Education Archiving, Internet & Social Media Monitoring

Slides:



Advertisements
Similar presentations
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
What is it? The use of phones or the internet to deliberately upset someone else.
NICOLE STACEY, MSW, LISW-S MENTAL HEALTH SPECIALIST BRUNSWICK HIGH SCHOOL Social Media and Your Teen.
Compliance, eDiscovery, Continuity and Migration made easy with SaaS Archiving Warren Roy, President & CEO, Global Relay.
Social Networking: What You Don’t Know Can Hurt You Jim Hilsenrod.
Harmless Joke or Cyber-Bullying?
Smart Technology Policy for Districts Dennis Small, Director of Educational Technology, OSPI WSSDA Conference November 22, 2013.
Stop Cyberbullying By Hayden Jordan and Arman. Table of contents  Anonymity  Pseudonym  Flaming  Cyber stalking  Exclusion  Harassment  Masquerading.
Cyberbullying A new and dangerous phenomenon. What is Cyberbullying? “Cyberbullying involves the use of information and communication technologies to.
Cyber and Internet Safety El Rodeo School September 11, 2013.
Cyber Bullying i-SAFE survey of 150,000 high school students 57% said hurtful or angry things to another person, had someone say hurtful or angry.
Bullying Behind the Screen
REVENGE PORN ROUNDTABLE 5 TH SEPTEMBER WHAT IS REVENGE PORN?  Revenge porn is when a partner or ex-partner shares images of sexual nature without.
EDiscovery and Records Management. Records Management- Historical Perspective- Paper Historically- Paper was the “Corporate Memory” – a physical entity.
September 9, 2009 Michael W. McKeehan Executive Director, Internet & Technology Policy Online Safety: Protecting Consumers.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Internet Safety for You and Your Students A presentation for the North Woods Partnership By Edie Miles February 7, 2007 The quote below is adapted from.
LittleOrange Internet Security an Endpoint Security Appliance.
Youth and the Internet Info for Parents. Internet: Strengths and Weaknesses Internet is the free exchange of ideas Little to no regulation on information.
Jana Dixon Dawson Educational Cooperative
Introduction Online gaming Webcams and videos File sharing , IM, and chat rooms Social networking.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
“WHAT YOUR KIDS ALREADY KNOW” Christina Hefele Darien Public Schools Technology Coordinator January 18, 2012 My Blog:
© ContentWatch, Inc. All rights reserved. 2.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
CYBERBULLYING AND ONLINE SAFETY
Credit unions use social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Digital Citizenship Texting vs. Sexting Cyberbullying.
2 EVE&feature=player_detailpage.
W HAT IS B ULLYING ?  An intentional act of aggression or series of acts that occur in a school setting  Persistent or pervasive  Directed at another.
Cyber Bullying Challenges for Educators, Legal issues, and Advice for Students and Parents.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Parenting in the Internet Age Tips for Keeping Kids Safe and you Connected to your Teen.
Rage Reaction: What do you know about cyber-bullying?
Internet Safety By: Cindy Price. Internet Safety Education 1. Understand Internet Practices 2. Understand the Dangers 3. Understand the Law 4. Raise Awareness.
By: Zach Oltmanns.
Berkeley Unified School District Preventing Cyberbullying.
KYLE GEORGE JULY 3 RD 2014 EDU-384. DO NOT SHARE ANY PERSONAL INFORMATION ONLINE: NAME, ADDRESS, CITY, STATE OR PHONE NUMBER SOCIAL SECURTIY NUMBER ANY.
+ netiquette. + Objectives Understand the meaning of the term “Digital Citizen” Demonstrate an understanding of the need to practice cyber safety, cyber.
Berkeley Unified School District Cyber Savvy social networking and netiquette.
Cyber Bullying. ~ instant messaging ~ digital photos ~ cell phones ~ computers ~ web pages ~ social networks ~ ~ instant messaging ~ digital.
Internet Safety & Digital Citizenship Awareness and Education Larry Magid Co-director, ConnectSafely.org Founder, Safekids.com CBS News/CNET Lynette Owens.
CYBER-BULLYING By Jesse Bolan The Effects, the Turmoil, the Destruction.
Beloit Memorial High School PBIS Cyberbullying. Beloit Memorial Expectations.
PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes.
Policy and Procedures IJND – Appropriate Use of Technology for Students Student Responsibility Exercise good judgement while using digital resources All.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Special Project Cyber bullying Issues By: Abby Heim.
How to be E-safe Objective To know how to use Technology responsibly in today’s world. Outcome To create a Responsible use of Technology poster suitable.
INTRODUCTION  netCORE offers 360 degree digital communication solutions Messaging and Mobility  Pioneers in Linux based mailing solution and catering.
CLOUD VIRTUALIZATION MLArchiver for vCloud Air Archiving | eDiscovery | Records Management | Analytics Stephen Catanzano August.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
Compliance for IBM Connections Cinthia Shields Director, Business Development-IBM Partner Manager
Quotation about Anger and Violence. “Violence kills so many Americans and sends so many others into the healthcare system that we must consider it a public.
CLOUD VIRTUALIZATION MLArchiver for vCloud Air Archiving | eDiscovery | Records Management | Analytics Stephen Catanzano August.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
E-SAFETY (USING THE INTERNET AND MOBILES SENSIBLY AND SAFELY)
Cyber and Internet Safety (Parents’ Night)
Moraitis School English Department made by: Panagiotis Giannis, Stelios Laliotis, Nicolas Kalyvas, Manos Giavridis.
Cyberbullying BY LORD MUSHANGO.
Carroll County Schools Advisement
Teaching Internet Safety
Cyber Bullying Among American Teenagers
Internet Safety and Acceptable Use Policies.
Priscilla Patterson 8th grade Mrs.Sellers
Teaching our children the safe and responsible use of ALL technology.
Issues With Internet in College
Social Media & Cell Phones What RCS Parents Need to Know
Presentation transcript:

Education Archiving, Internet & Social Media Monitoring Welcome everyone to the GWAVA webinar Education Archiving... Internet & Social Media Monitoring... Who needs it? You Need It! Today, I’ve got excellent information for you about archiving and monitoring ALL communications, why your organization should do it and how you can do it effectively with GWAVA. Mike Silverman Director of Sales GWAVA mikes@GWAVA.com Education Archiving, Internet & Social Media Monitoring

Agenda Retain Unified Archive Why Archive Communications The Need for Monitoring GWAVA Solutions Next Steps Today we will be discussing: the need for archiving communications; why it is essential to monitor internet traffic, email and social media communications; and, the tools and the solutions that GWAVA provides. So, let’s get started. © GWAVA Inc, Confidential & Proprietary

Why Monitor & Archive? Violent Behavior Cyber-bullying & Harassment 42% of teenagers with tech access cyber-bullied Cyber-bullying & Harassment Dangerous Situations 1 in 3 kids have been threatened online Violent Behavior 3 million children are absent because of bullying Inappropriate, malicious or harmful content Let’s start by talking about why you should monitor and archive email, social media and internet traffic: The threats to your students and school are real and ever-increasing. Some of these threats include: Cyber-bullying and harassment. Here are some findings from a recent survey: 42% of teenagers with tech access report being cyberbullied over the past year One in three kids have been threatened online Three million children are absent from school each month because of bullying Inappropriate, malicious or harmful content Violent or dangerous incidents © GWAVA Inc, Confidential & Proprietary

Regulation Compliance FINRA, SEC, MiFID, FSA Archiving Regulations FRCP HIPAA, HITECH Various State Laws Freedom of Information Act Sunshine Laws FERPA Now, let’s begin by talking about why you need to archive. There are the specific government regulations that are specific to educational organizations that apply to archiving electronic communications. You need to be sure that you understand and comply with these regulations. Failure to do so can lead to litigation, fines and sanctions. These regulations include: Family Education Rights and Privacy Act (FERPA) Freedom of Information Act State Sunshine Laws © GWAVA Inc, Confidential & Proprietary

Statistics The Enterprise Strategy Group has found that 46% of organizations have had an eDiscovery request in the past 12 months. 46%! © GWAVA Inc, Confidential & Proprietary

Statistics Furthermore, 75% of global companies will have to produce messages for eDiscovery by the end of this year. If your school has not had to deal with eDiscovery, it is more than likely that you will sooner rather than later. © GWAVA Inc, Confidential & Proprietary

In 2008, Michael Osterman predicted, “it’s not a matter of IF, but WHEN.” eDiscovery and electronic communications litigation is inevitably coming to your organization In 2008, Michael Osterman of Osterman Research predicted, “it’s not a matter of If, but when.” From his research about the legal email archiving trend, Osterman has concluded that eDiscovery and email litigation is inevitably coming to your business. © GWAVA Inc, Confidential & Proprietary

The Real Costs Archiving is no longer a COST of doing business… …but a cost SAVINGS With these stats, case studies and regulations, it is apparent that archiving is about saving the costs associated with litigation and eDiscovery. Not only that, but archiving helps ensure that your day to day business communications are preserved and that you comply with regulations to avoid penalties, fines and sanctions. © GWAVA Inc, Confidential & Proprietary

Demand for Archiving NICE to Have NEED to Have MUST Have NICE to Have Email Archiving NICE to Have NEED to Have MUST Have Communications Archiving NICE to Have NEED to Have MUST Have Archiving has always been beneficial in organizations. For decades, lawsuits and other legal actions have made it imperative for companies to be able to retrieve email. Archiving email has dramatically evolved over the past few years. With recent laws and regulations, email archiving has gone from a ‘nice to have’, to a ‘need to have’, to a ‘must have’. And now it’s expanded beyond email. HIPPA regulations, Sarbannes-Oxley requirements, FINRA, HITECH and many other protocols demand that ALL communications data be archived and immediately accessible; otherwise, fines, penalties and heavy sanctions are levied. © GWAVA Inc, Confidential & Proprietary

Proactive vs. Reactive Archiving is essential Maintain a record of past occurrences Monitoring and filtering can prevent situations Now we have touched a lot on the need for archiving and why it is essential to help ensure that your school: complies with regulations; prepares for potential litigation; and, helps you reduce the costs associated with that litigation. But really, the point of archiving is all about protecting your students and school. The archive gives you a record of what has happened and can help you if any number of situations have occurred, whether that is bullying, harassment, violence, cheating, etc. Now, to prevent situations from ever occurring, you must be monitoring! Let’s take a few minutes to talk about the need for monitoring social media & email communications as well as internet traffic. In other words, using a proactive, instead of a reactive approach to protect your students and school. © GWAVA Inc, Confidential & Proprietary

Threats to Your School 7.4% of high school students threatened or injured with a weapon 12% reported physical fights at school 8% of teachers threatened by students 1-2% homicide rate at US schools 7.4% of high school students that reported being threatened or injured with a weapon at school at least once in the last year, as of 2011 Only 7.4 percent? That may not seem like much until you realize that’s one in 13 kids. The report rate for high school injuries and threats involving weapons has hovered around 8 percent since 1993. 12% of high school students who reported being in a physical fight on school property at least once in the last 12 months, as of 2011 8.1% of public teachers who reported a student threatened to injure them during the 2007-2008 school year Of the millions of students who attend public schools every year, 17 were killed during the 2009-2010 school year. The proportion of youth homicides occurring at school has held steady at around 1 to 2 percent since the 1992-1993 school year. These threats are real! Things can happen, we must reduce or even stop this violence in schools. Here are a few alarming statistics about cyber-bullying. http://www.greatschools.org/improvement/slideshows/7188-school-shooting-violence-statistics.gs © GWAVA Inc, Confidential & Proprietary

Compare physical harm to online bullying. These statistics are daunting. Just think of how technology has taken off among kids! 69% of teens own their own computer or smartphone device 80% of those teens are active on one or more social media sites And, of course, the troubling statistic: 42% of teens with tech acccess report being cyberbullied over the past year! Teenagers are going to be online, they are going to continue to adopt new technology. We must find a way to combat this type of harassment! © GWAVA Inc, Confidential & Proprietary

Now on to facebook usage. 1 in 10 kids report being bullied on facebook, 1 in 10! 7.4 million facebook users are under the age of 13, think of that, 800,000 kids are bullied on facebook. It gets worse… © GWAVA Inc, Confidential & Proprietary

1 in 3 kids have been THREATENED online 81% of youths day bullying online is easier to get away with then in person. 1 in 3 kids have been THREATENED online And finally, and sadly enough, 3 million kids are absent from school each month because their fear bullies. We want our kids to feel safe, we want them to be able to go online without the fear of being bullied. We want our schools to be safe. What can we do? How can we prevent these harmful situations? How can we protect our students and schools? © GWAVA Inc, Confidential & Proprietary

GWAVA has the technology to help protect your school GWAVA has the technology to help protect your school! GWAVA has the solutions to monitor and archive communications and filter internet traffic, these solutions can help prevent the very situations we have been discussing. Let’s touch on how… The GWAVA Solution

Retain Unified Archive GWAVA Retain provides you the ability to archive all communications – email, mobile, and social in one central location! This archived data is easily accessed through the Retain Web Access Archive viewer. Additionally, search, publish and eDiscovery of the archive can be easily achieved from the central Retain Archive. This is why it is called the ‘Unified Archive’. Retain archives single or mixed messaging platforms including; Exchange, GroupWise, Gmail or Office 365, as well as social media, and mobile communications. With Retain you are in full compliance with communication regulations and you are protected from the risks associated with using electronic communications such as email, social media and mobile communications, in particular. This graph shows what GWAVA will be supporting. When it comes to Social Media, currently GWAVA supports Facebook and Twitter. And the mobile devices that GWAVA currently supports are BlackBerry and Android. So no matter what collaboration system you are using, Retain will support it. And you can be assured that you can be in compliance with government regulations and that you avoid the risks of misuse of collaboration tools. Additionally, with Retain, many of the problems that may arise with cloud-based email systems are remedied, because you maintain control of your data and can rely on a secure, easily accessible, searchable and discoverable archive. © GWAVA Inc, Confidential & Proprietary

Retain Social Retain for Social Securely Archives: Archive Twitter & Facebook communications Intelligent threading, view messages in their original context Regulation compliance Retain Social will help your school be protected in case of a harmful situation. Retain Social securely archives social media communications. This archived data can be instantly retrieved and reviewed. When you implement Retain in your system you are creating a record which, in turn, protects your students and staff. Unfounded allegations can be checked on. Students and staff can be easily cleared of accusations of wrongdoing because you have a record of what actually happened and was actually said. And when bad behavior IS happening, Retain keeps that record, too. Policies can be enforced when evidence is recorded using Retain. Now you can encourage appropriate communications while at the same time you deter cyber-bullying and potential violence. And we can even take this a step further… © GWAVA Inc, Confidential & Proprietary

Retain Mobile Android BlackBerry SMS/MMS, Phone Usage BBM, PIN, SMS/MMS, Phone Retain Mobile securely archives SMS/MMS and phone call logs for Android as well as BBM, PIN, SMS/MMS and phone call logs for BlackBerry devices. If you can search teacher and staff communications that occur on their mobile devices, think of the issues you can anticipate, catch and resolve before they turn into real problems. GWAVA is helping you ensure that your school is a safe haven—protected from these evolving problems and challenges that Social Media and Mobile Devices have created! Now, let’s hit on GWAVA Messaging security and discuss how this solution can help protect your network and your students. © GWAVA Inc, Confidential & Proprietary

Messaging Security GWAVA protects your networks from cyberthreats, including spam, viruses, cybercrime, illicit images, and DoS/DDoS attacks. And with web and content filtering, GWAVA ensures that your school is protected from malicious websites and content. There are a few specific features of GWAVA that will help ensure that your school is protected… © GWAVA Inc, Confidential & Proprietary

Image Analyzer Illicit Material Blocking Regulations and Policies Internal Threats Protection for Tomorrow GWAVA uses Image Analyzer, to analyze the composition of images and videos. Instead of the more commonly used signature databases, its sophisticated probability engine scans incoming images, reliably distinguishes between pornographic and non-pornographic content, and stops the content from entering your messaging system. Image analyzer scans both incoming and outgoing mail. This will help ensure that illicit images do not enter your school, are not spread throughout your school and do not get sent from your school via email. Protect your students, teachers and staff from pornographic material! © GWAVA Inc, Confidential & Proprietary

Keyword Content Scanning Scan inbound and outbound email for keywords Prevent physical or virtual threats to your organization Scan for trigger words to diffuse potential incidents GWAVA gives you the ability to scan incoming and outgoing email for keywords and phrases. This content scanner gives you the ability to scan for trigger words such as gun, kill, plot, maim, shoot, destroy, harass, or other violent or illicit language. These messages can be flagged, blocked or deleted and administrators are notified of these communications. Help ensure that a potential incident or tragedy can be prevented and that your school is protected! © GWAVA Inc, Confidential & Proprietary

Web & Content Filtering Monitor online postings Filter internet traffic Block inappropriate content or communications Protect your school! And finally, GWAVA monitors and filters internet traffic and web content. This monitoring allows you to protect your school, students, teachers and staff from participating in harmful, inappropriate or other dangerous communications. By monitoring what is posted online, you can stop a violent situation from ever occurring. By filtering internet traffic, you can be assured that your students are not accessing or posting inappropriate materials and that malicious sites do not damage your network. © GWAVA Inc, Confidential & Proprietary

Next Steps Start Protecting Your School Today! 866-GO-GWAVA GWAVA.com GWAVA.com/quote sales@GWAVA.com GWAVA gives you the ability to comply with regulations, prevent harmful situations and protect your school from potential litigation. GWAVA Messaging Security and Retain Unified Archiving, work in tandem to provide you email monitoring and web and content filtering along with email, social media and mobile communications archiving. Start protecting your school today! Please contact us for a no obligation quote or go ahead and try it out these solutions for yourself. We offer a free 30 day trial, visit www.GWAVA.com/download to download it now! And be sure to visit our YouTube page, GWAVATV for access to videos about this material and to view this webinar recording! © GWAVA Inc, Confidential & Proprietary

We have a few minutes for questions, please feel free to put those through in the chat window, or the Q&A window. Also, if you raise your hand using the “raise your hand” feature in GoToMeeting, we will unmute you and you can ask the question over the air. Q&A

Thank you for your time today and be sure to contact us if you need anything. Thanks! Thank You!