SlideShare a Scribd company logo
Can You See Me Now?
Frederick S. Lane
Catawba County School District
28 July 2010
The Growing Problem of ‘Sexting’
In the Public Schools
www.FrederickLane.com
Seminar Overview
• Introduction
• Technology & Students
• Cyberbullying & Sexting
• Emotional and Social Consequences
• Legal Consequences
• Warning Signs
• Prevention
• Materials Available at: http://bit.ly/cZJAW9
www.FrederickLane.com
Introduction
• Attorney, Educational
Consultant & Lecturer
www.FrederickLane.com
Introduction
• Attorney, Educational
Consultant & Lecturer
• Author of 5 Books
www.FrederickLane.com
Introduction
• Attorney, Educational
Consultant & Lecturer
• Author of 5 Books
• Computer Forensics
Expert
www.FrederickLane.com
Introduction
• Attorney, Educational
Consultant & Lecturer
• Author of 5 Books
• Computer Forensics
Expert
• Chair, Burlington (VT)
School Board
www.FrederickLane.com
Introduction
• Attorney, Educational
Consultant & Lecturer
• Author of 5 Books
• Computer Forensics
Expert
• Chair, Burlington (VT)
School Board
• Student Safety &
Privacy Advocate
www.FrederickLane.com
Communication
at the Speed of Light
• 1983 – 1st US mobile
call
www.FrederickLane.com
Communication
at the Speed of Light
• 1983 – 1st US mobile
call
• 1995 – Web explodes
www.FrederickLane.com
Communication
at the Speed of Light
• 1983 – 1st US mobile
call
• 1995 – Web explodes
• 1996 – Jennicam
www.FrederickLane.com
Communication
at the Speed of Light
• 1983 – 1st US mobile
call
• 1995 – Web explodes
• 1996 – Jennicam
• 2002 – 1st US camera
phone
www.FrederickLane.com
Communication
at the Speed of Light
• 1983 – 1st US mobile
call
• 1995 – Web explodes
• 1996 – Jennicam
• 2002 – 1st US camera
phone
• 2006 – ½ of all cell
phones have cameras
www.FrederickLane.com
Communication
at the Speed of Light
• 1983 – 1st US mobile
call
• 1995 – Web explodes
• 1996 – Jennicam
• 2002 – 1st US camera
phone
• 2006 – ½ of all cell
phones have cameras
• 2008 – 1.9 billion
camera phones
www.FrederickLane.com
Kids & Cell Phones
• 2001 ~ An estimated 20% have cell phones
• 2001 ~ Cell phone companies discover the
teen market
• 2006 ~ 40% of teens have cell phones
• 2009, that figure doubled to 83%
• More than 50% of kids 8-12 own a phone
• Average age of cell phone ownership :
< 10
www.FrederickLane.com
Amazingly Busy Fingers
• 2008 ~ 900 billion SMS text messages.
• Another 32 billion MMS messages were
sent, a 120% increase over 2007
• 2009 ~ An estimated 250 billion digital
photographs were taken with cell phones
• As phones and networks get more
powerful, number of MMS messages will
rise sharply.
www.FrederickLane.com
Two Definitions
Cyberbullying
• A new twist on old
behavior ….
www.FrederickLane.com
Two Definitions
Cyberbullying
• The use of the
Internet, cell phones,
or other devices to
send or post text or
images intended to
hurt or embarrass
another person
www.FrederickLane.com
Two Definitions
Sexting
• An almost entirely
new behavior …
www.FrederickLane.com
Two Definitions
Sexting
• “The act of sending
sexually explicit
photos, images, or
messages
electronically,
primarily by cell
phone or the Internet”
www.FrederickLane.com
Culture & Sexting
• Television &
Movies
• The Internet
• Porn Chic
www.FrederickLane.com
Culture & Sexting
• Television &
Movies
• The Internet
• Porn Chic
• Celebrity
Sexting
• Hormones
www.FrederickLane.com
The Scope of the Sexting Problem
• Findings of a Fall 2008 study by the
National Campaign to Prevent Teen and
Unplanned Pregnancy:
– 20% of teens 13-19 have sent or posted a nude
photo or video
– 2/3 of those sent the content to a
boyfriend/girlfriend, 15% of whom forwarded it.
– 15% of teens sending nude photos/videos have
sent the content to people they only know
online
www.FrederickLane.com
Sexting Study – April ‘09
• 30% of girls 9-15 have “sexted”
• Typical age to start sending “sexts” – 12
• Typical age to start receiving “sexts” – 10
• Reasons for sending a “sext” message?
– To get attention – 82%
– To be cool – 67%
– To be like the popular girls – 60%
– To find a boyfriend – 55%
www.FrederickLane.com
Sexting Study – December ‘09
• PewInternet and American Life survey of teens 12-17:
• 4% of teens have sexted
• 15% of teens have received a nude or nearly nude
photo of someone they know via MMS
• Incidence of Receipt Rises with Age:
– 4% of 12-year-olds
– 20% of 16-year-olds
– 30% of 17-year-olds
• No statistically significant gender difference
• Significant concern about underreporting
www.FrederickLane.com
WAY Beyond “Kiss and Tell”
• Three Most Common “Sext” Scenarios:
1. Romantic Couple Exchanges Sexts
2. Sext Messages Are Initially Private, but
Are Redistributed by One Individual to
Boast, for Revenge, etc.
3. Individual Solicits Sext as a Prelude to a
Relationship, or As An Offer For One
• No Such Thing As “Casual” or “Safe
Sexts”
www.FrederickLane.com
When Sharing Circles Go Bad
World Wide Web
Email / MMS / Social Networking
Camera phone
www.FrederickLane.com
Endless Distribution Options
Facebook YouTube Flickr
MySpace MetaCafe MobileMe
MyYearbook Zude Hi5
Vimeo Bebo Friendster
Orkut PerfSpot Yahoo
Tagged Vox Xanga
Virb MocoSpace Stickam
Twitter Netlog (mostly Europe) Buzznet
TagWorld HoverSpot GaiaOnline
Prevention and Education
• Clear School District Policies
– Acceptable Use Policies
– Anti-Harassment and Anti-Cyberbullying
• Student & Parent Education
– Personal Privacy Curriculum
• Staff Training
• Law Enforcement & Legislative
Outreach
www.FrederickLane.com
Detection and Response
• Be Aware of What’s Going on in Schools
• Notify Parents
• Interview Faculty, Staff & Students
• Isolate & Lock Down Evidence
• Get Legal / Law Enforcement Help ASAP
• Follow Established Disciplinary
Procedures
• Use as a Teachable Moment
www.FrederickLane.com
Emotional & Social
Consequences
• Short Term:
– Sexual Blackmail
– Bullying, Harassment, & Ostracization
– Embarrassment
• Long Term:
– Depression & Mental Illness
– Loss of Scholarships, Admissions, Jobs
– Self-Injury & Suicide
www.FrederickLane.com
Jesse Logan
• 18 year old high school
senior in Ohio
• Sent nude photos of
herself to her boyfriend
• When they broke up, he
forwarded them to
hundreds of students
• Logan was harassed,
taunted, and even
physically assaulted
because of the
photographs
• In July 2008, Logan
committed suicide
www.FrederickLane.com
Student Legal Consequences
• School Sanctions:
– Violation of various school policies
– Removal from extra-curriculars or school
• Civil Liability:
– Intentional Infliction of Emotional Distress
– Invasion of privacy (depending on state)
• Criminal Prosecution:
– Federal child pornography statutes (< 18)
– State child pornography statutes (varies)
www.FrederickLane.com
Relevant Child Pornography Laws
• Federal Law:
– 18 U.S.C. § 2252A – Elements of Crime & Penalties
– 18 U.S.C. § 2256 – Definitions
– Jail time can range from 5 to 20 years
• North Carolina Law:
– N.C. GEN. STAT. § 14-190.16. First degree sexual
exploitation of a minor (pecuniary gain)
– N.C. GEN. STAT. § 14-190.17. First degree sexual
exploitation of a minor (no pecuniary gain)
– N.C. GEN. STAT. § 14-190.17A. Third degree sexual
exploitation of a minor (possession)
www.FrederickLane.com
District Legal Consequences
• Disruption of Educational Activities:
– Possible investigation / seizure of network
• Criminal Liability for Employees:
– Relationship-Based Crimes
– Possession / Distribution of Child Pornography
• Civil Lawsuits
– Failure to provide /maintain a safe environment
– State child pornography statutes (varies)
www.FrederickLane.com
Changing Legal Landscape
• Vermont, 2009
– Gives prosecutors discretion in handling sexting
cases involving 13-17 year olds
• North Carolina, 2009
– Adopts law making cyberbullying a misdemeanor
• A Few Other States Considering Similar
Measures
• Miller v. Mitchell (3rd Cir. Mar. 17, 2010)
– Tunkhannock, PA sexting case
• Massachusetts, 2010
– “An Act Relative to Bullying in Schools”
– Response to the suicides of two Mass. students
www.FrederickLane.com
Additional Resources
• CommonSenseMedia.org
• WiredSafety.org
• FBI “A Parent’s Guide to Internet Safety” --
http://www.fbi.gov/publications/pguide/pg
uidee.htm
• iKeepSafe.org
• iSafe.org
www.FrederickLane.com
Materials and Feedback
• You Can Download a PDF of the Slides at:
http://bit.ly/cZJAW9
• Please take a couple of minutes and fill out
my online feedback survey at:
– AM: http://bit.ly/anSv7e
– PM: http://bit.ly/diEWOW
– Parents: http://bit.ly/dqYxMJ
www.FrederickLane.com
Can You See Me Now?
Frederick S. Lane
Catawba County School District
28 July 2010
The Growing Problem of ‘Sexting’
In the Public Schools
www.FrederickLane.com

More Related Content

What's hot

We need to talk about porn
We need to talk about pornWe need to talk about porn
We need to talk about porn
Maryrose Lyons
 
Social media and inappropriate behaviour
Social media and inappropriate behaviourSocial media and inappropriate behaviour
Social media and inappropriate behaviour
cpsocialmedia
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
Lockley
 
Cyber Bullying and Sexting
Cyber Bullying and SextingCyber Bullying and Sexting
Cyber Bullying and Sextingmathman314
 
Living in a #metoo World
Living in a #metoo WorldLiving in a #metoo World
Living in a #metoo World
BoyarMiller
 
#MeToo in the Workplace
#MeToo in the Workplace#MeToo in the Workplace
#MeToo in the Workplace
benefitexpress
 
Internet safety-Dustin Rovery
Internet safety-Dustin RoveryInternet safety-Dustin Rovery
Internet safety-Dustin RoveryDRovery
 
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Safer Internet Forum 2010 (European Commission)
 
Pornography and Censorship
Pornography and CensorshipPornography and Censorship
Pornography and Censorship
JemFlorece
 
Social Media and Litigation Nov 2011
Social Media and Litigation Nov 2011Social Media and Litigation Nov 2011
Social Media and Litigation Nov 2011
LexisNexis
 
Right wing views for generation z,PragarU.com
Right wing views for generation z,PragarU.com Right wing views for generation z,PragarU.com
Right wing views for generation z,PragarU.com
Brainventures
 
Online Safety for Learners
Online Safety for LearnersOnline Safety for Learners
Online Safety for Learners
The Pathway Group
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
tackleglass54
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
Memorial University
 
Internet law and safety
Internet law and safetyInternet law and safety
Internet law and safety
jbarrettsrq
 
Think Before You Post
Think Before You PostThink Before You Post
Think Before You Post
frostburg
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingkpwillia
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
grp4.ed451
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
malissa_1041
 
Censorship essay (2)
Censorship essay (2)Censorship essay (2)
Censorship essay (2)OliviaBolt
 

What's hot (20)

We need to talk about porn
We need to talk about pornWe need to talk about porn
We need to talk about porn
 
Social media and inappropriate behaviour
Social media and inappropriate behaviourSocial media and inappropriate behaviour
Social media and inappropriate behaviour
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
 
Cyber Bullying and Sexting
Cyber Bullying and SextingCyber Bullying and Sexting
Cyber Bullying and Sexting
 
Living in a #metoo World
Living in a #metoo WorldLiving in a #metoo World
Living in a #metoo World
 
#MeToo in the Workplace
#MeToo in the Workplace#MeToo in the Workplace
#MeToo in the Workplace
 
Internet safety-Dustin Rovery
Internet safety-Dustin RoveryInternet safety-Dustin Rovery
Internet safety-Dustin Rovery
 
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
 
Pornography and Censorship
Pornography and CensorshipPornography and Censorship
Pornography and Censorship
 
Social Media and Litigation Nov 2011
Social Media and Litigation Nov 2011Social Media and Litigation Nov 2011
Social Media and Litigation Nov 2011
 
Right wing views for generation z,PragarU.com
Right wing views for generation z,PragarU.com Right wing views for generation z,PragarU.com
Right wing views for generation z,PragarU.com
 
Online Safety for Learners
Online Safety for LearnersOnline Safety for Learners
Online Safety for Learners
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Social Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and TeachersSocial Networks and Cyberbullying: Implications for Students and Teachers
Social Networks and Cyberbullying: Implications for Students and Teachers
 
Internet law and safety
Internet law and safetyInternet law and safety
Internet law and safety
 
Think Before You Post
Think Before You PostThink Before You Post
Think Before You Post
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Censorship essay (2)
Censorship essay (2)Censorship essay (2)
Censorship essay (2)
 

Viewers also liked

2015-09-16 Social Media and Emerging Applications: Investigative Potential an...
2015-09-16 Social Media and Emerging Applications: Investigative Potential an...2015-09-16 Social Media and Emerging Applications: Investigative Potential an...
2015-09-16 Social Media and Emerging Applications: Investigative Potential an...
Frederick Lane
 
2015-02-24 Cybertraps for Educators
2015-02-24 Cybertraps for Educators2015-02-24 Cybertraps for Educators
2015-02-24 Cybertraps for Educators
Frederick Lane
 
2015-09-17 To Serve & Inspect: Digital Challenges for School Resource Officers
2015-09-17 To Serve & Inspect: Digital Challenges for School Resource Officers2015-09-17 To Serve & Inspect: Digital Challenges for School Resource Officers
2015-09-17 To Serve & Inspect: Digital Challenges for School Resource Officers
Frederick Lane
 
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
Frederick Lane
 
2015-10-30 Minimizing the Risk of Cybertraps for Educators
2015-10-30 Minimizing the Risk of Cybertraps for Educators2015-10-30 Minimizing the Risk of Cybertraps for Educators
2015-10-30 Minimizing the Risk of Cybertraps for Educators
Frederick Lane
 
2010-09-10 The Serpentine Wall
2010-09-10 The Serpentine Wall2010-09-10 The Serpentine Wall
2010-09-10 The Serpentine Wall
Frederick Lane
 
2015-10-19 Teens, Technology, and Suicide: Understanding Causes, Effects, and...
2015-10-19 Teens, Technology, and Suicide: Understanding Causes, Effects, and...2015-10-19 Teens, Technology, and Suicide: Understanding Causes, Effects, and...
2015-10-19 Teens, Technology, and Suicide: Understanding Causes, Effects, and...
Frederick Lane
 
New appellations of France
New appellations of FranceNew appellations of France
New appellations of FranceMGM Sommelier
 
2013-04-02 Cybertraps for Educators
2013-04-02 Cybertraps for Educators2013-04-02 Cybertraps for Educators
2013-04-02 Cybertraps for Educators
Frederick Lane
 
2013-10-18 Computer Forensics and Hash Values
2013-10-18 Computer Forensics and Hash Values2013-10-18 Computer Forensics and Hash Values
2013-10-18 Computer Forensics and Hash Values
Frederick Lane
 
2014-11-06 Texting, Tweeting, Teens, and Teachers
2014-11-06 Texting, Tweeting, Teens, and Teachers2014-11-06 Texting, Tweeting, Teens, and Teachers
2014-11-06 Texting, Tweeting, Teens, and Teachers
Frederick Lane
 
2014-08-07 iParentSmart
2014-08-07 iParentSmart2014-08-07 iParentSmart
2014-08-07 iParentSmart
Frederick Lane
 
Avoiding Cybertraps
Avoiding CybertrapsAvoiding Cybertraps
Avoiding Cybertraps
Frederick Lane
 
2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers
Frederick Lane
 
Texting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and TeachersTexting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and Teachers
Frederick Lane
 
2014-07-08 Digital Citizenship Curricula, K-12
2014-07-08 Digital Citizenship Curricula, K-122014-07-08 Digital Citizenship Curricula, K-12
2014-07-08 Digital Citizenship Curricula, K-12
Frederick Lane
 

Viewers also liked (20)

2015-09-16 Social Media and Emerging Applications: Investigative Potential an...
2015-09-16 Social Media and Emerging Applications: Investigative Potential an...2015-09-16 Social Media and Emerging Applications: Investigative Potential an...
2015-09-16 Social Media and Emerging Applications: Investigative Potential an...
 
2015-02-24 Cybertraps for Educators
2015-02-24 Cybertraps for Educators2015-02-24 Cybertraps for Educators
2015-02-24 Cybertraps for Educators
 
2015-09-17 To Serve & Inspect: Digital Challenges for School Resource Officers
2015-09-17 To Serve & Inspect: Digital Challenges for School Resource Officers2015-09-17 To Serve & Inspect: Digital Challenges for School Resource Officers
2015-09-17 To Serve & Inspect: Digital Challenges for School Resource Officers
 
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
 
2015-10-30 Minimizing the Risk of Cybertraps for Educators
2015-10-30 Minimizing the Risk of Cybertraps for Educators2015-10-30 Minimizing the Risk of Cybertraps for Educators
2015-10-30 Minimizing the Risk of Cybertraps for Educators
 
2010-09-10 The Serpentine Wall
2010-09-10 The Serpentine Wall2010-09-10 The Serpentine Wall
2010-09-10 The Serpentine Wall
 
2015-10-19 Teens, Technology, and Suicide: Understanding Causes, Effects, and...
2015-10-19 Teens, Technology, and Suicide: Understanding Causes, Effects, and...2015-10-19 Teens, Technology, and Suicide: Understanding Causes, Effects, and...
2015-10-19 Teens, Technology, and Suicide: Understanding Causes, Effects, and...
 
Piedmont
PiedmontPiedmont
Piedmont
 
New appellations of France
New appellations of FranceNew appellations of France
New appellations of France
 
4k Gebed
4k Gebed4k Gebed
4k Gebed
 
Chile
ChileChile
Chile
 
2013-04-02 Cybertraps for Educators
2013-04-02 Cybertraps for Educators2013-04-02 Cybertraps for Educators
2013-04-02 Cybertraps for Educators
 
Wine Education
Wine EducationWine Education
Wine Education
 
2013-10-18 Computer Forensics and Hash Values
2013-10-18 Computer Forensics and Hash Values2013-10-18 Computer Forensics and Hash Values
2013-10-18 Computer Forensics and Hash Values
 
2014-11-06 Texting, Tweeting, Teens, and Teachers
2014-11-06 Texting, Tweeting, Teens, and Teachers2014-11-06 Texting, Tweeting, Teens, and Teachers
2014-11-06 Texting, Tweeting, Teens, and Teachers
 
2014-08-07 iParentSmart
2014-08-07 iParentSmart2014-08-07 iParentSmart
2014-08-07 iParentSmart
 
Avoiding Cybertraps
Avoiding CybertrapsAvoiding Cybertraps
Avoiding Cybertraps
 
2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers
 
Texting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and TeachersTexting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and Teachers
 
2014-07-08 Digital Citizenship Curricula, K-12
2014-07-08 Digital Citizenship Curricula, K-122014-07-08 Digital Citizenship Curricula, K-12
2014-07-08 Digital Citizenship Curricula, K-12
 

Similar to 2010-07-28 Can You See Me Now?

2010-11-02 Cybertraps for the Elderly
2010-11-02 Cybertraps for the Elderly2010-11-02 Cybertraps for the Elderly
2010-11-02 Cybertraps for the Elderly
Frederick Lane
 
2015-02-12 Cybertraps for the Young
2015-02-12 Cybertraps for the Young2015-02-12 Cybertraps for the Young
2015-02-12 Cybertraps for the Young
Frederick Lane
 
102009
102009102009
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internetVictor Font
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
autumnowens25
 
Internet Safety For Kids By Tanmay
Internet Safety For Kids By TanmayInternet Safety For Kids By Tanmay
Internet Safety For Kids By Tanmay
tsdikshit
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
kguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
kguerrazzi
 
Social networks
Social networksSocial networks
Social networksdrlizmike
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
springvillegi
 
2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators
Frederick Lane
 
Online safety
Online safetyOnline safety
Online safety
Veronica Alejandro
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
KanelandSvihlik
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
Sage Lewis
 
2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young
Frederick Lane
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
Eric Cedo
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsCreepSquash
 

Similar to 2010-07-28 Can You See Me Now? (20)

2010-11-02 Cybertraps for the Elderly
2010-11-02 Cybertraps for the Elderly2010-11-02 Cybertraps for the Elderly
2010-11-02 Cybertraps for the Elderly
 
2015-02-12 Cybertraps for the Young
2015-02-12 Cybertraps for the Young2015-02-12 Cybertraps for the Young
2015-02-12 Cybertraps for the Young
 
102009
102009102009
102009
 
Youth, Sex & the Internet: What practitioners need to know
Youth, Sex & the Internet:  What practitioners need to knowYouth, Sex & the Internet:  What practitioners need to know
Youth, Sex & the Internet: What practitioners need to know
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internet
 
Trends and characteristics of youth Internet victimization
Trends and characteristics of youth Internet victimizationTrends and characteristics of youth Internet victimization
Trends and characteristics of youth Internet victimization
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Internet Safety For Kids By Tanmay
Internet Safety For Kids By TanmayInternet Safety For Kids By Tanmay
Internet Safety For Kids By Tanmay
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Social networks
Social networksSocial networks
Social networks
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators
 
Online safety
Online safetyOnline safety
Online safety
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
 
Finalproject
FinalprojectFinalproject
Finalproject
 
2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 

More from Frederick Lane

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator
Frederick Lane
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators
Frederick Lane
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity
Frederick Lane
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors
Frederick Lane
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob
Frederick Lane
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool
Frederick Lane
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media
Frederick Lane
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators
Frederick Lane
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
Frederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
Frederick Lane
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE
Frederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
Frederick Lane
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?
Frederick Lane
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals
Frederick Lane
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE
Frederick Lane
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers
Frederick Lane
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE
Frederick Lane
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
Frederick Lane
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
Frederick Lane
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught
Frederick Lane
 

More from Frederick Lane (20)

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught
 

Recently uploaded

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 

Recently uploaded (20)

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 

2010-07-28 Can You See Me Now?

  • 1. Can You See Me Now? Frederick S. Lane Catawba County School District 28 July 2010 The Growing Problem of ‘Sexting’ In the Public Schools www.FrederickLane.com
  • 2. Seminar Overview • Introduction • Technology & Students • Cyberbullying & Sexting • Emotional and Social Consequences • Legal Consequences • Warning Signs • Prevention • Materials Available at: http://bit.ly/cZJAW9 www.FrederickLane.com
  • 3. Introduction • Attorney, Educational Consultant & Lecturer www.FrederickLane.com
  • 4. Introduction • Attorney, Educational Consultant & Lecturer • Author of 5 Books www.FrederickLane.com
  • 5. Introduction • Attorney, Educational Consultant & Lecturer • Author of 5 Books • Computer Forensics Expert www.FrederickLane.com
  • 6. Introduction • Attorney, Educational Consultant & Lecturer • Author of 5 Books • Computer Forensics Expert • Chair, Burlington (VT) School Board www.FrederickLane.com
  • 7. Introduction • Attorney, Educational Consultant & Lecturer • Author of 5 Books • Computer Forensics Expert • Chair, Burlington (VT) School Board • Student Safety & Privacy Advocate www.FrederickLane.com
  • 8. Communication at the Speed of Light • 1983 – 1st US mobile call www.FrederickLane.com
  • 9. Communication at the Speed of Light • 1983 – 1st US mobile call • 1995 – Web explodes www.FrederickLane.com
  • 10. Communication at the Speed of Light • 1983 – 1st US mobile call • 1995 – Web explodes • 1996 – Jennicam www.FrederickLane.com
  • 11. Communication at the Speed of Light • 1983 – 1st US mobile call • 1995 – Web explodes • 1996 – Jennicam • 2002 – 1st US camera phone www.FrederickLane.com
  • 12. Communication at the Speed of Light • 1983 – 1st US mobile call • 1995 – Web explodes • 1996 – Jennicam • 2002 – 1st US camera phone • 2006 – ½ of all cell phones have cameras www.FrederickLane.com
  • 13. Communication at the Speed of Light • 1983 – 1st US mobile call • 1995 – Web explodes • 1996 – Jennicam • 2002 – 1st US camera phone • 2006 – ½ of all cell phones have cameras • 2008 – 1.9 billion camera phones www.FrederickLane.com
  • 14. Kids & Cell Phones • 2001 ~ An estimated 20% have cell phones • 2001 ~ Cell phone companies discover the teen market • 2006 ~ 40% of teens have cell phones • 2009, that figure doubled to 83% • More than 50% of kids 8-12 own a phone • Average age of cell phone ownership : < 10 www.FrederickLane.com
  • 15. Amazingly Busy Fingers • 2008 ~ 900 billion SMS text messages. • Another 32 billion MMS messages were sent, a 120% increase over 2007 • 2009 ~ An estimated 250 billion digital photographs were taken with cell phones • As phones and networks get more powerful, number of MMS messages will rise sharply. www.FrederickLane.com
  • 16. Two Definitions Cyberbullying • A new twist on old behavior …. www.FrederickLane.com
  • 17. Two Definitions Cyberbullying • The use of the Internet, cell phones, or other devices to send or post text or images intended to hurt or embarrass another person www.FrederickLane.com
  • 18. Two Definitions Sexting • An almost entirely new behavior … www.FrederickLane.com
  • 19. Two Definitions Sexting • “The act of sending sexually explicit photos, images, or messages electronically, primarily by cell phone or the Internet” www.FrederickLane.com
  • 20. Culture & Sexting • Television & Movies • The Internet • Porn Chic www.FrederickLane.com
  • 21. Culture & Sexting • Television & Movies • The Internet • Porn Chic • Celebrity Sexting • Hormones www.FrederickLane.com
  • 22. The Scope of the Sexting Problem • Findings of a Fall 2008 study by the National Campaign to Prevent Teen and Unplanned Pregnancy: – 20% of teens 13-19 have sent or posted a nude photo or video – 2/3 of those sent the content to a boyfriend/girlfriend, 15% of whom forwarded it. – 15% of teens sending nude photos/videos have sent the content to people they only know online www.FrederickLane.com
  • 23. Sexting Study – April ‘09 • 30% of girls 9-15 have “sexted” • Typical age to start sending “sexts” – 12 • Typical age to start receiving “sexts” – 10 • Reasons for sending a “sext” message? – To get attention – 82% – To be cool – 67% – To be like the popular girls – 60% – To find a boyfriend – 55% www.FrederickLane.com
  • 24. Sexting Study – December ‘09 • PewInternet and American Life survey of teens 12-17: • 4% of teens have sexted • 15% of teens have received a nude or nearly nude photo of someone they know via MMS • Incidence of Receipt Rises with Age: – 4% of 12-year-olds – 20% of 16-year-olds – 30% of 17-year-olds • No statistically significant gender difference • Significant concern about underreporting www.FrederickLane.com
  • 25. WAY Beyond “Kiss and Tell” • Three Most Common “Sext” Scenarios: 1. Romantic Couple Exchanges Sexts 2. Sext Messages Are Initially Private, but Are Redistributed by One Individual to Boast, for Revenge, etc. 3. Individual Solicits Sext as a Prelude to a Relationship, or As An Offer For One • No Such Thing As “Casual” or “Safe Sexts” www.FrederickLane.com
  • 26. When Sharing Circles Go Bad World Wide Web Email / MMS / Social Networking Camera phone www.FrederickLane.com
  • 27. Endless Distribution Options Facebook YouTube Flickr MySpace MetaCafe MobileMe MyYearbook Zude Hi5 Vimeo Bebo Friendster Orkut PerfSpot Yahoo Tagged Vox Xanga Virb MocoSpace Stickam Twitter Netlog (mostly Europe) Buzznet TagWorld HoverSpot GaiaOnline
  • 28. Prevention and Education • Clear School District Policies – Acceptable Use Policies – Anti-Harassment and Anti-Cyberbullying • Student & Parent Education – Personal Privacy Curriculum • Staff Training • Law Enforcement & Legislative Outreach www.FrederickLane.com
  • 29. Detection and Response • Be Aware of What’s Going on in Schools • Notify Parents • Interview Faculty, Staff & Students • Isolate & Lock Down Evidence • Get Legal / Law Enforcement Help ASAP • Follow Established Disciplinary Procedures • Use as a Teachable Moment www.FrederickLane.com
  • 30. Emotional & Social Consequences • Short Term: – Sexual Blackmail – Bullying, Harassment, & Ostracization – Embarrassment • Long Term: – Depression & Mental Illness – Loss of Scholarships, Admissions, Jobs – Self-Injury & Suicide www.FrederickLane.com
  • 31. Jesse Logan • 18 year old high school senior in Ohio • Sent nude photos of herself to her boyfriend • When they broke up, he forwarded them to hundreds of students • Logan was harassed, taunted, and even physically assaulted because of the photographs • In July 2008, Logan committed suicide www.FrederickLane.com
  • 32. Student Legal Consequences • School Sanctions: – Violation of various school policies – Removal from extra-curriculars or school • Civil Liability: – Intentional Infliction of Emotional Distress – Invasion of privacy (depending on state) • Criminal Prosecution: – Federal child pornography statutes (< 18) – State child pornography statutes (varies) www.FrederickLane.com
  • 33. Relevant Child Pornography Laws • Federal Law: – 18 U.S.C. § 2252A – Elements of Crime & Penalties – 18 U.S.C. § 2256 – Definitions – Jail time can range from 5 to 20 years • North Carolina Law: – N.C. GEN. STAT. § 14-190.16. First degree sexual exploitation of a minor (pecuniary gain) – N.C. GEN. STAT. § 14-190.17. First degree sexual exploitation of a minor (no pecuniary gain) – N.C. GEN. STAT. § 14-190.17A. Third degree sexual exploitation of a minor (possession) www.FrederickLane.com
  • 34. District Legal Consequences • Disruption of Educational Activities: – Possible investigation / seizure of network • Criminal Liability for Employees: – Relationship-Based Crimes – Possession / Distribution of Child Pornography • Civil Lawsuits – Failure to provide /maintain a safe environment – State child pornography statutes (varies) www.FrederickLane.com
  • 35. Changing Legal Landscape • Vermont, 2009 – Gives prosecutors discretion in handling sexting cases involving 13-17 year olds • North Carolina, 2009 – Adopts law making cyberbullying a misdemeanor • A Few Other States Considering Similar Measures • Miller v. Mitchell (3rd Cir. Mar. 17, 2010) – Tunkhannock, PA sexting case • Massachusetts, 2010 – “An Act Relative to Bullying in Schools” – Response to the suicides of two Mass. students www.FrederickLane.com
  • 36. Additional Resources • CommonSenseMedia.org • WiredSafety.org • FBI “A Parent’s Guide to Internet Safety” -- http://www.fbi.gov/publications/pguide/pg uidee.htm • iKeepSafe.org • iSafe.org www.FrederickLane.com
  • 37. Materials and Feedback • You Can Download a PDF of the Slides at: http://bit.ly/cZJAW9 • Please take a couple of minutes and fill out my online feedback survey at: – AM: http://bit.ly/anSv7e – PM: http://bit.ly/diEWOW – Parents: http://bit.ly/dqYxMJ www.FrederickLane.com
  • 38. Can You See Me Now? Frederick S. Lane Catawba County School District 28 July 2010 The Growing Problem of ‘Sexting’ In the Public Schools www.FrederickLane.com