SlideShare a Scribd company logo
Cyberbullying, Sexting and Social Networking
© Arlen Kimmelman , Ed.M., M.A., NBCT                   NJASL, December 3-4, 2010

Program Objectives: What three things will participants learn from this session that can be
implemented?

   1. Familiarization with the applicable state and federal laws associated with potentially

      disrupting electronic communications

   2. Suggestions for implementing effective school or district policies regarding electronic

      communications

   3. Tips for safe use of electronic communications by both student and staff


              Adapted from presentation to CRHS administration on 3/30/2010
         by Arlen Kimmelman, Librarian, Clearview Regional HS: http://bit.ly/dn3IHA
Cyberbullying, Sexting and Social Networking
© Arlen Kimmelman , Ed.M., M.A., NBCT                   NJASL, December 3-4, 2010

Part 1: Familiarization with the applicable state and federal laws associated with
potentially disrupting electronic communications
NJ Legislature
      I. Bill Search: http://www.njleg.state.nj.us/Default.asp
     II. Statutes: http://bit.ly/1gmH4c
    III. Email notification for selected bills:
         http://www.njleg.state.nj.us/bills/BillsSubscriptionLogin.asp

NJ Cyberbullying Law as of July 2010                       : http://bit.ly/bvAEXM
Relevant NJ Bills in 2010-2011 Session:
Cyberbullying: http://www.njleg.state.nj.us/2010/Bills/A3500/3328_I1.HTM
Harassment: http://www.njleg.state.nj.us/2010/Bills/A3500/3409_I1.HTM
Sexting: http://www.njleg.state.nj.us/2010/Bills/A2000/1561_I1.HTM
Social networking: http://www.njleg.state.nj.us/2010/Bills/A3000/2689_I1.HTM
                    http://www.njleg.state.nj.us/2010/Bills/S0500/326_I1.HTM
Relevant Keyword Searches in NJ Statutes:
„Child‟/„Internet‟: 2C:43-3.8 : http://bit.ly/9pN8Uv and 2C:7-2: http://bit.ly/9d3x1G
„Bullying‟: 18A:37-15.1 : http://bit.ly/bh0Fes and
                     complete search results for „Bullying‟ http://bit.ly/8YxXxB
                       Note: definitions in 18A:37-14 http://bit.ly/cqM6OX
„Online‟: 52:17B-193: http://bit.ly/aglbL7 and 2C:43-3.8: http://bit.ly/9tiVKE
„Sexting‟: NONE!
„Texting‟: NONE!
„Social Networking‟: NONE!
NJ’s County Prosecutors: http://bit.ly/cc9phx
There Isn‘t A Moment To Lose: An Urgent Call for Legal Reform and Effective Practices to
Combat Bullying in New Jersey Schools, Report of the New Jersey Commission on Bullying in
Schools, December 15, 2009, http://bit.ly/azTkJX
      Table of Contents
      Brief Overview of Findings and Recommendations ..................................................1
      Summary of Findings ......................................................................................................5
      Summary of Recommendations ......................................................................................6
      Background on the New Jersey Commission on Bullying in Schools .............................8
      Overview of Current State of Laws Pertaining to Bullying Issues .........................11
      The New Jersey Law Against Discrimination (LAD) Also Provides
              Limited Protections for Some Victims of HIB .....................................................12
      The New Jersey Bias Intimidation (BI) Statute Provides Limited Protections
              for Victims of Criminal Conduct That Sometimes Includes HIB .........................12
      The New Jersey Anti-Bullying Law as the Principal Legal Mechanism
              for Addressing HIB in Schools .......................................................................14
      Recommendation #1-22: ..........................................................................................14-43
      Conclusion and Appendices .....................................................................................46-62
Cyberbullying, Sexting and Social Networking
© Arlen Kimmelman , Ed.M., M.A., NBCT                   NJASL, December 3-4, 2010

Part 2: Suggestions for implementing effective school or district policies regarding
electronic communications

My School‟s Policies: http://writer.zoho.com/public/pseudandry/schoolpolicies

Social Networking Primer for School Boards: http://bit.ly/dopTUC

New Jersey‟s Model Policy and Guidance for Prohibiting Harassment, Intimidation and Bullying
on School Property, at School-Sponsored Functions and on School Buses (Revised November
2008) http://www.state.nj.us/education/parents/bully.pdf




Reviewing and Updating Your Harassment, Intimidation and Bullying Policy Tip Sheet from
Rutgers http://bit.ly/aNWRXq

Section #2 – Statute and Regulatory Requirement
The policy shall contain a definition of harassment, intimidation or bullying, no less inclusive
than the definition set forth in the model policy. N.J.S.A. 18A:37-15(3)(b)(2) and N.J.A.C.
6A:16-7.9(a) 2ii
Issues for Consideration in Local Policy Development
1. Does the policy address bullying incidents not motivated by characteristics such as the
   target‟s race, color, religion, gender, or sexual orientation?
2. Do district policies and procedures address and impose consequences for acts of HIB that
   occur off of school grounds including all forms of electronic communication, such as cyber-
   bullying?
3. Does the definition of HIB include “any electronic communication?”
4. Does the policy provide clear examples of what is meant by “electronic communication?”


Resources from University of San Diego School of Leadership and Education Sciences,
Center for Education Policy and Law:

A. Helping School Personnel Control Student Misuse of Electronic Communication Devices
   On and Off Campus - October 2010,
      University of San Diego Center for Education Policy and Law: http://bit.ly/cidvxA

B. Suggested Student Discipline Rules (Short Version), Student Misuse of Electronic
   Communication Devices in Junior High and High Schools, (2 pp.) http://bit.ly/9HZPTe
     Center for Education Policy and Law • University of San Diego, October 2010

C. Suggested Student Discipline Rules (Long Version), Student Misuse of Electronic
   Communication Devices in Junior High and High Schools, (4 pp.) http://bit.ly/ctrjNn
     Center for Education Policy and Law • University of San Diego, October 2010

                                                                           (Continued on next page)
Cyberbullying, Sexting and Social Networking
© Arlen Kimmelman , Ed.M., M.A., NBCT                   NJASL, December 3-4, 2010


D. Free Speech and Privacy Dimensions Of Student Misuse of Their Own Electronic
   Communication Devices in Elementary and Secondary Schools: A Review of the Issues
   and Related [CA] Law, http://bit.ly/c5HQ1e
      Frank Kemerer, Professor-in-Residence, School of Law and School of Leadership and
      Education Sciences • University of San Diego, October 2010

E. Suggested School District Policy: Student Misuse of Electronic Communication Devices,
     Center for Education Policy and Law • University of San Diego, October 2010,
     http://bit.ly/aMpmZB

F. Resources for Learning about Electronic Communication Devices,
     Center for Education Policy and Law • University of San Diego, Information compiled by
     Megan Cramer, Research Assistant, July 2010, http://bit.ly/czh2Yi
Cyberbullying, Sexting and Social Networking
© Arlen Kimmelman , Ed.M., M.A., NBCT                   NJASL, December 3-4, 2010

Part 3: Tips for safe use of electronic communications by both student and staff

Safety Tips: http://writer.zoho.com/public/pseudandry/safetytips

Cyber Safety Tool Kit: Solutions for Schools, NJPSA‟s [New Jersey‟s Principals and
Supervisor‟s Association], © 2009: http://www.njpsa.org/documents/pdf/bully.pdf
   1. Cyber Problems (p.2)
      a.   Cyber Bullying
      b.   Cyber Predators
      c.   Cyber Memory
      d.   Cyber Crime
      e.   Cyber Cheating
   2. Solutions for Cyber Safety (p.4)
      a. Prevent Cyber Bullying
   3. What the Law Requires: Legal Issues Related to Cyber Bullying (p.8)
      a.   Legal Definition of Bullying
      b.   Conduct Away from School Grounds
      c.   Cyber Bullying and Student Due Process Rights
      d.   Landmark N.J. Supreme Court Decision Sets New Standard
      e.   Case Law Regarding Student Discipline and Cyberspace
      f.   Searches of Cell Phones and Other Hand Held Devices
   4. Additional Steps for Cyber Safety (p.14)
   5. Agencies Investigating Cyber Crime (p. 16)
   6. Talking Points to Use with School Staff (p. 17)
      a. Talking Points to Use with Families
   7. Tips for Families of Middle and High School Students (p. 20)
   8. Tips for Families of Elementary Students (p. 22)
   9. Links and Resources (p. 24)
   10. Welcome to Cyberspace: The New Vocabulary (p. 27)
   11. Top 15 Social Networking Sites (p. 30)

More Related Content

What's hot

1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in Cyberspace
Marc Smith
 
Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Capstone Project Final 7-19-13
Capstone Project Final 7-19-13
Megan Bednar
 
Webometrics and Studies of Cultural Diffusion -Psy Gangnam Style on YouTube
Webometrics and Studies of Cultural Diffusion-Psy Gangnam Style on YouTubeWebometrics and Studies of Cultural Diffusion-Psy Gangnam Style on YouTube
Webometrics and Studies of Cultural Diffusion -Psy Gangnam Style on YouTube
Han Woo PARK
 
Web 2.0 In University Life
Web 2.0 In University LifeWeb 2.0 In University Life
Web 2.0 In University Life
University of Gothenburg
 
RESEARCH PROPOSAL 2016 @ FINAL VERSION
RESEARCH PROPOSAL 2016 @ FINAL VERSIONRESEARCH PROPOSAL 2016 @ FINAL VERSION
RESEARCH PROPOSAL 2016 @ FINAL VERSION
Gabriel Jr Matthew
 
Educators Use of Social Media
Educators Use of Social MediaEducators Use of Social Media
Educators Use of Social Media
Renee Smith-Faulkner
 
The college at brockport (06khjja09)
The college at brockport (06khjja09)The college at brockport (06khjja09)
The college at brockport (06khjja09)
06khjja09
 
4
44
Current Issue Paper
Current Issue PaperCurrent Issue Paper
Current Issue Paper
chellebelle84
 
NCompass Live: Accessing Courts through E-Government
NCompass Live: Accessing Courts through E-GovernmentNCompass Live: Accessing Courts through E-Government
NCompass Live: Accessing Courts through E-Government
Nebraska Library Commission
 
The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...
Cocoloris
 
Ukraine
UkraineUkraine
Ukraine
nalianalia
 
Identities in motion cyberspace and myanmar men having sex with men
Identities in motion cyberspace and myanmar men having sex with menIdentities in motion cyberspace and myanmar men having sex with men
Identities in motion cyberspace and myanmar men having sex with men
Alexander Decker
 
Jankowski & van selm, promise and practice of public debate, 2000
Jankowski & van selm, promise and practice of public debate, 2000Jankowski & van selm, promise and practice of public debate, 2000
Jankowski & van selm, promise and practice of public debate, 2000
Nick Jankowski
 
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Digital Divides tprc-2019
Digital Divides tprc-2019Digital Divides tprc-2019
Web 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher EducationWeb 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher Education
Anne Arendt
 
Wcu Lectures & Workshops, Schedule & Abstracts, 13 Sept2009
Wcu Lectures & Workshops, Schedule & Abstracts, 13 Sept2009Wcu Lectures & Workshops, Schedule & Abstracts, 13 Sept2009
Wcu Lectures & Workshops, Schedule & Abstracts, 13 Sept2009
Nick Jankowski
 
Politics of tweeting, tweeting of politics: The uses of social media by state...
Politics of tweeting, tweeting of politics: The uses of social media by state...Politics of tweeting, tweeting of politics: The uses of social media by state...
Politics of tweeting, tweeting of politics: The uses of social media by state...
Brenda Moon
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
 

What's hot (20)

1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in Cyberspace
 
Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Capstone Project Final 7-19-13
Capstone Project Final 7-19-13
 
Webometrics and Studies of Cultural Diffusion -Psy Gangnam Style on YouTube
Webometrics and Studies of Cultural Diffusion-Psy Gangnam Style on YouTubeWebometrics and Studies of Cultural Diffusion-Psy Gangnam Style on YouTube
Webometrics and Studies of Cultural Diffusion -Psy Gangnam Style on YouTube
 
Web 2.0 In University Life
Web 2.0 In University LifeWeb 2.0 In University Life
Web 2.0 In University Life
 
RESEARCH PROPOSAL 2016 @ FINAL VERSION
RESEARCH PROPOSAL 2016 @ FINAL VERSIONRESEARCH PROPOSAL 2016 @ FINAL VERSION
RESEARCH PROPOSAL 2016 @ FINAL VERSION
 
Educators Use of Social Media
Educators Use of Social MediaEducators Use of Social Media
Educators Use of Social Media
 
The college at brockport (06khjja09)
The college at brockport (06khjja09)The college at brockport (06khjja09)
The college at brockport (06khjja09)
 
4
44
4
 
Current Issue Paper
Current Issue PaperCurrent Issue Paper
Current Issue Paper
 
NCompass Live: Accessing Courts through E-Government
NCompass Live: Accessing Courts through E-GovernmentNCompass Live: Accessing Courts through E-Government
NCompass Live: Accessing Courts through E-Government
 
The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...
 
Ukraine
UkraineUkraine
Ukraine
 
Identities in motion cyberspace and myanmar men having sex with men
Identities in motion cyberspace and myanmar men having sex with menIdentities in motion cyberspace and myanmar men having sex with men
Identities in motion cyberspace and myanmar men having sex with men
 
Jankowski & van selm, promise and practice of public debate, 2000
Jankowski & van selm, promise and practice of public debate, 2000Jankowski & van selm, promise and practice of public debate, 2000
Jankowski & van selm, promise and practice of public debate, 2000
 
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
 
Digital Divides tprc-2019
Digital Divides tprc-2019Digital Divides tprc-2019
Digital Divides tprc-2019
 
Web 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher EducationWeb 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher Education
 
Wcu Lectures & Workshops, Schedule & Abstracts, 13 Sept2009
Wcu Lectures & Workshops, Schedule & Abstracts, 13 Sept2009Wcu Lectures & Workshops, Schedule & Abstracts, 13 Sept2009
Wcu Lectures & Workshops, Schedule & Abstracts, 13 Sept2009
 
Politics of tweeting, tweeting of politics: The uses of social media by state...
Politics of tweeting, tweeting of politics: The uses of social media by state...Politics of tweeting, tweeting of politics: The uses of social media by state...
Politics of tweeting, tweeting of politics: The uses of social media by state...
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 

Viewers also liked

Negative effects of social media
Negative effects of social mediaNegative effects of social media
Negative effects of social media
srubart
 
Cyberbullypowerpoint
CyberbullypowerpointCyberbullypowerpoint
Cyberbullypowerpoint
torremalku
 
Abstract
AbstractAbstract
Abstract
Pauline Hyland
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Marian Merritt
 
Review of Related Literature
Review of Related LiteratureReview of Related Literature
Review of Related Literature
Jasper Obico
 
Chapter 2:review of related literature and studies
Chapter 2:review of related literature and studiesChapter 2:review of related literature and studies
Chapter 2:review of related literature and studies
mhel15
 
Related Literature and Related Studies
Related Literature and Related StudiesRelated Literature and Related Studies
Related Literature and Related Studies
Jenny Reyes
 

Viewers also liked (7)

Negative effects of social media
Negative effects of social mediaNegative effects of social media
Negative effects of social media
 
Cyberbullypowerpoint
CyberbullypowerpointCyberbullypowerpoint
Cyberbullypowerpoint
 
Abstract
AbstractAbstract
Abstract
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Review of Related Literature
Review of Related LiteratureReview of Related Literature
Review of Related Literature
 
Chapter 2:review of related literature and studies
Chapter 2:review of related literature and studiesChapter 2:review of related literature and studies
Chapter 2:review of related literature and studies
 
Related Literature and Related Studies
Related Literature and Related StudiesRelated Literature and Related Studies
Related Literature and Related Studies
 

Similar to Cyberbullying, Sexting and Social Networking

My new proposal (1).docx
My new proposal (1).docxMy new proposal (1).docx
My new proposal (1).docx
AttaUrRahman78
 
Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204
Lesley University Graduate School of Education
 
Young Adults And On Line Privacy
Young Adults And On Line PrivacyYoung Adults And On Line Privacy
Young Adults And On Line Privacy
Recrue
 
Individual project 2.20
Individual project 2.20Individual project 2.20
Individual project 2.20
Monisha100
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
Aimee Shuck
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying Resources
Andy Jeter
 
HOMEACCESSIBILITYPREVIEWComplete this question by entering your
HOMEACCESSIBILITYPREVIEWComplete this question by entering your HOMEACCESSIBILITYPREVIEWComplete this question by entering your
HOMEACCESSIBILITYPREVIEWComplete this question by entering your
SusanaFurman449
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
philipnelson29183
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethics
syed ahmed
 
Zara Case Study Essay
Zara Case Study EssayZara Case Study Essay
Zara Case Study Essay
Katie Stewart
 
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docxI. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
wilcockiris
 
Research proposal
Research proposalResearch proposal
Research proposal
Saba Afaq
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
segughana
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
briancrawford30935
 
Hsc2017 legal studies
Hsc2017 legal studiesHsc2017 legal studies
Hsc2017 legal studies
PublicLibraryServices
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
CSCJournals
 
Thesis Statements (Argumentative Essays)
Thesis Statements (Argumentative Essays)Thesis Statements (Argumentative Essays)
Thesis Statements (Argumentative Essays)
Kelly Lipiec
 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.doc
BobbyThankappan
 
IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010
Twittercrisis
 
8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable
Center for Innovative Public Health Research
 

Similar to Cyberbullying, Sexting and Social Networking (20)

My new proposal (1).docx
My new proposal (1).docxMy new proposal (1).docx
My new proposal (1).docx
 
Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204
 
Young Adults And On Line Privacy
Young Adults And On Line PrivacyYoung Adults And On Line Privacy
Young Adults And On Line Privacy
 
Individual project 2.20
Individual project 2.20Individual project 2.20
Individual project 2.20
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying Resources
 
HOMEACCESSIBILITYPREVIEWComplete this question by entering your
HOMEACCESSIBILITYPREVIEWComplete this question by entering your HOMEACCESSIBILITYPREVIEWComplete this question by entering your
HOMEACCESSIBILITYPREVIEWComplete this question by entering your
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethics
 
Zara Case Study Essay
Zara Case Study EssayZara Case Study Essay
Zara Case Study Essay
 
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docxI. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docx
 
Research proposal
Research proposalResearch proposal
Research proposal
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
 
Hsc2017 legal studies
Hsc2017 legal studiesHsc2017 legal studies
Hsc2017 legal studies
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
Thesis Statements (Argumentative Essays)
Thesis Statements (Argumentative Essays)Thesis Statements (Argumentative Essays)
Thesis Statements (Argumentative Essays)
 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.doc
 
IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010
 
8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable
 

Recently uploaded

Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 

Recently uploaded (20)

Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 

Cyberbullying, Sexting and Social Networking

  • 1. Cyberbullying, Sexting and Social Networking © Arlen Kimmelman , Ed.M., M.A., NBCT NJASL, December 3-4, 2010 Program Objectives: What three things will participants learn from this session that can be implemented? 1. Familiarization with the applicable state and federal laws associated with potentially disrupting electronic communications 2. Suggestions for implementing effective school or district policies regarding electronic communications 3. Tips for safe use of electronic communications by both student and staff Adapted from presentation to CRHS administration on 3/30/2010 by Arlen Kimmelman, Librarian, Clearview Regional HS: http://bit.ly/dn3IHA
  • 2. Cyberbullying, Sexting and Social Networking © Arlen Kimmelman , Ed.M., M.A., NBCT NJASL, December 3-4, 2010 Part 1: Familiarization with the applicable state and federal laws associated with potentially disrupting electronic communications NJ Legislature I. Bill Search: http://www.njleg.state.nj.us/Default.asp II. Statutes: http://bit.ly/1gmH4c III. Email notification for selected bills: http://www.njleg.state.nj.us/bills/BillsSubscriptionLogin.asp NJ Cyberbullying Law as of July 2010 : http://bit.ly/bvAEXM Relevant NJ Bills in 2010-2011 Session: Cyberbullying: http://www.njleg.state.nj.us/2010/Bills/A3500/3328_I1.HTM Harassment: http://www.njleg.state.nj.us/2010/Bills/A3500/3409_I1.HTM Sexting: http://www.njleg.state.nj.us/2010/Bills/A2000/1561_I1.HTM Social networking: http://www.njleg.state.nj.us/2010/Bills/A3000/2689_I1.HTM http://www.njleg.state.nj.us/2010/Bills/S0500/326_I1.HTM Relevant Keyword Searches in NJ Statutes: „Child‟/„Internet‟: 2C:43-3.8 : http://bit.ly/9pN8Uv and 2C:7-2: http://bit.ly/9d3x1G „Bullying‟: 18A:37-15.1 : http://bit.ly/bh0Fes and complete search results for „Bullying‟ http://bit.ly/8YxXxB Note: definitions in 18A:37-14 http://bit.ly/cqM6OX „Online‟: 52:17B-193: http://bit.ly/aglbL7 and 2C:43-3.8: http://bit.ly/9tiVKE „Sexting‟: NONE! „Texting‟: NONE! „Social Networking‟: NONE! NJ’s County Prosecutors: http://bit.ly/cc9phx There Isn‘t A Moment To Lose: An Urgent Call for Legal Reform and Effective Practices to Combat Bullying in New Jersey Schools, Report of the New Jersey Commission on Bullying in Schools, December 15, 2009, http://bit.ly/azTkJX Table of Contents Brief Overview of Findings and Recommendations ..................................................1 Summary of Findings ......................................................................................................5 Summary of Recommendations ......................................................................................6 Background on the New Jersey Commission on Bullying in Schools .............................8 Overview of Current State of Laws Pertaining to Bullying Issues .........................11 The New Jersey Law Against Discrimination (LAD) Also Provides Limited Protections for Some Victims of HIB .....................................................12 The New Jersey Bias Intimidation (BI) Statute Provides Limited Protections for Victims of Criminal Conduct That Sometimes Includes HIB .........................12 The New Jersey Anti-Bullying Law as the Principal Legal Mechanism for Addressing HIB in Schools .......................................................................14 Recommendation #1-22: ..........................................................................................14-43 Conclusion and Appendices .....................................................................................46-62
  • 3. Cyberbullying, Sexting and Social Networking © Arlen Kimmelman , Ed.M., M.A., NBCT NJASL, December 3-4, 2010 Part 2: Suggestions for implementing effective school or district policies regarding electronic communications My School‟s Policies: http://writer.zoho.com/public/pseudandry/schoolpolicies Social Networking Primer for School Boards: http://bit.ly/dopTUC New Jersey‟s Model Policy and Guidance for Prohibiting Harassment, Intimidation and Bullying on School Property, at School-Sponsored Functions and on School Buses (Revised November 2008) http://www.state.nj.us/education/parents/bully.pdf Reviewing and Updating Your Harassment, Intimidation and Bullying Policy Tip Sheet from Rutgers http://bit.ly/aNWRXq Section #2 – Statute and Regulatory Requirement The policy shall contain a definition of harassment, intimidation or bullying, no less inclusive than the definition set forth in the model policy. N.J.S.A. 18A:37-15(3)(b)(2) and N.J.A.C. 6A:16-7.9(a) 2ii Issues for Consideration in Local Policy Development 1. Does the policy address bullying incidents not motivated by characteristics such as the target‟s race, color, religion, gender, or sexual orientation? 2. Do district policies and procedures address and impose consequences for acts of HIB that occur off of school grounds including all forms of electronic communication, such as cyber- bullying? 3. Does the definition of HIB include “any electronic communication?” 4. Does the policy provide clear examples of what is meant by “electronic communication?” Resources from University of San Diego School of Leadership and Education Sciences, Center for Education Policy and Law: A. Helping School Personnel Control Student Misuse of Electronic Communication Devices On and Off Campus - October 2010, University of San Diego Center for Education Policy and Law: http://bit.ly/cidvxA B. Suggested Student Discipline Rules (Short Version), Student Misuse of Electronic Communication Devices in Junior High and High Schools, (2 pp.) http://bit.ly/9HZPTe Center for Education Policy and Law • University of San Diego, October 2010 C. Suggested Student Discipline Rules (Long Version), Student Misuse of Electronic Communication Devices in Junior High and High Schools, (4 pp.) http://bit.ly/ctrjNn Center for Education Policy and Law • University of San Diego, October 2010 (Continued on next page)
  • 4. Cyberbullying, Sexting and Social Networking © Arlen Kimmelman , Ed.M., M.A., NBCT NJASL, December 3-4, 2010 D. Free Speech and Privacy Dimensions Of Student Misuse of Their Own Electronic Communication Devices in Elementary and Secondary Schools: A Review of the Issues and Related [CA] Law, http://bit.ly/c5HQ1e Frank Kemerer, Professor-in-Residence, School of Law and School of Leadership and Education Sciences • University of San Diego, October 2010 E. Suggested School District Policy: Student Misuse of Electronic Communication Devices, Center for Education Policy and Law • University of San Diego, October 2010, http://bit.ly/aMpmZB F. Resources for Learning about Electronic Communication Devices, Center for Education Policy and Law • University of San Diego, Information compiled by Megan Cramer, Research Assistant, July 2010, http://bit.ly/czh2Yi
  • 5. Cyberbullying, Sexting and Social Networking © Arlen Kimmelman , Ed.M., M.A., NBCT NJASL, December 3-4, 2010 Part 3: Tips for safe use of electronic communications by both student and staff Safety Tips: http://writer.zoho.com/public/pseudandry/safetytips Cyber Safety Tool Kit: Solutions for Schools, NJPSA‟s [New Jersey‟s Principals and Supervisor‟s Association], © 2009: http://www.njpsa.org/documents/pdf/bully.pdf 1. Cyber Problems (p.2) a. Cyber Bullying b. Cyber Predators c. Cyber Memory d. Cyber Crime e. Cyber Cheating 2. Solutions for Cyber Safety (p.4) a. Prevent Cyber Bullying 3. What the Law Requires: Legal Issues Related to Cyber Bullying (p.8) a. Legal Definition of Bullying b. Conduct Away from School Grounds c. Cyber Bullying and Student Due Process Rights d. Landmark N.J. Supreme Court Decision Sets New Standard e. Case Law Regarding Student Discipline and Cyberspace f. Searches of Cell Phones and Other Hand Held Devices 4. Additional Steps for Cyber Safety (p.14) 5. Agencies Investigating Cyber Crime (p. 16) 6. Talking Points to Use with School Staff (p. 17) a. Talking Points to Use with Families 7. Tips for Families of Middle and High School Students (p. 20) 8. Tips for Families of Elementary Students (p. 22) 9. Links and Resources (p. 24) 10. Welcome to Cyberspace: The New Vocabulary (p. 27) 11. Top 15 Social Networking Sites (p. 30)