Student Mentors: o Kendra o Brandon o Taylor o Colton - - PowerPoint PPT Presentation
Student Mentors: o Kendra o Brandon o Taylor o Colton - - PowerPoint PPT Presentation
Student Mentors: o Kendra o Brandon o Taylor o Colton Facilitators o Cari Roderick o Neale Rasmussen Grant provided from: Office of Juvenile Justice and Delinquency Prevention U.S Department of Justice In Partnership with:
Student Mentors:
- Kendra
- Brandon
- Taylor
- Colton
Facilitators
- Cari Roderick
- Neale Rasmussen
Grant provided from: Office of Juvenile Justice and Delinquency Prevention U.S Department of Justice In Partnership with: Educational Service District 101 United States Attorney's Office Eastern Division of WA Northwest Council of Computer Education Northeast Washington Education Council
Promote safe and responsible digital citizens Digital Natives vs. Digital Immigrants leading the way
Meeting Future Needs:
Children’s Internet Protection Act Update
- School districts must update their Internet safety policies on or
before July 1, 2012
- Policies must provide:
- Education for minors about appropriate online behavior which includes
interaction with people on social networking sites and in chat rooms
- Evidence of programs that raise awareness of, and respond to, cyber-
bullying.
- 1. Standard texting rates only (worst case US $0.20)
- 2. We have no access to your phone number
- 3. Capitalization doesn’t matter, but spaces and spelling do
TIPS
Provide information for
peers
Provide information for
elementary students
Provide information for
parents and community
Survey peers
SCOPE Presentations 2011-2012 KXLY The Badge: February 2010 WASA & NWLC Conferences: August 2009 Articles in Spokesman Review, Valley Herald, and EVSD
Express
Yes 92% 92% No 8% 8%
High S h Scho chool Do
- you
- u use
se an an electronic device t to
- tal
alk t to
- famil
ily/ y/frie iends?
468 Students
No 12% 12% Yes 80% 80% N/A 8% 8%
Middle S School
- ol
Do
- you
- u use
se an an electronic device t to
- tal
alk t to
- famil
ily/ y/frie iends?
378 Students
http://www.ua.edu/features/abcsofeducation/cyberbullying.html http://cmlawlibraryblog.classcaster.net/2012/02/14/new-ohio-cyberbullying-law/
Definit initio ion: n: Cyber-bullying: sending or posting harmful material or engaging in other forms of social aggression using the Internet or other digital technologies.
(Nancy Willard, 2007)
ye yes 12% 12% no no 80% 80% N/A 8% 8%
Middle S School
- ol
Hav ave yo you b been b bullie ied
- nline or while
e texting this sc s schoo
- ol y
year ar?
Yes 14% No 83% 83% N/A 3% 3%
High S h Scho chool Hav ave yo you b been b bullie ied
- n
- nline or
- r throu
- ugh
texting t thi his s scho chool year? ?
468 Students 378 Students
Yes 23% 23% No 71 71% N/A 6% 6%
High S h Scho chool Hav ave you
- u sai
said an anything mean an/ h hurtful on
- nline or
- r
while t text xting t this sc schoo
- ol y
year ar?
ye yes 20% 20% no no 72% 72% N/A 8% 8%
Middle S School
- ol
Hav ave you
- u sai
said an anything mean an/hurtful on
- nline or
- r
while t text xting t this sc schoo
- ol y
year ar?
468 Students 378 Students
Created by 2012 EVHS Internet Safety Mentors
- Don’t retaliate and become a bully yourself.
- Stop communicating with the bully by not responding
to any attacks.
- Block the bully from you contact list.
- Save all written communication for proof.
- Tell your parents and a trusted adult at school.
- If necessary contact law enforcement.
Behavior has changed lately Spending dramatically more or less time online Receiving numerous texts or phone calls from
someone they don’t hang out with
Visibly upset after using computer or cell phone Hides or clears computer screen or closes cell phone
when you enter
http://whatsyourstory.trendmicro.com/internet-safety/pg/winners-2011
Loss of Friends/Social Network ISP Drops Account = No High Speed Access
at Home
School Suspension or Expulsion Arrest
Created by 2008 EVHS Internet Safety Mentors
http://wmuv.org/resources/human-exploitation/
Yes 9% 9% No 81% N/A 10%
High S h Scho chool Hav ave you
- u se
sent or received d sexual messa ssages or
- r
pict ctures t thi his s scho chool y year?
Yes 12% 12% No 80% 80% N/A 8% 8%
Middle S School
- ol
Hav ave you s sen ent o
- r rec
eceived ed se sexual m messa ssages or
- r
pictures es th this y yea ear?
468 Students 378 Students
Sending and posting nude or semi-nude photos or
videos starts at a young age! Nat atio ional al Cam Campaig ign S Survey www.TheNationalCampaign.org/sextech
20% of teens (ages 13-16) have sent or posted
Created by 2011 EVMS Internet Safety Mentors
Created by 2012 EVMS & CCS Internet Safety Mentors
Once you send it, you can’t take it back Ask yourself if you are ok with Everyo
yone seeing this
Once you hit send, you’ve lost control over who sees it
http://whatsyourstory.trendmicro.com/internet-safety/pg/winners-2011
How could you share important Cyberbullying and Sexting
information within your work environment?
Yes 44% 4% No 45% 45% N/A 11%
High S h Scho chool Hav ave you
- u sh
shar ared an any perso sonal al i infor
- rmation
- nline or while
e texting this sc s schoo
- ol y
year ar?
Yes 27% No 64% 4% N/A 9% 9%
Middle S School
- ol
Hav ave you
- u sh
shar ared an any perso sonal al i infor
- rmation
- nli
line o
- r while text
xting t this sc schoo
- ol y
year ar?
468 Students 378 Students
Yes 28% 28% No 64% 4% N/A 8% 8%
High S h Scho chool Hav ave you
- u sh
shar ared perso sonal al i infor
- rmation
ab abou
- ut y
you
- ur famil
ily/ y/frie iends
- nline or while
e texting this sc s schoo
- ol y
year ar?
Yes 19 19% No 72% 72% N/A 9% 9%
Middle S School
- ol
Hav ave yo you sh shar ared perso sonal al infor
- rmation
about yo your f famil ily/ y/frie iends
- nline or while
e texting this sc s schoo
- ol y
year ar?
468 Students 378 Students
One in five employers search social networking sites before
hiring
One-third of those said they found information that caused
them to toss out potential candidates
Universities and colleges are also searching sites when
reviewing applications
Many teachers, administrators, and coaches are also
reviewing these sites
“A first impression is no longer a handshake; it’s a Google search, it’s a search on Facebook,” says Dan Schawbel, author of Me 2.0: Build a Powerful Brand to Achieve Career Success and founder of Millenial Branding. “Because all of this information is online, it makes it easier for employers and admissions officers to find out information on candidates.”
Facebook Stat atement of Rights & Responsib ibil ilit itie ies: You own all of the content and information you post on Facebook, and you can control how it is shared through your privacy and application settings. In addition:
- 1. For content that is covered by intellectual property rights, like photos and videos (IP
content), you specifically give us the following permission, subject to your privacy and application settings: you grant us a non-exclusive, transferable, sub-licensable, royalty-free, worldwide license to use any IP content that you post on or in connection with Facebook (IP License). This IP License ends when you delete your IP content or your account unless your content has been shared with others, and they have not deleted it.
- 2. When you delete IP content, it is deleted in a manner similar to emptying the recycle bin on
a computer. However, you understand that removed content may persist in backup copies for a reasonable period of time (but will not be available to others).
- 3. When you use an application, your content and information is shared with the
- application. We require applications to respect your privacy, and your agreement with that
application will control how the application can use, store, and transfer that content and
- information. (To learn more about Platform, read our Privacy Policy and Platform Page.)
- 4. When you publish content or information using the Public setting, it means that you are
allowing everyone, including people off of Facebook, to access and use that information, and to associate it with you (i.e., your name and profile picture).
Over 3 r 3 years l s later, " "dele leted" F Facebook photos are re sti still o
- nl
nline Photos that you think you're deleting from Facebook are still remaining on …
By Jacqui Cheng- Feb 5 2012
The probl blem em: " "delet eted" p photos n nev ever er g go away When we first investigated this phenomenon in 2009, we discovered that photos "deleted" from Facebook seemingly never go away if you have a direct link to the image file on Facebook's
- servers. Users who might have had second thoughts about posting
a photo—
Milli llions o s of A Ameri ricans s ignore re Facebook's p s privacy controls By Laurie Segall- May 4, 2012 NEW YORK (CNNMoney) -- As Facebook barrels toward its IPO, one of its biggest lightening-rod issues -- privacy -- is drawing a fresh spotlight. A Consumer Reports study released this week estimates that 13 million American Facebook users have never set
- r simply don't know about the site's privacy controls.
Online Predators: Justin’s Story - http://www.youtube.com/watch?v=k9a_pmNwpAo
Don’t meet someone you meet online in person without
bringing a trusted adult!
Think about how different sites work
before deciding to join a site.
Post only information that you are
comfortable with others seeing — and knowing — about you.
Choose your friends carefully: What they
post can damage your reputation too!
Reme memb mber t that on
- nce y
you
- u p
post
- st
informat atio ion o n online ine, y you c can' n't take i it back. k.
Have you ever Googled your name with your city, state- What
did you find?
Go home and check PIPL.Com- Look yourself up- What will
you find? Ask the children in your life:
- What type of information do you share on your social networking
sites?
- What do your friends share about you?
Smartphone Geotaggin ing; I Icansta talk lkyou.com Girls A rls Around M Me A App http://www.youtube.com/watch?v=PfBNCsXTZFc
Peer-to
- Peer F
File Sharing S Sites P Pose a BIG R RISK! "If teenagers are file-sharing music or movies (over P2P networks), who knows how many criminals might be sharing the family's personal information, credit cards, bank passwords and social security numbers with scheme operators who buy them." Safwat Fahmy, chairman and chief executive of SafeMedia
Online
ne G Gaming ng C Cheats Malicious Code (Viruses and Spyware have been developed that can run a invisible program on you computer – sealing any and all personal information on that machine.) Identit ity T Thie ieves Target C Chil ildren- July 28, 28, 20 2011 1 Identity theft is on the rise in America, and kids are the latest victims. A recent study shows that children’s identities are being stolen at a rate 50 times greater than that of adults “Child ID theft is a particularly troubling crime because it is often undetected for years,” says director of the FTC’s Bureau of Consumer Protection, David Vladeck.
If learning is an act of exploration then technology equips the explorer for the journey of a lifetime. John Maschuk
ABC News: http://www.youtube.com/watch?v=a4EjrFPAbbY
Brochure created by EVHS student mentors Go to the EVSD ISTEP site
http://www.evsd.org/istep.php
Netsmartz 411- Ask an Expert!
- Netsmartz411.org
Cybertipline- 1-800-843-5678
- www.cybertipline.com