SlideShare a Scribd company logo
1 of 28
Download to read offline
There’s No Such Thing as Safe “Sext” How to Protect Your Kids  and Your District from Cell Phone Misuse Frederick S. Lane National School Boards Association Annual Conference 4 April 2011 www.FrederickLane.com
Seminar Overview What Is Sexting? The Technology of Sexting The Scope of the Problem Why Do Kids Sext? The Legal Issues The Consequences Are Your Policies In Order? Prevention Through Education Age-Appropriate Curricula www.FrederickLane.com
Introduction Attorney, Educational Consultant & Lecturer www.FrederickLane.com
Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books www.FrederickLane.com
Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books Computer Forensics Expert www.FrederickLane.com
Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books Computer Forensics Expert 10 Years -- Burlington (VT) School Board www.FrederickLane.com
Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books Computer Forensics Expert 10 Years -- Burlington (VT) School Board Technology & Privacy Specialist www.FrederickLane.com
Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books Computer Forensics Expert 10 Years -- Burlington (VT) School Board Technology & Privacy Specialist Student Safety Advocate www.FrederickLane.com
What Is “Sexting”? www.FrederickLane.com Spring 2008: Old Behavior, New Word No Precise Legal Definition of “Sext” Typically Covered by Federal and State Child Pornography Statutes General Definition:  Sending Texts, Photos, or Videos of a Sexual Nature from One Cellphone to Another
The Technology of Sexting www.FrederickLane.com SMS – Short Message Service First used in 1992, became popular in 2005/2006 Messages generally limited to 160 characters MMS – Multimedia Messaging Service Introduced in 1998 Enables sending of photos and videos Camera Phones 1997: First publicly-shared photo via phone 2001: Phones introduced with video capability Internet Access 1999: Japan’s NTT DoCoMo introduces mobile Internet
The Scope of the Problem - I www.FrederickLane.com Teen Usage of Cellphones Is Rising: Ages 15-18: ~ 84% Ages 10-14: ~ 60% Ages 6-9: ~ 22% The Average Age of First Cellphone Use: < 10 Teens LOVE to Send Texts: Boys (13-17): 2,539 texts per month Girls (13-17): 4,050 texts per month Roughly 90% of cellphones have cameras
The Scope of the Problem - II www.FrederickLane.com National Campaign to Prevent Teen and Unplanned Pregnancy (2008): 20% of teens 13-19 said that they had sent/posted nude photos or videos 39% of teens said that they had sent/posted sexually explicit messages Pew Research Center’s Internet & American Life Project (2009) Just 4% of teens 12-17 reported sending nude photos or videos 15 % reported receiving such messages Anecdotal Evidence Suggest These Figures Are Low
Why Do Kids Sext? www.FrederickLane.com National Campaign to Prevent Teen and Unplanned Pregnancy (2008): 2/3 of those who sexted sent the content to a boyfriend or girlfriend; 15% of recipients said they forwarded the message to someone else 15% of those who sexted sent the content to someone they knew only online Pew Research Center’s Internet & American Life Project (2009) 82% sent a sext to get attention 67% sent a sext “to be cool” 60% sent a sext to be like the “popular girls” 55% sent a sext to solicit or further a relationship
Some Other Reasons It’s Fast and Easy www.FrederickLane.com
Some Other Reasons It’s Fast and Easy The Internet www.FrederickLane.com
Some Other Reasons It’s Fast and Easy The Internet Porn Chic www.FrederickLane.com
Some Other Reasons It’s Fast and Easy The Internet Porn Chic Celebrity Sexting www.FrederickLane.com
Some Other Reasons It’s Fast and Easy The Internet Porn Chic Celebrity Sexting Hormones www.FrederickLane.com
The Legal Issues A sexually explicit image of an individual under 18* is child pornography Children can be prosecuted for receipt, possession, and/or production There is risk for teachers and school administrators in handling these images Conviction generally results in jail time and registration as a sex offender States are considering “Romeo and Juliet exceptions. www.FrederickLane.com
Emotional and Social Impact Short-Term: Embarrassment Bullying, Harassment, Ostracization Sexual Blackmail (Sextortion) Long-Term: Depression and Mental Illness Self-Injury and/or Suicide www.FrederickLane.com
Jesse Logan 18 year old high school senior in Ohio Sent nude photos of herself to her boyfriend When they broke up, he forwarded them to various students – 7 schools involved Logan was harassed, taunted, and even physically assaulted because of the photographs In July 2008, Logan committed suicide www.FrederickLane.com
Consequences for Students School Sanctions: Violation of various school policies Removal from extracurriculars or school Negative impact on college admissions or jobs Civil Liability: Invasion of privacy (depending on state) Intentional Infliction of Emotional Distress Criminal Prosecution: Federal child pornography statutes (< 18) State child pornography statutes (varies) www.FrederickLane.com
Consequences for Districts Disruption of Educational Activities Civil Lawsuits: State anti-bullying statutes (varies) Failure to provide /maintain a safe environment Criminal Liability for Employees: Relationship-Based Crimes Possible investigation / seizure of computers and network Possession / Distribution of Child Pornography www.FrederickLane.com
Are Your Policies In Order? Acceptable Use Policies: Does It Describe and Limit Student Use of District Resources? Does It Stress the Importance of and Respect for Personal Privacy? Does It Specifically Describe and Prohibit Illegal Conduct? Anti-Harassment and Anti-Bullying: Does It Encompass Electronic Communications? Does It Encompass Off-Campus Behavior That Affects the Classroom? www.FrederickLane.com
Education: It’s What We Do Schedule Annual Information Sessions for Teachers, Parents, and Students Require Students and Parents to Read and Sign AUP and Anti-Bullying Policies Incorporate Sexting and Cyberbullying Into Professional Development for Teachers and Administrators Liaise With Student Resource Officers, Law Enforcement, and Legislators www.FrederickLane.com
Age-Appropriate Curricula Elementary School: The Limits of Sharing Personal Boundaries Middle School: Much More on Personal Boundaries Anti-Cyberbullying and Anti-Harassment Introduction to Criminal Consequences and Cyberethics High School: Much More on Criminal Consequences and Cyberethics Long-Term Consequences of Digital Stupidity www.FrederickLane.com
Additional Resources Cybertraps for the Young www.CybertrapsfortheYoung.com (beginning 1 August 2011) Download This Presentation: www.FrederickLane.com (http://goo.gl/tWIuX) www.SlideShare.com/FSL3 Contact Me: FSLane3@gmail.com / 802-318-4604 www.FrederickLane.com
There’s No Such Thing as Safe “Sext” How to Protect Your Kids  and Your District from Cell Phone Misuse Frederick S. Lane National School Boards Association Annual Conference 4 April 2011 www.FrederickLane.com

More Related Content

What's hot

Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence Gennia Holder
 
Living in a #metoo World
Living in a #metoo WorldLiving in a #metoo World
Living in a #metoo WorldBoyarMiller
 
We need to talk about porn
We need to talk about pornWe need to talk about porn
We need to talk about pornMaryrose Lyons
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet yadith_
 
#MeToo in the Workplace
#MeToo in the Workplace#MeToo in the Workplace
#MeToo in the Workplacebenefitexpress
 
Social networks 2013-dwm
Social networks 2013-dwmSocial networks 2013-dwm
Social networks 2013-dwmjsgagnon
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingkpwillia
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet SafetyJVGAJJAR
 
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)Frederick Lane
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internetryangregory55
 
THE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersTHE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersSWEET SPOT ACADEMY
 
Internet Safety Meeting New
Internet Safety Meeting NewInternet Safety Meeting New
Internet Safety Meeting NewRandy Rodgers
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
2015-02-12 Cybertraps for the Young
2015-02-12 Cybertraps for the Young2015-02-12 Cybertraps for the Young
2015-02-12 Cybertraps for the YoungFrederick Lane
 
2017 legal update for Williams supervisors
2017 legal update for Williams supervisors2017 legal update for Williams supervisors
2017 legal update for Williams supervisorseph-hr
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the LawSuna Gurol
 
Cyber Bullying and Sexting
Cyber Bullying and SextingCyber Bullying and Sexting
Cyber Bullying and Sextingmathman314
 

What's hot (20)

Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence
 
Living in a #metoo World
Living in a #metoo WorldLiving in a #metoo World
Living in a #metoo World
 
We need to talk about porn
We need to talk about pornWe need to talk about porn
We need to talk about porn
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet
 
#MeToo in the Workplace
#MeToo in the Workplace#MeToo in the Workplace
#MeToo in the Workplace
 
Social networks 2013-dwm
Social networks 2013-dwmSocial networks 2013-dwm
Social networks 2013-dwm
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
 
Hs facebook pwrpoint
Hs facebook pwrpointHs facebook pwrpoint
Hs facebook pwrpoint
 
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
 
THE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersTHE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital Leaders
 
Internet Safety Meeting New
Internet Safety Meeting NewInternet Safety Meeting New
Internet Safety Meeting New
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
2015-02-12 Cybertraps for the Young
2015-02-12 Cybertraps for the Young2015-02-12 Cybertraps for the Young
2015-02-12 Cybertraps for the Young
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
2017 legal update for Williams supervisors
2017 legal update for Williams supervisors2017 legal update for Williams supervisors
2017 legal update for Williams supervisors
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
Cyber Bullying and Sexting
Cyber Bullying and SextingCyber Bullying and Sexting
Cyber Bullying and Sexting
 

Similar to 2011-04-09 There's No Such Thing as Safe "Sext"

Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Karen Brooks
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullyingkschermerhorn
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overviewJohn Woodring
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying John Field
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28thJohn Field
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
Esafety b&s briefing update
Esafety b&s briefing update Esafety b&s briefing update
Esafety b&s briefing update Dan Bowen
 
Encyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety PresentationEncyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety Presentationqgecko
 
Violence Against Bullies
Violence Against BulliesViolence Against Bullies
Violence Against Bulliesjbaton
 

Similar to 2011-04-09 There's No Such Thing as Safe "Sext" (20)

Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
 
Cyberbullyingppt
CyberbullyingpptCyberbullyingppt
Cyberbullyingppt
 
Sexting
SextingSexting
Sexting
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
102009
102009102009
102009
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Sexting
SextingSexting
Sexting
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Esafety b&s briefing update
Esafety b&s briefing update Esafety b&s briefing update
Esafety b&s briefing update
 
Encyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety PresentationEncyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety Presentation
 
Violence Against Bullies
Violence Against BulliesViolence Against Bullies
Violence Against Bullies
 

More from Frederick Lane

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical EducatorFrederick Lane
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for EducatorsFrederick Lane
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of CybersecurityFrederick Lane
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech DirectorsFrederick Lane
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital MobFrederick Lane
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational ToolFrederick Lane
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social MediaFrederick Lane
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for EducatorsFrederick Lane
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and ProfessionalFrederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEEFrederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?Frederick Lane
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR ProfessionalsFrederick Lane
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEEFrederick Lane
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEEFrederick Lane
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...Frederick Lane
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & CybersecurityFrederick Lane
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get CaughtFrederick Lane
 

More from Frederick Lane (20)

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught
 

Recently uploaded

Transdisciplinary Pathways for Urban Resilience [Work in Progress].pptx
Transdisciplinary Pathways for Urban Resilience [Work in Progress].pptxTransdisciplinary Pathways for Urban Resilience [Work in Progress].pptx
Transdisciplinary Pathways for Urban Resilience [Work in Progress].pptxinfo924062
 
16. Discovery, function and commercial uses of different PGRS.pptx
16. Discovery, function and commercial uses of different PGRS.pptx16. Discovery, function and commercial uses of different PGRS.pptx
16. Discovery, function and commercial uses of different PGRS.pptxUmeshTimilsina1
 
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 11 (CẢ NĂM) - FRIENDS GLOBAL - NĂM HỌC...
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 11 (CẢ NĂM) - FRIENDS GLOBAL - NĂM HỌC...BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 11 (CẢ NĂM) - FRIENDS GLOBAL - NĂM HỌC...
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 11 (CẢ NĂM) - FRIENDS GLOBAL - NĂM HỌC...Nguyen Thanh Tu Collection
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Celine George
 
DBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfDBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfChristalin Nelson
 
Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxryandux83rd
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptxmary850239
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
How to create _name_search function in odoo 17
How to create _name_search function in odoo 17How to create _name_search function in odoo 17
How to create _name_search function in odoo 17Celine George
 
Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsArubSultan
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroomSamsung Business USA
 
Vinícius Portella In Media Res Media Component
Vinícius Portella In Media Res Media ComponentVinícius Portella In Media Res Media Component
Vinícius Portella In Media Res Media ComponentInMediaRes1
 
The role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipThe role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipKarl Donert
 
DiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfDiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfChristalin Nelson
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 

Recently uploaded (20)

Transdisciplinary Pathways for Urban Resilience [Work in Progress].pptx
Transdisciplinary Pathways for Urban Resilience [Work in Progress].pptxTransdisciplinary Pathways for Urban Resilience [Work in Progress].pptx
Transdisciplinary Pathways for Urban Resilience [Work in Progress].pptx
 
16. Discovery, function and commercial uses of different PGRS.pptx
16. Discovery, function and commercial uses of different PGRS.pptx16. Discovery, function and commercial uses of different PGRS.pptx
16. Discovery, function and commercial uses of different PGRS.pptx
 
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 11 (CẢ NĂM) - FRIENDS GLOBAL - NĂM HỌC...
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 11 (CẢ NĂM) - FRIENDS GLOBAL - NĂM HỌC...BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 11 (CẢ NĂM) - FRIENDS GLOBAL - NĂM HỌC...
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 11 (CẢ NĂM) - FRIENDS GLOBAL - NĂM HỌC...
 
Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 
DBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfDBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdf
 
Teaching Critical AI Literacies - Maha Bali
Teaching Critical AI Literacies - Maha BaliTeaching Critical AI Literacies - Maha Bali
Teaching Critical AI Literacies - Maha Bali
 
Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptx
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx
 
Chi-Square Test Non Parametric Test Categorical Variable
Chi-Square Test Non Parametric Test Categorical VariableChi-Square Test Non Parametric Test Categorical Variable
Chi-Square Test Non Parametric Test Categorical Variable
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
How to create _name_search function in odoo 17
How to create _name_search function in odoo 17How to create _name_search function in odoo 17
How to create _name_search function in odoo 17
 
Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristics
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom
 
Vinícius Portella In Media Res Media Component
Vinícius Portella In Media Res Media ComponentVinícius Portella In Media Res Media Component
Vinícius Portella In Media Res Media Component
 
The role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipThe role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenship
 
DiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdfDiskStorage_BasicFileStructuresandHashing.pdf
DiskStorage_BasicFileStructuresandHashing.pdf
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 

2011-04-09 There's No Such Thing as Safe "Sext"

  • 1. There’s No Such Thing as Safe “Sext” How to Protect Your Kids and Your District from Cell Phone Misuse Frederick S. Lane National School Boards Association Annual Conference 4 April 2011 www.FrederickLane.com
  • 2. Seminar Overview What Is Sexting? The Technology of Sexting The Scope of the Problem Why Do Kids Sext? The Legal Issues The Consequences Are Your Policies In Order? Prevention Through Education Age-Appropriate Curricula www.FrederickLane.com
  • 3. Introduction Attorney, Educational Consultant & Lecturer www.FrederickLane.com
  • 4. Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books www.FrederickLane.com
  • 5. Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books Computer Forensics Expert www.FrederickLane.com
  • 6. Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books Computer Forensics Expert 10 Years -- Burlington (VT) School Board www.FrederickLane.com
  • 7. Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books Computer Forensics Expert 10 Years -- Burlington (VT) School Board Technology & Privacy Specialist www.FrederickLane.com
  • 8. Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books Computer Forensics Expert 10 Years -- Burlington (VT) School Board Technology & Privacy Specialist Student Safety Advocate www.FrederickLane.com
  • 9. What Is “Sexting”? www.FrederickLane.com Spring 2008: Old Behavior, New Word No Precise Legal Definition of “Sext” Typically Covered by Federal and State Child Pornography Statutes General Definition: Sending Texts, Photos, or Videos of a Sexual Nature from One Cellphone to Another
  • 10. The Technology of Sexting www.FrederickLane.com SMS – Short Message Service First used in 1992, became popular in 2005/2006 Messages generally limited to 160 characters MMS – Multimedia Messaging Service Introduced in 1998 Enables sending of photos and videos Camera Phones 1997: First publicly-shared photo via phone 2001: Phones introduced with video capability Internet Access 1999: Japan’s NTT DoCoMo introduces mobile Internet
  • 11. The Scope of the Problem - I www.FrederickLane.com Teen Usage of Cellphones Is Rising: Ages 15-18: ~ 84% Ages 10-14: ~ 60% Ages 6-9: ~ 22% The Average Age of First Cellphone Use: < 10 Teens LOVE to Send Texts: Boys (13-17): 2,539 texts per month Girls (13-17): 4,050 texts per month Roughly 90% of cellphones have cameras
  • 12. The Scope of the Problem - II www.FrederickLane.com National Campaign to Prevent Teen and Unplanned Pregnancy (2008): 20% of teens 13-19 said that they had sent/posted nude photos or videos 39% of teens said that they had sent/posted sexually explicit messages Pew Research Center’s Internet & American Life Project (2009) Just 4% of teens 12-17 reported sending nude photos or videos 15 % reported receiving such messages Anecdotal Evidence Suggest These Figures Are Low
  • 13. Why Do Kids Sext? www.FrederickLane.com National Campaign to Prevent Teen and Unplanned Pregnancy (2008): 2/3 of those who sexted sent the content to a boyfriend or girlfriend; 15% of recipients said they forwarded the message to someone else 15% of those who sexted sent the content to someone they knew only online Pew Research Center’s Internet & American Life Project (2009) 82% sent a sext to get attention 67% sent a sext “to be cool” 60% sent a sext to be like the “popular girls” 55% sent a sext to solicit or further a relationship
  • 14. Some Other Reasons It’s Fast and Easy www.FrederickLane.com
  • 15. Some Other Reasons It’s Fast and Easy The Internet www.FrederickLane.com
  • 16. Some Other Reasons It’s Fast and Easy The Internet Porn Chic www.FrederickLane.com
  • 17. Some Other Reasons It’s Fast and Easy The Internet Porn Chic Celebrity Sexting www.FrederickLane.com
  • 18. Some Other Reasons It’s Fast and Easy The Internet Porn Chic Celebrity Sexting Hormones www.FrederickLane.com
  • 19. The Legal Issues A sexually explicit image of an individual under 18* is child pornography Children can be prosecuted for receipt, possession, and/or production There is risk for teachers and school administrators in handling these images Conviction generally results in jail time and registration as a sex offender States are considering “Romeo and Juliet exceptions. www.FrederickLane.com
  • 20. Emotional and Social Impact Short-Term: Embarrassment Bullying, Harassment, Ostracization Sexual Blackmail (Sextortion) Long-Term: Depression and Mental Illness Self-Injury and/or Suicide www.FrederickLane.com
  • 21. Jesse Logan 18 year old high school senior in Ohio Sent nude photos of herself to her boyfriend When they broke up, he forwarded them to various students – 7 schools involved Logan was harassed, taunted, and even physically assaulted because of the photographs In July 2008, Logan committed suicide www.FrederickLane.com
  • 22. Consequences for Students School Sanctions: Violation of various school policies Removal from extracurriculars or school Negative impact on college admissions or jobs Civil Liability: Invasion of privacy (depending on state) Intentional Infliction of Emotional Distress Criminal Prosecution: Federal child pornography statutes (< 18) State child pornography statutes (varies) www.FrederickLane.com
  • 23. Consequences for Districts Disruption of Educational Activities Civil Lawsuits: State anti-bullying statutes (varies) Failure to provide /maintain a safe environment Criminal Liability for Employees: Relationship-Based Crimes Possible investigation / seizure of computers and network Possession / Distribution of Child Pornography www.FrederickLane.com
  • 24. Are Your Policies In Order? Acceptable Use Policies: Does It Describe and Limit Student Use of District Resources? Does It Stress the Importance of and Respect for Personal Privacy? Does It Specifically Describe and Prohibit Illegal Conduct? Anti-Harassment and Anti-Bullying: Does It Encompass Electronic Communications? Does It Encompass Off-Campus Behavior That Affects the Classroom? www.FrederickLane.com
  • 25. Education: It’s What We Do Schedule Annual Information Sessions for Teachers, Parents, and Students Require Students and Parents to Read and Sign AUP and Anti-Bullying Policies Incorporate Sexting and Cyberbullying Into Professional Development for Teachers and Administrators Liaise With Student Resource Officers, Law Enforcement, and Legislators www.FrederickLane.com
  • 26. Age-Appropriate Curricula Elementary School: The Limits of Sharing Personal Boundaries Middle School: Much More on Personal Boundaries Anti-Cyberbullying and Anti-Harassment Introduction to Criminal Consequences and Cyberethics High School: Much More on Criminal Consequences and Cyberethics Long-Term Consequences of Digital Stupidity www.FrederickLane.com
  • 27. Additional Resources Cybertraps for the Young www.CybertrapsfortheYoung.com (beginning 1 August 2011) Download This Presentation: www.FrederickLane.com (http://goo.gl/tWIuX) www.SlideShare.com/FSL3 Contact Me: FSLane3@gmail.com / 802-318-4604 www.FrederickLane.com
  • 28. There’s No Such Thing as Safe “Sext” How to Protect Your Kids and Your District from Cell Phone Misuse Frederick S. Lane National School Boards Association Annual Conference 4 April 2011 www.FrederickLane.com