This document discusses cyber-bullying and provides guidance on how to respond. It defines cyber-bullying as using technology to hurt, scare or embarrass others. It advises never posting anything online that you wouldn't want the world to see and to think before responding to inappropriate messages. The document also notes that cyber-bullying is illegal and outlines the crime of criminal harassment. It encourages speaking up if witnessing cyber-bullying and reporting any incidents to a trusted adult.
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Scott Mills
Boost For Kids sponsored "Social Media For Investigations" education protocol training at Toronto Police College. Presentation slides of Detective Jeff Bangild
Presentation Title: Cyber Harassment
Group members:
Eman anjum
Zil e huma nisar
Maheen asif
Shafia fahim
Maida haroon
This presentation was presented by the students of Mass communication on 30th Sept, 2013 at University Management and Technology.
Teacher’s Remarks
Main ideas: unambiguous
Background information: Satisfactory
Audience attention: maximum
Accent: Good
Eye contact with the audience: Encouraging.
Voice: strong and clear, not a monotone.
Others: Easy to read, and have impact, Gestures are natural.
Teacher: Muhammad Ahmad Sheikh
ideas: unambiguous
Background information: Satisfactory
Audience attention: maximum
Accent: Good
Eye contact with the audience: Encouraging.
Voice: strong and clear, not a monotone.
Others: Easy to read, and have impact, Gestures are natural.
Teacher: Muhammad Ahmad Sheikh
Exploring Career Paths in Cybersecurity for Technical CommunicatorsBen Woelk, CISSP, CPTC
Brief overview of career options in cybersecurity for technical communicators. Includes discussion of my career path, certification options, NICE and NIST resources.
NIDM (National Institute Of Digital Marketing) Bangalore Is One Of The Leading & best Digital Marketing Institute In Bangalore, India And We Have Brand Value For The Quality Of Education Which We Provide.
www.nidmindia.com
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Scott Mills
Boost For Kids sponsored "Social Media For Investigations" education protocol training at Toronto Police College. Presentation slides of Detective Jeff Bangild
Presentation Title: Cyber Harassment
Group members:
Eman anjum
Zil e huma nisar
Maheen asif
Shafia fahim
Maida haroon
This presentation was presented by the students of Mass communication on 30th Sept, 2013 at University Management and Technology.
Teacher’s Remarks
Main ideas: unambiguous
Background information: Satisfactory
Audience attention: maximum
Accent: Good
Eye contact with the audience: Encouraging.
Voice: strong and clear, not a monotone.
Others: Easy to read, and have impact, Gestures are natural.
Teacher: Muhammad Ahmad Sheikh
ideas: unambiguous
Background information: Satisfactory
Audience attention: maximum
Accent: Good
Eye contact with the audience: Encouraging.
Voice: strong and clear, not a monotone.
Others: Easy to read, and have impact, Gestures are natural.
Teacher: Muhammad Ahmad Sheikh
Exploring Career Paths in Cybersecurity for Technical CommunicatorsBen Woelk, CISSP, CPTC
Brief overview of career options in cybersecurity for technical communicators. Includes discussion of my career path, certification options, NICE and NIST resources.
NIDM (National Institute Of Digital Marketing) Bangalore Is One Of The Leading & best Digital Marketing Institute In Bangalore, India And We Have Brand Value For The Quality Of Education Which We Provide.
www.nidmindia.com
New Explore Careers and College Majors 2024.pdfDr. Mary Askew
Explore Careers and College Majors is a new online, interactive, self-guided career, major and college planning system.
The career system works on all devices!
For more Information, go to https://bit.ly/3SW5w8W
5. CYBER-BULLYING
Never send an e-mail, IM, text message in
anger
Remember that you are not anonymous
You never know what is going on in
someone else’s life. Try to put yourself in
their shoes before you answer inappropriate
messages. Think first, type second.
6. YOU ARE NOT ANONYMOUS
67.128.54.206
Internet Protocol Address. Like a telephone
number. You cannot access the Internet
without one. 67.128.54.206
The ISP that owns an IP address is located
through Internet directories.
To find out the user, the date and time of the
Internet message is needed; then legal process
is sent to the ISP.
7. CYBER-BULLYING
Have the courage to speak up if you notice
anyone cyber-bullying. Say that this is
wrong and that you are not going to keep it
a secret.
8. CYBER-BULLYING
If you get an upsetting message or see
something that is attacking you: Do not
reply. Do not delete. Save the message,
print it if you can and get help from an adult
you trust. If one adult does not help you,
keep asking until you get the help you need.
9. Responsive Action
Try not to “flip out.”
Determining the scope of the problem.
Life threatening, immediate risk, someone else in immediate
risk
If there is a crime call the police:
Save all printouts. They’re admissible in court and
corroborate the victim. They also lend some helpful
clues to identifying the perpetrator.
Time is of the essence.
10. IT IS ILLEGAL TO:
Threaten people over the Internet
Harass or bully anyone
Use someone else’s ID without
permission
Access other people’s computer
systems without permission
Send inappropriate photos to other
kids
11. Criminal Harassment
•This crime applies to most cyber-bullying
incidents.
•The conduct must be serious enough that a
reasonable person would suffer substantial
emotional distress.
•There must be three events over a period of
time. In person, over the phone or Internet.
12. § 43A. Criminal Harassment.
(a) Whoever willfully and maliciously engages in a knowing
pattern of conduct or series of acts over a period of time
directed at a specific person, which seriously alarms that
person and would cause a reasonable person to suffer
substantial emotional distress, shall be guilty of the crime
of criminal harassment and shall be punished by
imprisonment in a house of correction for not more than
two and one–half years or by a fine of not more than
$1,000, or by both such fine and imprisonment. Such
conduct or acts described in this paragraph shall include,
but not be limited to, conduct or acts conducted by mail or
by use of a telephonic or telecommunication device
including, but not limited to, electronic mail, internet
communications or facsimile communications.
13. § 43A. Criminal Harassment.
(cont.)
(b) Whoever, after having been convicted of the
crime of criminal harassment, commits a second
or subsequent crime, or whoever commits the
crime of criminal harassment having previously
been convicted of a violation of section 43, shall
be punished by imprisonment in a house of such
correction for not more than two and one–half
years or by imprisonment in the state prison for
not more than ten years.
History
History— 2000, 164, approved Aug 1, 2000,
effective Oct 30, 2000.
14. IN CONCLUSION
DO NOT PARTICIPATE IN CYBER-BULLYING
REPORT ANY INCIDENTS OF CYBER-
BULLYING TO A TRUSTED ADULT OR THE
POLICE
PLYMOUTH POLICE
20 Long Pond Road
Plymouth, MA
Business Line
(508) 840-4218