SlideShare une entreprise Scribd logo
1  sur  36
Presented by:
Hector Molina
2
3


       74% of total population (251.7 million) are internet
        users
       87% of youth, aged 12 to 17, are regularly online
       61% of youth, aged 13 to 17, have a personal
        profile on a social networking site
       53% of teens enter chat rooms
       85% of teens use Instant Messaging
       Approximately 4 out of 5 teens own a cell phone
       Nearly 50% of minors, aged 8 to 12, own a cell
        phone
4   CYBERBULLYING
5


       Sending mean, hurtful or threatening
        messages or images about another person
       Posting sensitive, private information about
        another person
       Pretending to be someone else in order to
        make that person look bad
       Intentionally excluding someone from an
        online group
6



       Flaming (bashing)
       Harassment
       Cyberstalking
       Denigration
       Impersonation
       Outing and Trickery
       Exclusion
7


       54% (more than 13 million) of youth, aged 6 to
        17, are or have been targets of cyberbullying
       Victims usually turn into bullies themselves
       Victims usually have thought of committing
        suicide at least once
       Peaks in older grades
       Girls are the primary offenders and victims
       Used as a secondary playground to socialize
8

       Victimization can occur 24/7
       There is no “safe place” to go to
       Messages and images can be distributed worldwide
        and is often irretrievable
       Can solicit the involvement/participation of others
       Cyberbullies do not need to be “big and mean”
       Cyberbullies can be anonymous, making it difficult to
        hold them responsible
       More difficult to prevent or discipline
       Long-term psychological harm may be greater
9


       Low academic performance
       Loneliness
       Humiliation
       Insecurity; low self-esteem
       Emotional and social adjustment issues
       Fear of going to school
       Transfer to another school
       Extreme violent behavior, including murder and
        suicide
10


     They don’t want to…
      Seem weak

      Draw more attention to themselves

      Let others know of their “failure” in school

      Lose online and cell phone privileges
11


        Advise victim not to respond and to block the
         sender, but save messages as evidence
        Report incident to law enforcement if it involves
         threats of violence, extortion, obscene messages,
         harassment, stalking or other unlawful acts and
         contact victim’s parent/guardian
        Check if messages were sent through district’s
         Internet system
        Inform Internet, e-mail or cell phone service provider
         about the content (Handout)
        Provide counseling and/or other necessary mental
         health services for victim and family
12


      Informal sit-downs
      Parent conferences

      Behavior plans

      Prohibition from extracurricular activities

      Suspension/expulsion, or

      Civil/criminal penalties
13


        Bullying generally – Unprovoked aggression,
         often directed repeatedly toward another
         individual or group of individuals
        EC 48900.2 – Sexual Harassment
        EC 48900.3 – Hate Violence
        EC 48900.4 – Harassment, Threats, and
         Intimidation
          Creation   of hostile or offensive environments
14


        Schools may suspend or expel a student who engaged
         in an act of bullying, including bullying committed by
         means of an electronic act directed specifically toward a
         pupil or school personnel [EC 48900(r)]
        Bullying means one or more acts by a pupil or group of
         pupils as defined in EC 48900.2, 48900.3, or 48900.4
         [EC 32261(f)]
        Electronic act means the transmission of a
         communication, including a message, text, sound, or
         image by means of an electronic device, including a
         telephone, wireless telephone or other wireless
         communication device, computer, or pager[EC 32261(g)]
15


     Amends the federal criminal code to impose
     criminal penalties on anyone who transmits in
     interstate or foreign commerce a communication
     intended to coerce, intimidate, harass, or cause
     substantial emotional distress to another person,
     using electronic means to support severe,
     repeated, and hostile behavior.

     Chapter 41 of title 18, United States Code: Extortion and
     Threats
16


     13-year-old Megan Meier established an online
     relationship with a 16-year-old boy who suddenly
     turned against her, writing things like, “I don’t
     know if I want to be friends with you any longer
     because I hear you’re not nice to your friends.”
     Then followed with postings like, “Megan Meier
     is a slut. Megan Meier is fat.” Megan ended up
     committing suicide when he wrote to her saying
     that “the world would be a better place without
     her.” The boy was actually a couple of
     adults, one of which was a 47-year-old neighbor
     whose daughter was a former friend of Megan’s.
17   SEXTING
18




     The act of sending
     sexually explicit
     messages, semi-nude or
     nude photos via cell
     phone cameras and
     messaging features,
     usually between young
     people.
19


        Starts as early as 4th grade, but occurs more
         among teens and young adults
        20% of teens (13-19) and 33% of young adults
         (20-26) had sent nude or semi-nude photographs
         of themselves electronically
        39% of teens and 59% of young adults have sent
         sexually explicit text messages
        38% of youth under 18 years of age have
         received sexual images via text or email
        Girls are usually doing the posting and the
         sending
        It is becoming the #1 disciplinary issue on middle
         and high school campuses
20


        Social networking – more friends
        Courtship…flirtation
        Gift for the significant other
        Peer pressure
        “Safe sex”
          No awkward physical or verbal interaction
          No sex
          No STD
          No unwanted pregnancy
21


        Production/manufacturing = creating
        Distribution/dissemination = sending or
         forwarding
        Possession = keeping
          Receiving is not an offence
          The longer it remains,
           the more serious the offence
22


        Lifetime of embarrassment, leading to
         depression and/or suicide
        Potential target of blackmail and harassment
        Can be a “career killer”
        Expulsion
        Severe legal problems
         5 to 20 years in prison (Federal)
          Up to 3 years in prison and $2,500 fine (State)
          Registered sex offender for a lifetime
23


        Florida. 18-year-old boy was sentenced to 5 years
         probation and required to register as a sex offender after
         he sent a naked photo of his 16-year-old girlfriend, a photo
         she had taken and sent him, to dozens of her friends and
         family after an argument.
        Ohio. Two teenagers were charged with contributing to the
         delinquency of a minor, a first-degree misdemeanor, for
         sending or possessing nude photos on their cell phones of
         two 15-year-old classmates.
        Vermont. An 18-year-old boy was sentenced up to 2 years
         in prison but will serve 90 days after pleading guilty to
         having directed two teenage girls to videotape or
         photograph themselves performing sex acts and send him
         the results.
24   ISSUES IN THE SCHOOLS
25


        Schools often must balance competing interests
         (e.g. students’ free speech or right to privacy
         versus administrators’ need to implement
         education mission, control discipline, and provide
         a safe school environment
        Schools have jurisdiction over acts that are
         related to school activity or school attendance
         while on or off campus
        The majority of cyber misconducts occur off
         campus in students’ homes
        Laws have not caught up with the technology;
         court decisions have been inconsistent
26

        Students may keep highly personal information on
         their cell phones, and can record their most
         private thoughts and conversations.
        Minor students have Fourth Amendment
         rights, and rights under the California
         constitution’s privacy clause, but those rights are
         diminished in a school setting.
        Courts look to balance the student’s expectation
         of privacy against the school’s need to maintain
         safety and order.
        The activities of students on the school campus or
         at school sponsored events are considered
         private and should not be disclosed or shared with
         anyone but authorized persons. [FERPA; EC
         49060]
27


        Student searches must be reasonable…
          Was    the action justified at its beginning?
          Was the extent of the search as conducted
           reasonably related to the circumstances which
           justified the search in the first place?
        Reasonable grounds must exist for suspecting
         that the search will turn up evidence that the
         student has violated or is violating either the
         law or school policy.
28


        Clear expectations
        Use of influence versus authority
        Appropriate and consistent response to
         incidents
        Who is authorized to respond?
        What perception does the school/ district want
         to create regarding responsibility for regulating
         cyberspace activity?
29



     Because off-campus
     student websites involve a
     fundamental right and
     because this area of law is
     evolving, it is
     recommended that districts
     consult with counsel prior to
     applying discipline and
     when developing policy.
30   EDUCATION
31

        Make “real” friends
        Don’t post pictures or identifiable information on the
         internet (i.e. full name, date of birth, address, school,
         detailed description of self)
        Don’t share hobbies, habits and hangouts
        Don’t be too trusting…nothing is private, and not
         everything is true
        Block and ignore hate messages, but save messages
         as evidence
        Stop and think of the consequences
        Seek help
32

     Be involved in your children’s lives in and out of
     school…
      Spend quality time with them

      Enrich their lives; take them places

      Model good habits/behaviors and ways to handle
       difficult situations
      Build trust and open lines of communication

      Let them know how to reach you any time of the day

      Participate in school activities/events

      Know who their friends are in school and online

      Know what they are doing

      Know when they are not acting their normal self
33


        Know the capabilities of all the technology that is
         accessible to your children
        Set clear guidelines of computer and cell phone
         usage and consequences for any violations
        Monitor and check the computer and cell phone
         on a random but consistent basis with your child
         present
        Google your child’s name once in a while
        Never allow your children to lock themselves in
         their bedrooms alone for long periods of time
        Discuss the difference between private and public
34


        District policy and school rules
        Enforcement of district policy and school rules
        Proper search and seizure policy and
         procedures
        Appropriate response on and off campus
        Appropriate teacher-student communication
         via cell phones, e-mails, social networking
         sites, etc.
35
36




      Hector J. Molina
       530-681-0279

     hector.molina@wjusd.org

Contenu connexe

Tendances (20)

Pre-Conference: Relevant Ethics and Court Cases
Pre-Conference: Relevant Ethics and Court CasesPre-Conference: Relevant Ethics and Court Cases
Pre-Conference: Relevant Ethics and Court Cases
 
Sexting?What would your Grandma Think?
Sexting?What would your Grandma Think?Sexting?What would your Grandma Think?
Sexting?What would your Grandma Think?
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
Digital Dating Abuse
Digital Dating AbuseDigital Dating Abuse
Digital Dating Abuse
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´MooreCyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
 
Sexting
SextingSexting
Sexting
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
MJ Cyber-bullying
MJ Cyber-bullyingMJ Cyber-bullying
MJ Cyber-bullying
 
Juvenile delinquency
Juvenile delinquencyJuvenile delinquency
Juvenile delinquency
 
Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jf
 
Don't be invisible
Don't be invisibleDon't be invisible
Don't be invisible
 
Initial ideas
Initial ideasInitial ideas
Initial ideas
 
Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence
 
022010
022010022010
022010
 

En vedette

Stempresbdofed315
Stempresbdofed315Stempresbdofed315
Stempresbdofed315Jim Forde
 
Astros del universo
Astros del universoAstros del universo
Astros del universoMaruja Ruiz
 
El sistema solar y sus componentes
El  sistema  solar y sus componentesEl  sistema  solar y sus componentes
El sistema solar y sus componentesUnicaxsiemprefer
 
El sistema solar y sus componentes
El  sistema  solar y sus componentesEl  sistema  solar y sus componentes
El sistema solar y sus componentesUnicaxsiemprefer
 
Los Astros Del Sistema Solar
Los Astros Del Sistema SolarLos Astros Del Sistema Solar
Los Astros Del Sistema Solarbuenaventura
 
Power Point Los Planetas
Power Point  Los PlanetasPower Point  Los Planetas
Power Point Los Planetasfloresayl
 
Presentación1. el sistema solar
Presentación1. el sistema solarPresentación1. el sistema solar
Presentación1. el sistema solarGerardonicolasm
 
El Sistema Solar - Educación Primaria
El Sistema Solar - Educación PrimariaEl Sistema Solar - Educación Primaria
El Sistema Solar - Educación PrimariaEscobilla8
 
Sistema solar primaria
Sistema solar primariaSistema solar primaria
Sistema solar primariaprinzzecita
 

En vedette (12)

Stempresbdofed315
Stempresbdofed315Stempresbdofed315
Stempresbdofed315
 
bluesens
bluesensbluesens
bluesens
 
Pintores de estrellas(1)
Pintores de estrellas(1)Pintores de estrellas(1)
Pintores de estrellas(1)
 
Astros del universo
Astros del universoAstros del universo
Astros del universo
 
El sistema solar y sus componentes
El  sistema  solar y sus componentesEl  sistema  solar y sus componentes
El sistema solar y sus componentes
 
El sistema solar y sus componentes
El  sistema  solar y sus componentesEl  sistema  solar y sus componentes
El sistema solar y sus componentes
 
Los Astros Del Sistema Solar
Los Astros Del Sistema SolarLos Astros Del Sistema Solar
Los Astros Del Sistema Solar
 
Power Point Los Planetas
Power Point  Los PlanetasPower Point  Los Planetas
Power Point Los Planetas
 
Presentación1. el sistema solar
Presentación1. el sistema solarPresentación1. el sistema solar
Presentación1. el sistema solar
 
El Sistema Solar - Educación Primaria
El Sistema Solar - Educación PrimariaEl Sistema Solar - Educación Primaria
El Sistema Solar - Educación Primaria
 
Sistema solar primaria
Sistema solar primariaSistema solar primaria
Sistema solar primaria
 
Sistema solar
Sistema solarSistema solar
Sistema solar
 

Similaire à What administrators should_know_about_cyberspace_misconduct

Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28thDoctora2017
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullyingsepulvedamd
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28thJohn Field
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying John Field
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying PresentationMegan Townes
 
Social Media and its effects on youth
Social Media and its effects on youthSocial Media and its effects on youth
Social Media and its effects on youthAbhishek Jain
 
Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Karen Brooks
 

Similaire à What administrators should_know_about_cyberspace_misconduct (20)

Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Student Cyber Bullying Presentation
Student Cyber Bullying PresentationStudent Cyber Bullying Presentation
Student Cyber Bullying Presentation
 
Cyberbullying for Teachers
Cyberbullying for TeachersCyberbullying for Teachers
Cyberbullying for Teachers
 
Social Media and its effects on youth
Social Media and its effects on youthSocial Media and its effects on youth
Social Media and its effects on youth
 
Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31
 

Plus de Jim Forde

Socialmedianewtchrs82217
Socialmedianewtchrs82217Socialmedianewtchrs82217
Socialmedianewtchrs82217Jim Forde
 
Ge 2017 summer conf sponsor info
Ge 2017 summer conf sponsor infoGe 2017 summer conf sponsor info
Ge 2017 summer conf sponsor infoJim Forde
 
MMS Orientation pp 2016 17
MMS Orientation pp 2016 17MMS Orientation pp 2016 17
MMS Orientation pp 2016 17Jim Forde
 
Cte april conference
Cte april conferenceCte april conference
Cte april conferenceJim Forde
 
Genetics1415
Genetics1415Genetics1415
Genetics1415Jim Forde
 
B 111pulssedata
B 111pulssedataB 111pulssedata
B 111pulssedataJim Forde
 
Studyingppl h bnb9815
Studyingppl h bnb9815Studyingppl h bnb9815
Studyingppl h bnb9815Jim Forde
 
Socialmedianewtchrs815
Socialmedianewtchrs815Socialmedianewtchrs815
Socialmedianewtchrs815Jim Forde
 
Gr 7 honors science final review 2015 filled in
Gr 7 honors science final review 2015  filled inGr 7 honors science final review 2015  filled in
Gr 7 honors science final review 2015 filled inJim Forde
 
Plate tectonics review sheet
Plate tectonics review sheetPlate tectonics review sheet
Plate tectonics review sheetJim Forde
 
Platetectonics review
Platetectonics reviewPlatetectonics review
Platetectonics reviewJim Forde
 
Gen test review 2015
Gen test review   2015Gen test review   2015
Gen test review 2015Jim Forde
 
Punnett square Review - Oompah Gen.
Punnett square Review - Oompah Gen.Punnett square Review - Oompah Gen.
Punnett square Review - Oompah Gen.Jim Forde
 
Midtermreviewanswers15
Midtermreviewanswers15Midtermreviewanswers15
Midtermreviewanswers15Jim Forde
 
Racecaroutlinefoodpres
RacecaroutlinefoodpresRacecaroutlinefoodpres
RacecaroutlinefoodpresJim Forde
 
Racecarframefoodpres
RacecarframefoodpresRacecarframefoodpres
RacecarframefoodpresJim Forde
 
Food preservation l8
Food preservation l8Food preservation l8
Food preservation l8Jim Forde
 
Cell bio vocab (1)
Cell bio vocab (1)Cell bio vocab (1)
Cell bio vocab (1)Jim Forde
 
Cell unit review complete
Cell unit review    completeCell unit review    complete
Cell unit review completeJim Forde
 

Plus de Jim Forde (20)

Socialmedianewtchrs82217
Socialmedianewtchrs82217Socialmedianewtchrs82217
Socialmedianewtchrs82217
 
Ge 2017 summer conf sponsor info
Ge 2017 summer conf sponsor infoGe 2017 summer conf sponsor info
Ge 2017 summer conf sponsor info
 
MMS Orientation pp 2016 17
MMS Orientation pp 2016 17MMS Orientation pp 2016 17
MMS Orientation pp 2016 17
 
Cte april conference
Cte april conferenceCte april conference
Cte april conference
 
Genetics1415
Genetics1415Genetics1415
Genetics1415
 
B 111pulssedata
B 111pulssedataB 111pulssedata
B 111pulssedata
 
Studyingppl h bnb9815
Studyingppl h bnb9815Studyingppl h bnb9815
Studyingppl h bnb9815
 
Socialmedianewtchrs815
Socialmedianewtchrs815Socialmedianewtchrs815
Socialmedianewtchrs815
 
Gr 7 honors science final review 2015 filled in
Gr 7 honors science final review 2015  filled inGr 7 honors science final review 2015  filled in
Gr 7 honors science final review 2015 filled in
 
Plate tectonics review sheet
Plate tectonics review sheetPlate tectonics review sheet
Plate tectonics review sheet
 
Platetectonics review
Platetectonics reviewPlatetectonics review
Platetectonics review
 
Genreview
GenreviewGenreview
Genreview
 
Gen test review 2015
Gen test review   2015Gen test review   2015
Gen test review 2015
 
Punnett square Review - Oompah Gen.
Punnett square Review - Oompah Gen.Punnett square Review - Oompah Gen.
Punnett square Review - Oompah Gen.
 
Midtermreviewanswers15
Midtermreviewanswers15Midtermreviewanswers15
Midtermreviewanswers15
 
Racecaroutlinefoodpres
RacecaroutlinefoodpresRacecaroutlinefoodpres
Racecaroutlinefoodpres
 
Racecarframefoodpres
RacecarframefoodpresRacecarframefoodpres
Racecarframefoodpres
 
Food preservation l8
Food preservation l8Food preservation l8
Food preservation l8
 
Cell bio vocab (1)
Cell bio vocab (1)Cell bio vocab (1)
Cell bio vocab (1)
 
Cell unit review complete
Cell unit review    completeCell unit review    complete
Cell unit review complete
 

What administrators should_know_about_cyberspace_misconduct

  • 2. 2
  • 3. 3  74% of total population (251.7 million) are internet users  87% of youth, aged 12 to 17, are regularly online  61% of youth, aged 13 to 17, have a personal profile on a social networking site  53% of teens enter chat rooms  85% of teens use Instant Messaging  Approximately 4 out of 5 teens own a cell phone  Nearly 50% of minors, aged 8 to 12, own a cell phone
  • 4. 4 CYBERBULLYING
  • 5. 5  Sending mean, hurtful or threatening messages or images about another person  Posting sensitive, private information about another person  Pretending to be someone else in order to make that person look bad  Intentionally excluding someone from an online group
  • 6. 6  Flaming (bashing)  Harassment  Cyberstalking  Denigration  Impersonation  Outing and Trickery  Exclusion
  • 7. 7  54% (more than 13 million) of youth, aged 6 to 17, are or have been targets of cyberbullying  Victims usually turn into bullies themselves  Victims usually have thought of committing suicide at least once  Peaks in older grades  Girls are the primary offenders and victims  Used as a secondary playground to socialize
  • 8. 8  Victimization can occur 24/7  There is no “safe place” to go to  Messages and images can be distributed worldwide and is often irretrievable  Can solicit the involvement/participation of others  Cyberbullies do not need to be “big and mean”  Cyberbullies can be anonymous, making it difficult to hold them responsible  More difficult to prevent or discipline  Long-term psychological harm may be greater
  • 9. 9  Low academic performance  Loneliness  Humiliation  Insecurity; low self-esteem  Emotional and social adjustment issues  Fear of going to school  Transfer to another school  Extreme violent behavior, including murder and suicide
  • 10. 10 They don’t want to…  Seem weak  Draw more attention to themselves  Let others know of their “failure” in school  Lose online and cell phone privileges
  • 11. 11  Advise victim not to respond and to block the sender, but save messages as evidence  Report incident to law enforcement if it involves threats of violence, extortion, obscene messages, harassment, stalking or other unlawful acts and contact victim’s parent/guardian  Check if messages were sent through district’s Internet system  Inform Internet, e-mail or cell phone service provider about the content (Handout)  Provide counseling and/or other necessary mental health services for victim and family
  • 12. 12  Informal sit-downs  Parent conferences  Behavior plans  Prohibition from extracurricular activities  Suspension/expulsion, or  Civil/criminal penalties
  • 13. 13  Bullying generally – Unprovoked aggression, often directed repeatedly toward another individual or group of individuals  EC 48900.2 – Sexual Harassment  EC 48900.3 – Hate Violence  EC 48900.4 – Harassment, Threats, and Intimidation  Creation of hostile or offensive environments
  • 14. 14  Schools may suspend or expel a student who engaged in an act of bullying, including bullying committed by means of an electronic act directed specifically toward a pupil or school personnel [EC 48900(r)]  Bullying means one or more acts by a pupil or group of pupils as defined in EC 48900.2, 48900.3, or 48900.4 [EC 32261(f)]  Electronic act means the transmission of a communication, including a message, text, sound, or image by means of an electronic device, including a telephone, wireless telephone or other wireless communication device, computer, or pager[EC 32261(g)]
  • 15. 15 Amends the federal criminal code to impose criminal penalties on anyone who transmits in interstate or foreign commerce a communication intended to coerce, intimidate, harass, or cause substantial emotional distress to another person, using electronic means to support severe, repeated, and hostile behavior. Chapter 41 of title 18, United States Code: Extortion and Threats
  • 16. 16 13-year-old Megan Meier established an online relationship with a 16-year-old boy who suddenly turned against her, writing things like, “I don’t know if I want to be friends with you any longer because I hear you’re not nice to your friends.” Then followed with postings like, “Megan Meier is a slut. Megan Meier is fat.” Megan ended up committing suicide when he wrote to her saying that “the world would be a better place without her.” The boy was actually a couple of adults, one of which was a 47-year-old neighbor whose daughter was a former friend of Megan’s.
  • 17. 17 SEXTING
  • 18. 18 The act of sending sexually explicit messages, semi-nude or nude photos via cell phone cameras and messaging features, usually between young people.
  • 19. 19  Starts as early as 4th grade, but occurs more among teens and young adults  20% of teens (13-19) and 33% of young adults (20-26) had sent nude or semi-nude photographs of themselves electronically  39% of teens and 59% of young adults have sent sexually explicit text messages  38% of youth under 18 years of age have received sexual images via text or email  Girls are usually doing the posting and the sending  It is becoming the #1 disciplinary issue on middle and high school campuses
  • 20. 20  Social networking – more friends  Courtship…flirtation  Gift for the significant other  Peer pressure  “Safe sex”  No awkward physical or verbal interaction  No sex  No STD  No unwanted pregnancy
  • 21. 21  Production/manufacturing = creating  Distribution/dissemination = sending or forwarding  Possession = keeping  Receiving is not an offence  The longer it remains, the more serious the offence
  • 22. 22  Lifetime of embarrassment, leading to depression and/or suicide  Potential target of blackmail and harassment  Can be a “career killer”  Expulsion  Severe legal problems 5 to 20 years in prison (Federal)  Up to 3 years in prison and $2,500 fine (State)  Registered sex offender for a lifetime
  • 23. 23  Florida. 18-year-old boy was sentenced to 5 years probation and required to register as a sex offender after he sent a naked photo of his 16-year-old girlfriend, a photo she had taken and sent him, to dozens of her friends and family after an argument.  Ohio. Two teenagers were charged with contributing to the delinquency of a minor, a first-degree misdemeanor, for sending or possessing nude photos on their cell phones of two 15-year-old classmates.  Vermont. An 18-year-old boy was sentenced up to 2 years in prison but will serve 90 days after pleading guilty to having directed two teenage girls to videotape or photograph themselves performing sex acts and send him the results.
  • 24. 24 ISSUES IN THE SCHOOLS
  • 25. 25  Schools often must balance competing interests (e.g. students’ free speech or right to privacy versus administrators’ need to implement education mission, control discipline, and provide a safe school environment  Schools have jurisdiction over acts that are related to school activity or school attendance while on or off campus  The majority of cyber misconducts occur off campus in students’ homes  Laws have not caught up with the technology; court decisions have been inconsistent
  • 26. 26  Students may keep highly personal information on their cell phones, and can record their most private thoughts and conversations.  Minor students have Fourth Amendment rights, and rights under the California constitution’s privacy clause, but those rights are diminished in a school setting.  Courts look to balance the student’s expectation of privacy against the school’s need to maintain safety and order.  The activities of students on the school campus or at school sponsored events are considered private and should not be disclosed or shared with anyone but authorized persons. [FERPA; EC 49060]
  • 27. 27  Student searches must be reasonable…  Was the action justified at its beginning?  Was the extent of the search as conducted reasonably related to the circumstances which justified the search in the first place?  Reasonable grounds must exist for suspecting that the search will turn up evidence that the student has violated or is violating either the law or school policy.
  • 28. 28  Clear expectations  Use of influence versus authority  Appropriate and consistent response to incidents  Who is authorized to respond?  What perception does the school/ district want to create regarding responsibility for regulating cyberspace activity?
  • 29. 29 Because off-campus student websites involve a fundamental right and because this area of law is evolving, it is recommended that districts consult with counsel prior to applying discipline and when developing policy.
  • 30. 30 EDUCATION
  • 31. 31  Make “real” friends  Don’t post pictures or identifiable information on the internet (i.e. full name, date of birth, address, school, detailed description of self)  Don’t share hobbies, habits and hangouts  Don’t be too trusting…nothing is private, and not everything is true  Block and ignore hate messages, but save messages as evidence  Stop and think of the consequences  Seek help
  • 32. 32 Be involved in your children’s lives in and out of school…  Spend quality time with them  Enrich their lives; take them places  Model good habits/behaviors and ways to handle difficult situations  Build trust and open lines of communication  Let them know how to reach you any time of the day  Participate in school activities/events  Know who their friends are in school and online  Know what they are doing  Know when they are not acting their normal self
  • 33. 33  Know the capabilities of all the technology that is accessible to your children  Set clear guidelines of computer and cell phone usage and consequences for any violations  Monitor and check the computer and cell phone on a random but consistent basis with your child present  Google your child’s name once in a while  Never allow your children to lock themselves in their bedrooms alone for long periods of time  Discuss the difference between private and public
  • 34. 34  District policy and school rules  Enforcement of district policy and school rules  Proper search and seizure policy and procedures  Appropriate response on and off campus  Appropriate teacher-student communication via cell phones, e-mails, social networking sites, etc.
  • 35. 35
  • 36. 36 Hector J. Molina 530-681-0279 hector.molina@wjusd.org