias Intimidation (BI) Statute Provides Limited Protections
              for Victims of Criminal Conduct That Sometimes Includes HIB .........................12
      The New Jersey Anti-Bullying Law as the Principal Legal Mechanism
              for Addressing HIB in Schools .......................................................................14
      Recommendation #1-22: ..........................................................................................14-43
      Conclusion and Appendices .....................................................................................46-62
Cyberbullying, Sexting and Social Networking
© Arlen Kimmelman , Ed.M., M.A., NBCT                   NJASL, December 3-4, 2010

Part 2: Suggestions for implementing effective school or district policies regarding
electronic communications

My School‟s Policies: http://writer.zoho.com/public/pseudandry/schoolpolicies

Social Networking Primer for School Boards: http://bit.ly/dopTUC

New Jersey‟s Model Policy and Guidance for Prohibiting Harassment, Intimidation and Bullying
on School Property, at School-Sponsored Functions and on School Buses (Revised November
2008) http://www.state.nj.us/education/parents/bully.pdf




Reviewing and Updating Your Harassment, Intimidation and Bullying Policy Tip Sheet from
Rutgers http://bit.ly/aNWRXq

Section #2 – Statute and Regulatory Requirement
The policy shall contain a definition of harassment, intimidation or bullying, no less inclusive
than the definition set forth in the model policy. N.J.S.A. 18A:37-15(3)(b)(2) and N.J.A.C.
6A:16-7.9(a) 2ii
Issues for Consideration in Local Policy Development
1. Does the policy address bullying incidents not motivated by characteristics such as the
   target‟s race, color, religion, gender, or sexual orientation?
2. Do district policies and procedures address and impose consequences for acts of HIB that
   occur off of school grounds including all forms of electronic communication, such as cyber-
   bullying?
3. Does the definition of HIB include “any electronic communication?”
4. Does the policy provide clear examples of what is meant by “electronic communication?”


Resources from University of San Diego School of Leadership and Education Sciences,
Center for Education Policy and Law:

A. Helping School Personnel Control Student Misuse of Electronic Communication Devices
   On and Off Campus - October 2010,
      University of San Diego Center for Education Policy and Law: http://bit.ly/cidvxA

B. Suggested Student Discipline Rules (Short Version), Student Misuse of Electronic
   Communication Devices in Junior High and High Schools, (2 pp.) http://bit.ly/9HZPTe
     Center for Education Policy and Law • University of San Diego, October 2010

C. Suggested Student Discipline Rules (Long Version), Student Misuse of Electronic
   Communication Devices in Junior High and High Schools, (4 pp.) http://bit.ly/ctrjNn
     Center for Education Policy and Law • University of San Diego, October 2010

                                                                           (Continued on next page)
Cyberbullying, Sexting and Social Networking
© Arlen Kimmelman , Ed.M., M.A., NBCT                   NJASL, December 3-4, 2010


D. Free Speech and Privacy Dimensions Of Student Misuse of Their Own Electronic
   Communication Devices in Elementary and Secondary Schools: A Review of the Issues
   and Related [CA] Law, http://bit.ly/c5HQ1e
      Frank Kemerer, Professor-in-Residence, School of Law and School of Leadership and
      Education Sciences • University of San Diego, October 2010

E. Suggested School District Policy: Student Misuse of Electronic Communication Devices,
     Center for Education Policy and Law • University of San Diego, October 2010,
     http://bit.ly/aMpmZB

F. Resources for Learning about Electronic Communication Devices,
     Center for Education Policy and Law • University of San Diego, Information compiled by
     Megan Cramer, Research Assistant, July 2010, http://bit.ly/czh2Yi
Cyberbullying, Sexting and Social Networking
© Arlen Kimmelman , Ed.M., M.A., NBCT                   NJASL, December 3-4, 2010

Part 3: Tips for safe use of electronic communications by both student and staff

Safety Tips: http://writer.zoho.com/public/pseudandry/safetytips

Cyber Safety Tool Kit: Solutions for Schools, NJPSA‟s [New Jersey‟s Principals and
Supervisor‟s Association], © 2009: http://www.njpsa.org/documents/pdf/bully.pdf
   1. Cyber Problems (p.2)
      a.   Cyber Bullying
      b.   Cyber Predators
      c.   Cyber Memory
      d.   Cyber Crime
      e.   Cyber Cheating
   2. Solutions for Cyber Safety (p.4)
      a. Prevent Cyber Bullying
   3. What the Law Requires: Legal Issues Related to Cyber Bullying (p.8)
      a.   Legal Definition of Bullying
      b.   Conduct Away from School Grounds
      c.   Cyber Bullying and Student Due Process Rights
      d.   Landmark N.J. Supreme Court Decision Sets New Standard
      e.   Case Law Regarding Student Discipline and Cyberspace
      f.   Searches of Cell Phones and Other Hand Held Devices
   4. Additional Steps for Cyber Safety (p.14)
   5. Agencies Investigating Cyber Crime (p. 16)
   6. Talking Points to Use with School Staff (p. 17)
      a. Talking Points to Use with Families
   7. Tips for Families of Middle and High School Students (p. 20)
   8. Tips for Families of Elementary Students (p. 22)
   9. Links and Resources (p. 24)
   10. Welcome to Cyberspace: The New Vocabulary (p. 27)
   11. Top 15 Social Networking Sites (p. 30)

Weitere ähnliche Inhalte

Was ist angesagt?

1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in Cyberspace
Marc Smith
 
Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Capstone Project Final 7-19-13
Capstone Project Final 7-19-13
Megan Bednar
 
RESEARCH PROPOSAL 2016 @ FINAL VERSION
RESEARCH PROPOSAL 2016 @ FINAL VERSIONRESEARCH PROPOSAL 2016 @ FINAL VERSION
RESEARCH PROPOSAL 2016 @ FINAL VERSION
Gabriel Jr Matthew
 
The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...
Cocoloris
 
Identities in motion cyberspace and myanmar men having sex with men
Identities in motion cyberspace and myanmar men having sex with menIdentities in motion cyberspace and myanmar men having sex with men
Identities in motion cyberspace and myanmar men having sex with men
Alexander Decker
 
Wcu Lectures & Workshops, Schedule & Abstracts, 13 Sept2009
Wcu Lectures & Workshops, Schedule & Abstracts, 13 Sept2009Wcu Lectures & Workshops, Schedule & Abstracts, 13 Sept2009
Wcu Lectures & Workshops, Schedule & Abstracts, 13 Sept2009
Nick Jankowski
 

Was ist angesagt? (20)

1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in Cyberspace
 
Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Capstone Project Final 7-19-13
Capstone Project Final 7-19-13
 
Webometrics and Studies of Cultural Diffusion -Psy Gangnam Style on YouTube
Webometrics and Studies of Cultural Diffusion-Psy Gangnam Style on YouTubeWebometrics and Studies of Cultural Diffusion-Psy Gangnam Style on YouTube
Webometrics and Studies of Cultural Diffusion -Psy Gangnam Style on YouTube
 
Web 2.0 In University Life
Web 2.0 In University LifeWeb 2.0 In University Life
Web 2.0 In University Life
 
RESEARCH PROPOSAL 2016 @ FINAL VERSION
RESEARCH PROPOSAL 2016 @ FINAL VERSIONRESEARCH PROPOSAL 2016 @ FINAL VERSION
RESEARCH PROPOSAL 2016 @ FINAL VERSION
 
Educators Use of Social Media
Educators Use of Social MediaEducators Use of Social Media
Educators Use of Social Media
 
The college at brockport (06khjja09)
The college at brockport (06khjja09)The college at brockport (06khjja09)
The college at brockport (06khjja09)
 
4
44
4
 
Current Issue Paper
Current Issue PaperCurrent Issue Paper
Current Issue Paper
 
NCompass Live: Accessing Courts through E-Government
NCompass Live: Accessing Courts through E-GovernmentNCompass Live: Accessing Courts through E-Government
NCompass Live: Accessing Courts through E-Government
 
The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...
 
Ukraine
UkraineUkraine
Ukraine
 
Identities in motion cyberspace and myanmar men having sex with men
Identities in motion cyberspace and myanmar men having sex with menIdentities in motion cyberspace and myanmar men having sex with men
Identities in motion cyberspace and myanmar men having sex with men
 
Jankowski & van selm, promise and practice of public debate, 2000
Jankowski & van selm, promise and practice of public debate, 2000Jankowski & van selm, promise and practice of public debate, 2000
Jankowski & van selm, promise and practice of public debate, 2000
 
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
 
Digital Divides tprc-2019
Digital Divides tprc-2019Digital Divides tprc-2019
Digital Divides tprc-2019
 
Web 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher EducationWeb 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher Education
 
Wcu Lectures & Workshops, Schedule & Abstracts, 13 Sept2009
Wcu Lectures & Workshops, Schedule & Abstracts, 13 Sept2009Wcu Lectures & Workshops, Schedule & Abstracts, 13 Sept2009
Wcu Lectures & Workshops, Schedule & Abstracts, 13 Sept2009
 
Politics of tweeting, tweeting of politics: The uses of social media by state...
Politics of tweeting, tweeting of politics: The uses of social media by state...Politics of tweeting, tweeting of politics: The uses of social media by state...
Politics of tweeting, tweeting of politics: The uses of social media by state...
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 

Andere mochten auch (7)

Negative effects of social media
Negative effects of social mediaNegative effects of social media
Negative effects of social media
 
Cyberbullypowerpoint
CyberbullypowerpointCyberbullypowerpoint
Cyberbullypowerpoint
 
Abstract
AbstractAbstract
Abstract
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Review of Related Literature
Review of Related LiteratureReview of Related Literature
Review of Related Literature
 
Chapter 2:review of related literature and studies
Chapter 2:review of related literature and studiesChapter 2:review of related literature and studies
Chapter 2:review of related literature and studies
 
Related Literature and Related Studies
Related Literature and Related StudiesRelated Literature and Related Studies
Related Literature and Related Studies
 

Ähnlich wie Cyberbullying, Sexting and Social Networking

CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
Aimee Shuck
 
HOMEACCESSIBILITYPREVIEWComplete this question by entering your
HOMEACCESSIBILITYPREVIEWComplete this question by entering your HOMEACCESSIBILITYPREVIEWComplete this question by entering your
HOMEACCESSIBILITYPREVIEWComplete this question by entering your
SusanaFurman449
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
philipnelson29183
 
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docxI. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
wilcockiris
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
segughana
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
briancrawford30935
 
IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010
Twittercrisis
 

Ähnlich wie Cyberbullying, Sexting and Social Networking (20)

My new proposal (1).docx
My new proposal (1).docxMy new proposal (1).docx
My new proposal (1).docx
 
Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204
 
Young Adults And On Line Privacy
Young Adults And On Line PrivacyYoung Adults And On Line Privacy
Young Adults And On Line Privacy
 
Individual project 2.20
Individual project 2.20Individual project 2.20
Individual project 2.20
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying Resources
 
HOMEACCESSIBILITYPREVIEWComplete this question by entering your
HOMEACCESSIBILITYPREVIEWComplete this question by entering your HOMEACCESSIBILITYPREVIEWComplete this question by entering your
HOMEACCESSIBILITYPREVIEWComplete this question by entering your
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethics
 
Zara Case Study Essay
Zara Case Study EssayZara Case Study Essay
Zara Case Study Essay
 
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docxI. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
 
Research proposal
Research proposalResearch proposal
Research proposal
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
 
Hsc2017 legal studies
Hsc2017 legal studiesHsc2017 legal studies
Hsc2017 legal studies
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
Thesis Statements (Argumentative Essays)
Thesis Statements (Argumentative Essays)Thesis Statements (Argumentative Essays)
Thesis Statements (Argumentative Essays)
 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.doc
 
IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010
 
8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

Cyberbullying, Sexting and Social Networking

  • 1. Cyberbullying, Sexting and Social Networking © Arlen Kimmelman , Ed.M., M.A., NBCT NJASL, December 3-4, 2010 Program Objectives: What three things will participants learn from this session that can be implemented? 1. Familiarization with the applicable state and federal laws associated with potentially disrupting electronic communications 2. Suggestions for implementing effective school or district policies regarding electronic communications 3. Tips for safe use of electronic communications by both student and staff Adapted from presentation to CRHS administration on 3/30/2010 by Arlen Kimmelman, Librarian, Clearview Regional HS: http://bit.ly/dn3IHA
  • 2. Cyberbullying, Sexting and Social Networking © Arlen Kimmelman , Ed.M., M.A., NBCT NJASL, December 3-4, 2010 Part 1: Familiarization with the applicable state and federal laws associated with potentially disrupting electronic communications NJ Legislature I. Bill Search: http://www.njleg.state.nj.us/Default.asp II. Statutes: http://bit.ly/1gmH4c III. Email notification for selected bills: http://www.njleg.state.nj.us/bills/BillsSubscriptionLogin.asp NJ Cyberbullying Law as of July 2010 : http://bit.ly/bvAEXM Relevant NJ Bills in 2010-2011 Session: Cyberbullying: http://www.njleg.state.nj.us/2010/Bills/A3500/3328_I1.HTM Harassment: http://www.njleg.state.nj.us/2010/Bills/A3500/3409_I1.HTM Sexting: http://www.njleg.state.nj.us/2010/Bills/A2000/1561_I1.HTM Social networking: http://www.njleg.state.nj.us/2010/Bills/A3000/2689_I1.HTM http://www.njleg.state.nj.us/2010/Bills/S0500/326_I1.HTM Relevant Keyword Searches in NJ Statutes: „Child‟/„Internet‟: 2C:43-3.8 : http://bit.ly/9pN8Uv and 2C:7-2: http://bit.ly/9d3x1G „Bullying‟: 18A:37-15.1 : http://bit.ly/bh0Fes and complete search results for „Bullying‟ http://bit.ly/8YxXxB Note: definitions in 18A:37-14 http://bit.ly/cqM6OX „Online‟: 52:17B-193: http://bit.ly/aglbL7 and 2C:43-3.8: http://bit.ly/9tiVKE „Sexting‟: NONE! „Texting‟: NONE! „Social Networking‟: NONE! NJ’s County Prosecutors: http://bit.ly/cc9phx There Isn‘t A Moment To Lose: An Urgent Call for Legal Reform and Effective Practices to Combat Bullying in New Jersey Schools, Report of the New Jersey Commission on Bullying in Schools, December 15, 2009, http://bit.ly/azTkJX Table of Contents Brief Overview of Findings and Recommendations ..................................................1 Summary of Findings ......................................................................................................5 Summary of Recommendations ......................................................................................6 Background on the New Jersey Commission on Bullying in Schools .............................8 Overview of Current State of Laws Pertaining to Bullying Issues .........................11 The New Jersey Law Against Discrimination (LAD) Also Provides Limited Protections for Some Victims of HIB .....................................................12 The New Jersey Bias Intimidation (BI) Statute Provides Limited Protections for Victims of Criminal Conduct That Sometimes Includes HIB .........................12 The New Jersey Anti-Bullying Law as the Principal Legal Mechanism for Addressing HIB in Schools .......................................................................14 Recommendation #1-22: ..........................................................................................14-43 Conclusion and Appendices .....................................................................................46-62
  • 3. Cyberbullying, Sexting and Social Networking © Arlen Kimmelman , Ed.M., M.A., NBCT NJASL, December 3-4, 2010 Part 2: Suggestions for implementing effective school or district policies regarding electronic communications My School‟s Policies: http://writer.zoho.com/public/pseudandry/schoolpolicies Social Networking Primer for School Boards: http://bit.ly/dopTUC New Jersey‟s Model Policy and Guidance for Prohibiting Harassment, Intimidation and Bullying on School Property, at School-Sponsored Functions and on School Buses (Revised November 2008) http://www.state.nj.us/education/parents/bully.pdf Reviewing and Updating Your Harassment, Intimidation and Bullying Policy Tip Sheet from Rutgers http://bit.ly/aNWRXq Section #2 – Statute and Regulatory Requirement The policy shall contain a definition of harassment, intimidation or bullying, no less inclusive than the definition set forth in the model policy. N.J.S.A. 18A:37-15(3)(b)(2) and N.J.A.C. 6A:16-7.9(a) 2ii Issues for Consideration in Local Policy Development 1. Does the policy address bullying incidents not motivated by characteristics such as the target‟s race, color, religion, gender, or sexual orientation? 2. Do district policies and procedures address and impose consequences for acts of HIB that occur off of school grounds including all forms of electronic communication, such as cyber- bullying? 3. Does the definition of HIB include “any electronic communication?” 4. Does the policy provide clear examples of what is meant by “electronic communication?” Resources from University of San Diego School of Leadership and Education Sciences, Center for Education Policy and Law: A. Helping School Personnel Control Student Misuse of Electronic Communication Devices On and Off Campus - October 2010, University of San Diego Center for Education Policy and Law: http://bit.ly/cidvxA B. Suggested Student Discipline Rules (Short Version), Student Misuse of Electronic Communication Devices in Junior High and High Schools, (2 pp.) http://bit.ly/9HZPTe Center for Education Policy and Law • University of San Diego, October 2010 C. Suggested Student Discipline Rules (Long Version), Student Misuse of Electronic Communication Devices in Junior High and High Schools, (4 pp.) http://bit.ly/ctrjNn Center for Education Policy and Law • University of San Diego, October 2010 (Continued on next page)
  • 4. Cyberbullying, Sexting and Social Networking © Arlen Kimmelman , Ed.M., M.A., NBCT NJASL, December 3-4, 2010 D. Free Speech and Privacy Dimensions Of Student Misuse of Their Own Electronic Communication Devices in Elementary and Secondary Schools: A Review of the Issues and Related [CA] Law, http://bit.ly/c5HQ1e Frank Kemerer, Professor-in-Residence, School of Law and School of Leadership and Education Sciences • University of San Diego, October 2010 E. Suggested School District Policy: Student Misuse of Electronic Communication Devices, Center for Education Policy and Law • University of San Diego, October 2010, http://bit.ly/aMpmZB F. Resources for Learning about Electronic Communication Devices, Center for Education Policy and Law • University of San Diego, Information compiled by Megan Cramer, Research Assistant, July 2010, http://bit.ly/czh2Yi
  • 5. Cyberbullying, Sexting and Social Networking © Arlen Kimmelman , Ed.M., M.A., NBCT NJASL, December 3-4, 2010 Part 3: Tips for safe use of electronic communications by both student and staff Safety Tips: http://writer.zoho.com/public/pseudandry/safetytips Cyber Safety Tool Kit: Solutions for Schools, NJPSA‟s [New Jersey‟s Principals and Supervisor‟s Association], © 2009: http://www.njpsa.org/documents/pdf/bully.pdf 1. Cyber Problems (p.2) a. Cyber Bullying b. Cyber Predators c. Cyber Memory d. Cyber Crime e. Cyber Cheating 2. Solutions for Cyber Safety (p.4) a. Prevent Cyber Bullying 3. What the Law Requires: Legal Issues Related to Cyber Bullying (p.8) a. Legal Definition of Bullying b. Conduct Away from School Grounds c. Cyber Bullying and Student Due Process Rights d. Landmark N.J. Supreme Court Decision Sets New Standard e. Case Law Regarding Student Discipline and Cyberspace f. Searches of Cell Phones and Other Hand Held Devices 4. Additional Steps for Cyber Safety (p.14) 5. Agencies Investigating Cyber Crime (p. 16) 6. Talking Points to Use with School Staff (p. 17) a. Talking Points to Use with Families 7. Tips for Families of Middle and High School Students (p. 20) 8. Tips for Families of Elementary Students (p. 22) 9. Links and Resources (p. 24) 10. Welcome to Cyberspace: The New Vocabulary (p. 27) 11. Top 15 Social Networking Sites (p. 30)