/
School Safety Coordinator Training School Safety Coordinator Training

School Safety Coordinator Training - PowerPoint Presentation

tatiana-dople
tatiana-dople . @tatiana-dople
Follow
354 views
Uploaded On 2018-12-14

School Safety Coordinator Training - PPT Presentation

Forsyth County Schools Todd Shirley Director Tim Monroe Assistant Director Steve Honn School Safety Manager Ola Shadburn General Administrative School Safety and Student Discipline Joey Pirkle ID: 741182

phone www online internet www phone internet online child information users school safety people cyberbullying web privacy http text activity send number

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "School Safety Coordinator Training" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

School Safety Coordinator Training

Forsyth County SchoolsTodd Shirley, DirectorTim Monroe, Assistant DirectorSteve Honn, School Safety ManagerOla Shadburn, General AdministrativeSchool Safety and Student Discipline

Joey PirkleAssociate Superintendent Educational Leadership

Dr. Jeff BeardenSuperintendent of Schools

Department of School Safety and Student Discipline

Session #5Slide2

2

Cyber Safety Slide3

Facebook-87% students use--*Facebook

Messenger-72%TwitterInstagram-77% usage--online photo-sharing, video-sharing and social networking service that enables its users to take pictures and videos, apply digital filters to them, and share them on a variety of social networking services, such as Facebook, Twitter, Tumblr and FlickrVine-Owned by Twitter, enables its users to create and post short video clips

Snapchat-65% useAllows users to take photos or short videos, then share them with friends for up to 10 seconds before the image self-destructs. If a recipient screenshots the photo, the app alerts the original sender, though hacks to interrupt this function do exist.

Askfm-social networking website where users can ask other users questions, with the option of anonymity used in foreign countries mostlyKIK

-allows users to send texts via the Internet without having to use a cellular telephoneYik Yak-social media site that gives you an anonymous live feed of what people are saying and doing. Users create all the content.

Youtube

-No. 1 site for watching videos

(Schoolsafetyandsecurityalert.com August 2014)

3

SOCIAL MEDIASlide4

Bullies can use your informationPredators can use the information

Comments – sued for defamationInfo – arrested or school disciplineNo reasonable expectation of privacyFuture employers and schools can use information as “instant background checks”Clark Howard Video

4RisksSlide5

Parenting

Monitor Your Child's Cell Phone and Internet ActivityAre you aware of what your child is doing online? The following programs can help you monitor your kids' cell phone and Internet activity: DadGuardInstall on the computer you'd like to monitor — from anywhere in the world. DadGuard recordings are organized into an easy-to-read Activity Report that is automatically sent to any email address you choose, as often as you'd like. You'll receive an exact copy of their emails, chats and instant messages, as they occur. TextGuardThis is an application you install on your child's cell phone. Once the program is running, you can log into the Web site and watch all incoming and outgoing calls, text messages, e-mails and Web browsing history. You can select a certain phone number and block any activity to that number as well, so if you suspect suspicious communication, you can make sure your child cannot text, e-mail or call that person.

My Mobile Watchdog

This is also an application that you install on a cell phone. On its Web site, It gives you a listing of all activity on a given phone. It also alerts you if calls or messages come in from a specific number. For instance, if you see a suspicious or unauthorized person calling, texting, or e-mailing your child, that call is routed through the My Mobile Watchdog Data Center. Notifications are then sent to all persons you have established from your Web application, such as parents, teachers, police, etc. From your Web application or mobile phone application, you can see all suspicious activity, along with full content, including images. You can also print out reports to pass on to law enforcement or school officials.

5Slide6

Eliminate all identifying informationAnything that allows you to be locatedAnything that pairs the profile to your name

Delete inappropriate informationRead your information to determine what impression it givesYour site may appeal to someone you didn’t intend for it to impress6

What to do? Slide7

Choose appropriate photosSetting privacy settings appropriatelyFor privacy:

Develop your profile to be associated with a nickname rather than your official name7What to doSlide8

8Slide9

SMARTPHONE PICTURES POSE PRIVACY RISKS

9-Disable Geo-tagging Photos

iPhoneSettings>Privacy

AndroidCamera>Settings>PrivacySlide10

Protect your friends’ info – no name, location, birthday wish, phone numbers, etc. Don’t write anything you wouldn’t want your parents or principal to read (because they can and MIGHT!)

Set your profile to private so you control who views your profile.Be careful when you post pics10Social Networking RulesSlide11

What sport you play, the movies you like, your music…that would be okayRemember that these facts can be used to fool youBe smarter than them

Always tell a trusted adult if you have problems online11What’s ok to write?Slide12

High-tech version of flirting, teens texting explicit messages or photos to each otherExperimentalAggravated

12Sexting Definition

http://www.unh.edu/ccrc/pdf/CV231_Sexting Typology Bulletin_4-6-11_revised.pdf Slide13

What is obscene?

13Obscene

Average person would find it wrongIt depicts sexual conduct

It has no literary, artistic, political or scientific value

Child PornographyImages of sexual conduct

Under 18 years

413 US 15, OCGA § 16-12-80

OCGA § 16-12-100Slide14

If someone sends you something

Inappropriate – deleteObscene and/or makes you uncomfortable – alert your parent or authorityIf you sent somethingAsk recipient to delete it and not to forward itNever send inappropriate text or imagesIn 2010, 20 percent of teenagers (22 % of girls and 18 % of boys) sent naked/seminude images of themselves or posted them online. Nearly 1 in 6 teens between the ages of 12 and 17 have received naked or nearly nude pictures via text message from someone they know. (FBI Law Enforcement Bulletin)

14

What to doSlide15

Cyber bullying: One form of bullyingYouth use technology to:

Send Text MessagesMake Web PostingsStalk OthersPost Unauthorized PhotosOnline Deception and ViolenceCyber-ostracism

15What is Cyberbullying?

http://www.smlinks.com/sotw/why/Slide16

One mistreating others – usually someone that the target knowsTarget – can be anyoneBystander

Harmful-if complacentHelpful-if report to adult16Three PlayersSlide17

Making threats of violence to people or propertyEngaging in coercionMaking obscene or harassing text messages

Harassment or stalking17Criminal Law

Nancy Willard, Cyberbullying and Cyberthreats, Effectively Managing Internet Use Risks in Schools, Center for Safe and Responsible Use of the Internet, January 2007Slide18

Hate or bias crimeCreating or sending sexually explicit images of teens or childrenSexual exploitation

Taking a photo of someone in a place where privacy is expected (Locker room/Restroom)18Criminal Law cont.

Nancy Willard, Cyberbullying and Cyberthreats, Effectively Managing Internet Use Risks in Schools, Center for Safe and Responsible Use of the Internet, January 2007Slide19

10% to 20% of youth have been targets and/or aggressors

Cyberbullying peaks in the middle school years (grades 6-8)Girls are more likely to be the targetLooks and body shape are the most targeted characteristicsWhile there is an increase in cyberbullying, it is likely because there is an increase in use of technology

19Research

http://cyberbullying.us/blog

www.unh.edu/ccrc Slide20

20

Phishing scamsSlide21

21

Since January 23, 2004, criminals have been using the FDIC's name and reputation to perpetrate various "phishing" schemes. It is important to note that the FDIC will never ask for personal or confidential information in this manner.Slide22

22

WIFI THIEVES-Set up open wifi in public areas posing as a legitimate business. Stealing usernames and passwords to log into accounts. (WSBTV 2014) If you suspect that you have been a victim of identity theft, perhaps because you submitted personal information in response to a suspicious, unsolicited e-mail or you see unauthorized charges on your credit card, immediately contact your financial institution and, if necessary, close existing accounts and open new ones. Also contact the police and request a copy of any police report or case number for later reference.

WEBCam-Hacking into cameras (have to set passwords to prevent hacking)Slide23

March 05, 2014Pre-installed malware turns up on new Android devicesFake version of Netflix that steals personal data and sends it to Russia has been found on some smartphones and tablets from Samsung, Motorola, and LG

23Slide24

Child Identity TheftCredit Reportswww.annualcreditreport.com

Federal Law allows you to get a free copy of your credit report every 12 months from each credit reporting company.Credit Reporting AgenciesEquifax 800-525-6285Experian 888-397-3742TransUnion 800-680-728924

Safeguarding your child’s futureSlide25

Make sure your child does not spend all of his/her time on the computer. People, not computers, should be their best friends and companions.

Keep the computer in an area where it can be monitored, like the family room, kitchen or living room, not in your child’s bedroom.Learn enough about computers so you can enjoy them together with your kids.Teach them never to meet an online friend offline unless you are with them.Watch your children when they’re online and see where they go.Make sure that your children feel comfortable coming to you with questions and don’t over react if things go wrong.Keep kids out of

chatrooms unless they are monitored.Encourage discussions between you and your child about what they enjoy online.

25

SUGGESTIONS

Next pageSlide26

Teach them what information they can share with others online and what they can’t (like telephone numbers, address, their full name and school)

Get to know their “online friends” just as you get to know all of their other friends.Warn them that people may not be what they seem to be and that people they chat with are not their friends, they are just people they chat with.Discuss these rules, get your children to agree to adhere to them, and post them near the computer as a reminder.www.cyber-safety.com

26Slide27

Four steps you can start taking now to make ID security a priority — and a practice:

1. Change weak passwords. Do not use your birth date or part of your address or phone number. Strongest passwords combine upper- and lowercase letters, numbers and special characters.2. Make sure your home Wi-Fi network is password-protected. Be careful how you use your devices at public hot spots. Most aren't secure — which means any information you send is only protected if you're on an encrypted website. To be sure a website is encrypted, look for "https" in the address before you log in or send any personal info.3. Don't click on links in unsolicited emails. Don't give out information over the phone or online unless you've verified the source.4. Keep your eye on debit and credit cards when paying for purchases. If anything seems out of the ordinary, be cautious using your card.www.ftc.gov/idtheftFight Back27Slide28

ConnectSafely Smart Socializing Starts Herehttp://www.connectsafely.org/safety-tips-advice/

National Center for Missing & Exploited Childrenhttp://www.netsmartz.org/InternetSafetyFBI-Internet Crime Complaintswww.FBI.GOVInternet Monitoring Software (Free)http://www.qustodio.com/internet_monitoring_software/http://www.nchsoftware.com/childmonitoring/index.html http://www.monitor.us/en/website-monitoring https://onlinefamily.norton.com/familysafety/basicpremium.fs Internet Monitoring Software-All have mixed reviews1. Net Nanny $28.99 2. WebWatcher $97.003. McAfee Safe Eyes $49.954. Spectorsoft-eblaster $99.95

28

HELPFUL WEBSITESSlide29

QUESTIONS?

29