Cyberbullying Investigation/Reporting/ Procedures


Published on

Cyberbullying Investigation/Reporting/ Procedures for School Administrators

Published in: Education, Technology, Design
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Help from world of computer forensics
  • Things to have ready that will help you
  • Saving Emails with Full HeadersHeaders are all the letters, numbers and symbols that you see either at the top or bottom of emails you have received - if you can't see this information, check out the links below for instructions on how to show headers in your email program. Headers contain information such as the subject, recipient's name and email address, sender's name and email address, and information that can pinpoint the sender's location in the real world.Below is an example of a header from an email. From the header, the company can pinpoint the exact computer that the email was sent from.
  • Cyberbullying Investigation/Reporting/ Procedures

    1. 1. Cyber SafetyInvestigation/Reporting/ProceduresBryan FendleyDirector of Academic ComputingUniversity of Arkansas at Monticello Twitter: @bfend / Web: 1
    2. 2. Disclaimer I am not a lawyer, and this is not legal advice Twitter: @bfend / Web: 2
    3. 3. Senate Bill 892 Schools shall promptly investigate and report A.C.A. § 6-18-514 (2011), Section D: A school principal or his or her designee who receives a credible report or complaint of bullying shall promptly investigate the complaint or report and make a record of the investigation and any action taken as a result of the investigation. Twitter: @bfend / Web: 3
    4. 4. Using Four Basic ForensicsPhases to Launch YourInvestigationAccording to National Institute of Standards and Technology Government Publication 800-86, there are four basic phases in the forensics process: Collection Examination Analysis Reporting Twitter: @bfend / Web: 4
    5. 5. Prepare Your Own Cyber BullyIncident Survival Guide1. Incident Tacking Forms2. Decision Trees3. Steps for Preserving Evidence4. Net Lingo Guides and Terms5. Contacts Twitter: @bfend / Web: 5
    6. 6. Example Incident Tacking Forms Anonymous Form (pdf) Witness Statement (pdf) Complaint Form (pdf) Cyber Bully Tracking Form (pdf) Twitter: @bfend / Web: 6
    7. 7. Example Decision TreesBroward County Public SchoolsAlleged Bullying Investigation Process:(Initiated when complaint received) Twitter: @bfend / Web: 7
    8. 8. Easy Ways to Preserve MostCommon Evidence Screenshots Text messages Pictures Emails Videos Searching Twitter: @bfend / Web: 8
    9. 9. Warning About Images Do not keep in your possession as part of your investigation indecent or illegal images of minors. Report this to the authorities immediately! Twitter: @bfend / Web: 9
    10. 10. Screenshots Alt Print Screen and then paste into a document Vista start menu type “snipping tool Mac – command shift 4 Twitter: @bfend / Web: 10
    11. 11. Text messages Iphone and Ipod - Hold down lock button and double click home button. Image is saved under photos Dont delete messages - leave them as is so can be used as evidence - record time and date that messages are received Twitter: @bfend / Web: 11
    12. 12. Pictures Right click and paste Twitter: @bfend / Web: 12
    13. 13. Emails X-Message-Info: JGTYoYF78jEHjJx36Oi8+Z3TmmkSEdPtfpLB7P/ybN8= Received: from ([]) by with Microsoft SMTPSVC(6.0.3790.211); Thu, 9 Jun 2005 03:36:19 -0700 Received: from mail pickup service by with Microsoft SMTPSVC; Thu, 9 Jun 2005 03:13:41 -0700 Message-ID: <BAY103-F16185361BFA8152B9701EDE2FC0@phx.gbl> Received: from by with HTTP; Thu, 09 Jun 2005 10:13:41 GMT X-Originating-IP: [] X-Originating-Email: [] X-Sender: In-Reply-To: <BAY103-DAV16418913D7F32B48B6F4B9D1FD0@phx.gbl> From: "BULLY" <> To: Bcc: Date: Thu, 09 Jun 2005 20:13:41 +1000 Mime-Version: 1.0 Content-Type: text/html; format=flowed X-OriginalArrivalTime: 09 Jun 2005 10:13:41.0375 (UTC) FILETIME=[E910B0F0:01C56CDB]Source: Twitter: @bfend / Web: 13
    14. 14. Videos Video DownloadHelper Twitter: @bfend / Web: 14
    15. 15. Searching Search early, filter by upload time Google alerts Twitter: @bfend / Web: 15
    16. 16. Final Note on CollectingEvidence Having an electronic record of the evidence is better than a printed record If you can’t figure out how to archive evidence, take a picture or video Collect the evidence as soon as you see it. The evidence may be gone if you plan to get to it later. Keep a backup! Twitter: @bfend / Web: 16
    17. 17. Can You Read This?g4ng up 4nd k1ll l@ulaughing at you G3yGay lzrLoser zergTo gang up on someone fragKill 7h3the Twitter: @bfend / Web: 17
    18. 18. Net Lingo Guides and TermsSlang / Net Lingo / Leet Speak hp Bully Terms Anti Defamation League Twitter: @bfend / Web: 18
    19. 19. Contacts Facebook Twitter Youtube MySpace Bebo Companies ATT&T Verizon Tmobile Cricket Icloud Twitter: @bfend / Web: 19
    20. 20. List of Popular SocialNetworking Websites Wikipedia has a sortable list Twitter: @bfend / Web: 20
    21. 21. Final Thoughts Prevention programs are key Have a plan in place before an incident occurs Stay familiar with internet culture Twitter: @bfend / Web: 21