“Stop harassing me” Cyber Bullying- What is it, and what can we do to stop it.

Slides:



Advertisements
Similar presentations
Sporting Violence Sgt Andy Gosling Sgt Mardi Foweraker Crime Prevention Section Western Adelaide Local Service Area SAPOL.
Advertisements

Sporting Violence Sgt Andy Gosling Sgt Mardi Foweraker Crime Prevention Section Western Adelaide Local Service Area SAPOL.
ESafety 92% of secondary school children have had experience of being cyber-bullied (NFER eSafety report, 2012)
Haygrove School – E Safety Induction E Safety Update #protecting your professional identity.
Cyberbullying Strategy
E-safety is a way to stay safe on the internet and recognise situations which could mean trouble.
Being Good Digital Citizens with Today’s Technologies.
E-Safety and cyberbullying. What actually is E-Safety? E-Safety is the safe and responsible use of mobile phones, tables and kindles and other pieces.
Safety on the Internet Chat Rooms. The Things to do to keep safe when using the Chat Rooms Use a different name Don’t do anything that you want to do.
Texas Code of Criminal Procedure. Terminal Objective Upon completion of this module, the participant will be knowledgeable about the sections of the Code.
Cyber Bullying Everything you need to know. How is it different from normal bullying? By using technology like mobiles or the internet, this type of bullying.
What is it? The use of phones or the internet to deliberately upset someone else.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
Forms of Cyberbullying
Internet Safety Cyber Bullying. Berks County District Attorney Mark C. Baldwin said, “They have found a way to enter your home, enter your child’s bedroom.
Student Code of Conduct Revision Process Student Code of Conduct Committee Assistant principals, parents, interventionists, AEA representatives.
Internet Safety & Cyber Bullying
Cyber-Bullying By Hemani and Moni.
Cyber Bullying Presented by Detective Toth A Guide For Parents, Students and Teachers Tonawanda Middle School.
The Internet is Forever
R8 Cyber-bullying.
Preventing and dealing with sexual harassment: for volunteers Your organisation here.
Cyber Bullying Miss. Housley October 4, National Education Technology Standards Digital Citizenship Students understand human, cultural, and societal.
Harsher Punishments for Cyberbullies By: Janeca Latore Section 001.
3.1 – Police Powers – Questioning Suspects  suspect/2008/02/25/ html.
CYBERBULLYING Session 3: How to cope with Cyberbullying How to keep safe in Cyberspace Compiled by Ed Gallagher Kirklees Youth Offending Team.
Cyberbullying Brittany Benningfield EDF 204 Spring 2015.
CYBERBULLYING Hopkins School Guidance Program.
Use kind words, help when you can, share and take turns, listen to what others have to say, be honest and truthful, think before you speak out, remember.
Internet Safety Part II CyberBullying. Judson Independent School District … strives to provide a safe, positive learning environment for students in our.
1 Is it illegal or unsuitable? SID 2013 quiz for adults who work/volunteer with children, young people and vulnerable adults © e-Safer.
1 Is it illegal or unsuitable? SID 2013 quiz for parents and carers © e-Safer Suffolk 2013.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
Unit 4 Lesson 6 Electronic Aggression. Opening Work: Reflection Question: How might a DUI conviction impact a person’s life? What did you discover about.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
Cyberbullying Online Social Aggression Guidelines for Educators.
SEXTING. Is this ever ok? (click Yes, No or Maybe TWICE as applicable) 1. Sending a sexually explicit selfie at age Sending a sexually explicit.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Bullying and Harassment Be a hero, take a STAND Speak out against bullying Tell an adult when you see someone being bullied Always set a good example.
BULLYING PREVENTION Cyber Bullying. WHAT IS CYBER BULLYING? Cyber Bullying is using technology such as computers, cell phones and other electronic means.
What is it? & What can I do to prevent it?. Cyber bullying is when somebody is teasing, taunting, or harassing someone else over the computer. Whether.
AGES OF CRIMINAL RESPONSIBILITY The Youth Justice System.
 Cyber Bullying is the use of technology to either bully, embarrass, harass or threaten another.  Some example of technology include:  Instant Messaging.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
Activity 2 Sharing Images – The Law. Sexting
Cyberbullying. What is cyberbullying?  "the use of information and communication technologies to support deliberate, repeated, and hostile behavior by.
Cyberbullying and the First Amendment Community Legal Education Program Nebraska College of Law.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
Canada’s Justice System Chapter 2 Review. No one, no matter how important or powerful, is above the law - not the government; not the Prime Minister;
Sexting Risks and Consequences Upper Secondary Students.
WHEN SHARING IS NOT CARING: INTERNET ETHICS By Baikgopodi “Bai” Ditiso Presented at CLTD– 09 May 2016.
E-SAFETY (USING THE INTERNET AND MOBILES SENSIBLY AND SAFELY)
School Board Policy Draft Bullying and Harassment School Year
1. Block the bully's access to your online accounts Perhaps the easiest way to stop cyber bullies is to block the bully's access to your online accounts.
CYBERBULLYING Session 3: How to cope with Cyberbullying
Electronic Devices Policy
Bullying….. It is a serious offense!.
How many of these apps do you really know?
● SmartLaw Sexting and the Law.
CYBERBULLYING.
Sexting What is meant by sexting?.
How to manage the Electronic Signature Process
Teaching our children the safe and responsible use of ALL technology.
Harmful Digital Communications Act 2015 URLs
KEEP SAFE I will NOT give out personal information: Name -- create a screen name Address Phone number Password School address Pictures.
Issues With Internet in College
Sexting and the Law.
STAYING SAFE WITH TECHNOLOLGY View the following presentation and try to click on the correct answers of the slides with questions.
Hiding Behind a Screen Project Safety 7th grade
Juvenile Justice It’s all about you!.
Presentation transcript:

“Stop harassing me” Cyber Bullying- What is it, and what can we do to stop it

Cyber Bullying Using technological devices and programs to bully others - Phone calls - Text messages - Facebook - Myspace - Twitter

What kinds of messages are bullying? Menacing, threatening and/or offensive messages What do YOU think this means?

What can we do? -“Stop Harassing Me” postcard -Allows students and the school community to take a pro-active approach to cyber-bullying -Allows YOU, the student, to inform the bully in a safe and legal way that the messages are illegal and that you want them to stop

Criteria for Postcard use Can only be used by a student who: 1.Has received menacing, threatening and/or offensive messages, via text, voic or internet (with evidence); 2.Can identify the cyber-bully and the school they attend; 3.Wants the messages to stop. DON’T RESPOND!!!!! The Postcard can not be used to address verbal and/or physical assaults.

How does the Postcard work? If you believe that you have been cyber-bullied, you can approach your deputy/principal, and show them the messages you have received If your deputy/principal believes these messages meet the criteria, you will then be offered the opportunity to complete a Postcard.

How does it work continued You then write on the Postcard: 1.Who has been sending you the messages 2.What school that person attends 3.The time and date of the offensive message or the most offensive message received (if more than one) 4.Your name 5.Your signature Your involvement at this stage is now finished- Parent/guardian will be advised.

How does it work continued Your deputy/principal then meets with the cyber- bully to caution them on their behaviour The deputy/principal and the cyber-bully will then also write their names on, and sign, the Postcard, to acknowledge that they have been spoken to about this The signed Postcard is photocopied and a copy in both student’s files is kept by the school to use if a breach occurs

Consequences on breaching the Postcard What do YOU think they are?

You can be charged! Commonwealth Criminal Code Act 1995 (Section ) Using a carriage service to menace, harass or cause offence (1)A person is guilty of an offence if: (a)The person uses a carriage service; and (b)The person does so in a way (whether by the method of use or the content of a communication or both) that reasonable persons would regard as being, in all the circumstances, menacing, harassing or offensive Maximum Penalty: Imprisonment for 3 years

The Postcard assists in charging the cyber-bully, by proving that the cyber-bully: - Has been asked to stop the offensive behaviour, and that they have chosen to ignore that request, -Knew they were committing an offence, -Knew what law they were breaking, -Knew that Police could become involved if they continued in the offending behaviour.

Consequences of a criminal record What do YOU think having a criminal record will mean to YOU?

Any questions? Constable Joanna WRIGHT Ayr Police: Queen Street, Ayr