CYBERBULLYING AND SEXTING - title1waynewv.org

CYBERBULLYING AND SEXTING - title1waynewv.org

How To Spy On Your Kids 101 Trooper First Class Rachel Grose Internet Crimes Against Children Task Force Internet safety and your kids THINK OF HOW MUCH TIME YOUR KIDS SPEND ON THE INTERNET.

DO YOU KNOW WHO THEY ARE TALKING TO? DO THEY KNOW WHO THEY ARE TALKING TO? DO YOU KNOW ALL THEIR ONLINE ACCOUNTS? SOCIAL MEDIA? E-MAIL? CHATTING? HOW MUCH INFORMATION DO THEY HAVE ON THEIR PROFILES? AGE? ADDRESS? PHONE? CURRENT CITY? IS THERE A REASON THEY ARE IN MIDDLE SCHOOL AND THEY HAVE 1500 FRIENDS? DO THEY KNOW 1500 PEOPLE? INTERNET SAFETY STATISTICS Nearly all teenagers (93%) use the internet

17% of teens say they've been contacted online by someone they didn't know in a way that made them feel scared or uncomfortable 39% of teens admitted to lying about their age to gain access to websites 34% of youth online saw sexual materials online that they did not want to see, including pictures of people naked or

having sex 1 in 7 kids (ages 12 to 17-years-old) were sexually solicited or approached online. 45% of youth posted their birth date or age 34% posted their real names, phone numbers, addresses, or schools 18% posted their pictures INTERNET SAFETY STATISTICS 71% of kids get messages online from someone they dont

know 45% were asked for personal information by someone they didnt know 30% considered meeting someone they only talked with online 14% actually met a person face-to-face that they only spoke to over the internet 9% of the 13 to 15-year-olds 22% of the 16 to 17-year-olds 40% will usually reply when they get messages from strangers, but only 18% will tell an adult SO AGAIN, HOW MUCH DO YOU KNOW ABOUT WHAT YOUR

CHILD DOES ON THE INTERNET? Childrens online privacy protection act The Children's Online Privacy Protection Act and Rule apply to individually identifiable information about a child that is collected online, such as full name, home address, email address, telephone number or any other information that would allow someone to identify or contact the child. The Act and Rule also cover other types of information -- for example, hobbies, interests

and information collected through cookies or other types of tracking mechanisms -- when they are tied to individually identifiable information. sexting Sexting is the act of sending sexually explicit messages and/or photographs, primarily between mobile phones. The term was first popularized in early 21st century, and is a portmanteau of sex and texting, where the latter is meant in the wide sense of sending a text possibly with images. Ways to sext: Cell phones (Smart phones, iPod touches, etc)

Computers (Instant Messaging) Tablets (iPads/ Androids) E-Readers (Kindle) XBox Things to assist parents Monitoring your childs phone and text messaging as well as

social media sights may have parental controls in their security settings to assist parents in watching what their child posts. Smartphones now have applications that can conceal pictures and even delete messages that have been sent within a matter of seconds. Know your childs passwords. Social Media websites such as Facebook, Twitter, Instagram. Watching chat websites that teens use nowadays to chat with random people around the world. (Kik, MeetMe, etc.) Get to know the state law Establish rules on using the Internet (etc. passwords, time

limits, parental controls) Sexting law CHAPTER 61. CRIMES AND THEIR PUNISHMENT. 8C. FILMING OF SEXUALLY EXPLICIT CONDUCT OF MINORS. 61-8C-3b. Prohibiting juveniles from manufacturing, possessing and distributing nude or partially nude images of minors; creating exemptions; declaring a violation to be an act of juvenile delinquency; and providing for the punishment thereof. (a) Any minor who intentionally possesses, creates, produces, distributes, presents, transmits, posts, exchanges, or otherwise disseminates a visual portrayal of another minor posing in an inappropriate sexual manner or who distributes, presents, transmits, posts, exchanges or

otherwise disseminates a visual portrayal of himself or herself posing in an inappropriate sexual manner shall be guilty of an act of delinquency and upon adjudication disposition may be made by the circuit court pursuant to the provisions of article five, chapter forty-nine of this code. (b) As used in this section: (1) Posing in an inappropriate sexual manner means exhibition of a bare female breast, female or male genitalia, pubic or rectal areas of a minor for purposes of sexual titillation. (2) Visual portrayal means: (A) A photograph; (B) A motion picture;

(C) A digital image; (D) A digital video recording; or ARTICLE Sexting law 2 (E) Any other mechanical or electronic recording process or device that can preserve, for later viewing, a visual image of a person that includes, but is not limited to, computers, cellphones, personal digital assistance and

other digital storage or transmitting devices; (c) It shall be an affirmative defense to an alleged violation of this section that a minor charged with possession of the prohibited visual depiction did neither solicit its receipt nor distribute, transmit or present it to another person by any means. (d) Notwithstanding the provisions of article twelve, chapter fifteen of this code, an adjudication of delinquency under the provisions of this section shall not subject the minor to the requirements of said article and chapter. cyberbullying Cyberbullying is the use of technology to harass, threaten,

embarrass, or target another person. By definition, it occurs amo ng young people. Some examples of ways kids bully online are Sending someone mean or threatening emails, instant messages, or text messages Excluding someone from an instant messenger buddy list or blocking their email for no reason Tricking someone into revealing personal or embarrassing information

and sending it to others Breaking into someone's email or instant message account to send cruel or untrue messages while posing as that person Creating websites to make fun of another person such as a classmate or teacher Using websites to rate peers as prettiest, ugliest, etc. Cyberbullying statistics Nearly 43% of kids have been bullied online. 1 in 4 has

had it happen more than once. 70% of students report seeing frequent bullying online. Over 80% of teens use a cell phone regularly, making it the most common medium for cyber bullying. 81% of young people think bullying online is easier to get away with than bullying in person. Only 1 in 10 victims will inform a parent or trusted adult of their abuse. Bullying victims are 2 to 9 times more likely to consider committing suicide. About 75% of students admit they have visited a website bashing another student.

What can be done 61-3C-14a. Obscene, anonymous, harassing and threatening communications by computer, cell phones and electronic communication devices; penalty. (a) It is unlawful for any person, with the intent to harass or abuse another person, to use a computer, mobile phone, personal digital assistant or other electronic communication device to: (1) Make contact with another without disclosing his or her

identity with the intent to harass or abuse; (2) Make contact with a person after being requested by the person to desist from contacting them; (3) Threaten to commit a crime against any person or property; or (4) Cause obscene material to be delivered or transmitted to a

specific person after being requested to desist from sending such What can be done (3) "obscene material" means material that: (A) An average person, applying contemporary adult community standards, would find, taken as a whole, appeals to the prurient interest, is intended to appeal to the prurient interest, or is pandered to a prurient interest;

(B) An average person, applying contemporary adult community standards, would find, depicts or describes, in a patently offensive way, sexually explicit conduct consisting of an ultimate sexual act, normal or perverted, actual or simulated, an excretory function, masturbation, lewd exhibition of the genitals, or sadomasochistic sexual abuse; and (C) A reasonable person would find, taken as a whole, lacks literary, artistic, political or scientific value.

(c) It is unlawful for any person to knowingly permit a computer, mobile phone or personal digital assistant or other electronic communication device under his or her control to be used for any purpose prohibited by this section. What can be done (d) Any offense committed under this section may be determined to have occurred at the place at which the contact originated or the place at which the contact

was received or intended to be received. (e) Any person who violates a provision of this section is guilty of a misdemeanor and, upon conviction thereof, shall be fined not more than $500 or confined in jail not more than six months, or both fined and confined. For a second or subsequent offense, the person is guilty of a misdemeanor and, upon conviction thereof, shall be fined not more than $1,000 or confined in jail for not more than one year, or both fined and confined. Programs to watch for SnapChat- Once the message is opened, the content of

the message is deleted within 10 seconds so that there is no trace of it on the receivers phone. Private Photo Albums- A popular one is a Digital Calculator. A code is entered on the calculator which then reveals a private photo album that is only accessed if the code is entered. (KYMS; SpyCalc) Poof- Allows owners of smartphones to hide certain

applications that they do not want others to see. Kik- A chat application that kids can upload files and send them to multiple people. SKOUT- Searching for users based on location. Ask FManonymous worldwide; Chats. Best apps for parents

My Mobile Watch Dog- Monitor texts, block apps, set when apps can be used and GPS. Ignore No More- Locks phone until child returns your phone call. Net Nanny- Blocks pornography; choose which apps your kids have MamaBear- Location, Speed, Social Media Posts MM Guardian- Time Limits, Web Filter, App Control, Texting Canary- Receive the notifications of texting while driving Norton Family- Shows apps downloaded and control them; texting content; GPS Kids Place- App with child lock that protects personal data and lets child play on parental approved apps

More apps to help parents TeenSafe-Texts, Calls, Social Media activity and location Life360- Location, Location sharing Find My Kids Footprints- Locates kids and verifies meetings with friends FBI Child ID- Keep info and photo of child just in case. iEmergency Family Pro- Store important health and

data info Famingo- Restricts access to Android store and app control Mobile Guardian- Contacts blocking, geofencing, control web ParentKit- Prevents app purchases and Game center access PROCEDURE IF CHILDREN POSSIBLY HAVE SOMETHING OF CONCERN ON THEIR PHONES, THE SCHOOL CAN TAKE ACTION. SCHOOLS CAN TAKE ACTION UNTIL IT TURNS

CRIMINAL. ONCE A CRIMINAL ACTION TAKES PLACE, THEY NOTIFY LAW ENFORCEMENT. A CHILDS PHONE WILL BE TAKEN BY ADMINISTRATION. IF LAW ENFORCEMENT IS NOTIFIED, THE PHONE IS THEN PLACED IN THE CUSTODY OF THE LAW ENFORCEMENT OFFICIAL AND IF EVIDENCE OF A CRIME IS FOUND, THE PHONE WILL NOT BE RETURNED. (THIS ALSO APPLIES TO COMPUTERS) PROCEDURE IF FURTHER EVIDENCE OF A CRIME IS FOUND, LAW ENFORCEMENT COULD

SEIZE ALL ACCESSIBLE DEVICES IN THE HOUSEHOLD IF DEEMED NECESSARY. JUVENILE PETITIONS WILL BE FILED AND THE CHILD WILL BE PUT THROUGH JUVENILE COURT. IF CONVICTED, THE CHILD WILL FACE JUVENILE DETENTION, PROBATION, COMMUNITY SERVICE, AND COULD EVEN BE PROHIBITED FROM OWNING A PHONE WITH TEXTING CAPACITY. Questions? TFC. RACHEL GROSE WEST VIRGINIA STATE POLICE

PHONE: 304-528-5555 EMAIL: [email protected]

Recently Viewed Presentations

  • Why Not Store Everything in Main Memory? Why use disks?

    Why Not Store Everything in Main Memory? Why use disks?

    FAUST Analytics X(X1..Xn) Rn, |X|=N; Classes={C1..CK}; d=(d1..dn), |d|=1; p=(p1..pn) Rn; Functionals: Ld Xod = Xod-pod= Ld-pod Lmind,k= min(Ld&Ck) Lmaxd,k= max(Ld&Ck)
  • Overcoming Limitations of Sampling for Aggregation Queries

    Overcoming Limitations of Sampling for Aggregation Queries

    Overcoming Limitations of Sampling for Agrregation Queries. ... Tuplesdeviant from the rest of the values in terms of their contributions to aggregate are known as OUTLIERS. The paper suggests a technique called ... and tune the sample so that we...
  • Chapter 1 The Nature of Strategic Management

    Chapter 1 The Nature of Strategic Management

    Chapter 1 The Nature of Strategic Management Strategic Management: Concepts & Cases 13th Edition Fred David Art & science of formulating, implementing, and evaluating, cross-functional decisions that enable an organization to achieve its objectives In essence, the strategic plan is...
  • This Is a Test

    This Is a Test

    Dig into each study that represents a CMF in the clearinghouse, and choose the one most relevant to your project. Find information outside the CMF clearinghouse (a study or past experience) Conduct a research study using crash data and develop...
  • A Reinforcement Learning perspective on AGI

    A Reinforcement Learning perspective on AGI

    Gabriel cramer (1704-1752) April 3, 2009. I'm going to tell you how a true AGI system can be built. Outline. Problem statement and motivation. Novel approach. Revisiting Cramer's rule. Matrix condensation. Illustration of the proposed scheme. Implementation results.
  • Metric Conversions, Scientific Notation, and Dimensional Analysis

    Metric Conversions, Scientific Notation, and Dimensional Analysis

    Metric Conversions, Scientific Notation, and Dimensional Analysis International System of Units Built on a set of seven metric units, called base units (base units contain no prefix…examples are grams, meter, and liter) Prefixes are added to the names of SI...
  • Functional Group Reactions Organic Chemistry Lesson # 4

    Functional Group Reactions Organic Chemistry Lesson # 4

    Functional Group Reactions Organic Chemistry Lesson # 4
  • 1 TEAM PARADIGM 6 CONCEPTUAL DESIGN REVIEW Farah

    1 TEAM PARADIGM 6 CONCEPTUAL DESIGN REVIEW Farah

    Mission Statement. Implement advanced technologies to design a future large commercial airliner (200 passenger minimum) that simultaneously addresses all of the N+2 goals for noise, emissions and fuel burn as set forth by NASA.