SlideShare a Scribd company logo
1 of 15
Download to read offline
11/12/2009




 Judson ISD ERC, November 16th, 6:00pm




Steve Young, CTO, Technology Services, syoung@judsonisd.org
Doretta Walker, Director of Desktop Services, dwalker@judsonisd.org
Beverly Ahr, Director of Instructional Technology, bahr@judsonisd.org




                                                                                1
11/12/2009




•   It’s the law.  
•   Judson ISD must comply with Children s Internet 
    Judson ISD must comply with Children’s Internet 
    Protection Act (CIPA)
•   Requirement of Federal eRate program, which 
    funds a lot or technology and network access for 
    Judson ISD
•   While Judson ISD staff monitors students, the 
    filter servers as extra eyes, especially as the 
    numbers of internet devices proliferate 
          b   f i t       t d i   lif t  



                                                                2
11/12/2009




•   Judson ISD Board Policy CQ sets out rules for 
    Electronic Communication and Data Management at 
    Judson ISD
•   These were last update and adopted by the Board on 
    10/9/2006 (CQ Local)
•   CQ Local says: “The District shall provide a filtering  
    CQ L l          “Th  Di i   h ll       id    fil i
    service that attempts to block access to…..”
•   CQ Legal says  …as a prerequisite to receiving these 
    CQ Legal says “…as a prerequisite to receiving these 
    funds, implement certain Internet safety 
    measures…”
•   CQ Legal says “…the District must educate minors 
    CQ Legal says “ the District must educate minors 
    about appropriate online behavior, including 
    interacting with other individuals on social 
    networking Web sites and in chat rooms and 
       t    ki  W b  it   d i   h t            d 
    cyberbullying awareness and response.”


                                                                       3
11/12/2009




Are the most detailed guidelines at JISD for use of 
computers and network for all JISD users.
computers and network for all JISD users
C2 addresses: conduct, security, system access, 
password security, confidentiality, data 
password security  confidentiality  data 
protection, asset protection, email, email 
retention, copyright, filtering, monitoring, 
vandalism, and consequences.
Last updated and signed by CTO and 
Superintendent in May 7, 2009.




                                                               4
11/12/2009




•   Every year they receive a student handbook, 
    which contains JISD Board of Trustee Approved 
    verbiage (including student code of conduct)
•   Handbook includes  Acceptable Use of 
    Handbook includes “Acceptable Use of 
    Internet/Computer facilities” and
•   “Computer/Internet Use  Offenses& Conseq ”
     Computer/Internet Use – Offenses& Conseq.
•   Parents & students must sign acknowledgement 
    form yearly.
    form  earl



                                                             5
11/12/2009




•   All Internet requests are filtered through 
                    q                       g
    LightSpeed Systems filter
•   Specific known users (staff) may have more 
    relaxed filter if they have been approved for the 
      l dfl         f h h       b            df h
    access based on job need.  ( reference JISD 
    procedure C2 – must use Form C2‐3  Request for 
    procedure C2  must use Form C2 3 “Request for 
    Unfiltered Internet Access”
•   Unknown users are restricted to most limited 
    Internet access, which is student access




                                                                 6
11/12/2009




Filtering is never 100% perfect
Some bad sites can slip through
People will try to circumvent the system
Some acceptable sites will get blocked




                                                   7
11/12/2009




•   Porn and adult content     •   Security Risks
•   Drugs & Alcohol            •   Hacking
•   Weapons
                               •   Proxies
•   Violence & Hate
    Vi l      & H
•   Gambling                   •   Spyware
•   Dating                     •   Virus
•   Social Networking          •   Plagiarism
•   Instant Messaging          •       pp g
                                   Shopping
•   Peer 2 Peer File Sharing
                  l h
                               •   Auctions
•   Forums, Newsgroups & 
        g
    Blogs                      •   Music
•   Email & Chat               •   Games


                                                            8
11/12/2009




On April 28, 2008 JISD implemented 
Administrative Procedure C‐7 “Cyber Bullying”
Ad i i t ti  P       d  C  “C b  B ll i ”
 Seeks to make staff & students aware of internet 
 safety guidelines
 Raise awareness so that victims feel comfortable 
 reporting incidents
   p      g
 Establishes guidelines for administrative handling of 
 incidents
 Staff & students will undergo annual training




                                                                  9
11/12/2009




                                                                                      Staff
                                                                                      St ff
            Action Steps                   Time Line          Resources                               Evidence of Attainment
                                                                                   Responsible
                                                        Internet
Research topic                           Feb.-March,                            Instructional
                                                        Internet Safety Video                        Research folder
Locate and categorize resources          2009                                   Technology Staff
                                                        Tape
                                                        PowerPoint 2007
Create PowerPoint Presentation and       June-Aug.,                             Instructional        CD of presentation and
                                                        Blank CD
Training Script                          2009                                   Technology Staff     hardcopy of training script
                                                        Copy Paper
                                                                                Instructional
Present to Technology                                                                                Meeting scheduled and
                                         Nov-Dec.,      Copies of Script for    Technology Staff
Services/Curriculum & Instruction                                                                    sign in sheets of
                                         2009           each participant        Student Services
Departments for feedback                                                                             attendance
                                                                                Staff
                                                                                                     Revised CD of
                                                        Digital copies of       Instructional
Revise Presentation                      Dec., 2009                                                  presentation and revised
                                                        presentation and script Technology Staff
                                                                                                     hardcopy of training script
                                                       Date of principal
                                                               p     p          Instructional
Present to Administrators
P     t t Ad i i t t                     Dec., 2009
                                         D                                                           Meeting A
                                                                                                     M ti Agenda
                                                                                                               d
                                                       meetings                 Technology Staff
                                                       Meeting room
                                                       CDs and Script for
Train Counselors, Social Workers,                                               Instructional
                                         Jan., 2009    each participant                              Sign in sheets
CITs, Librarians                                                                Technology Staff
                                                       Sign-in sheets
                                                       Evaluation Forms
                                                       CD and script for
                                                                                Counselors, Social
Train all Teachers on Internet Safety                  trainer
                                         Feb.-May 2010                          Worker, Librarians   Sign in sheets
and Cyber Bullying                                     Sign in sheets
                                                                                and CITs
                                                       Evaluation forms
Train all Students in K 12 on Internet
                      K-12                             CD and script for
                                                                                Counselors, Social
Safety                                                 trainer
                                         Feb.-May 2010                          Worker, Librarians   Sign in sheets
Train all Students in 3-12 on Cyber                    Sign in sheets
                                                                                and CITs
Bullying                                               Evaluation forms




                                                                                                                                          10
11/12/2009




Internet at Judson I.S.D.
Acceptable Use Policy
Good Neighborhoods, Bad Neighborhoods
Social Networking Sites
Your Words and Pictures in Cyberspace
Netiquette
Online Shopping
O li  Sh      i




                                               11
11/12/2009




1.  Explain the main points of the JISD acceptable use policy
2.  List examples of “bad neighborhood” websites
    Li          l   f “b d  i hb h d”  b i
3.  Tell how to protect oneself when using a social network site.
4. Tell why one should reconsider before placing potentially 
4  Tell why one should reconsider before placing potentially 
      embarrassing pictures or information online
5. List rules to follow when blogging, writing instant messages, 
     emailing and visiting chat rooms 
          ili   d  i i i   h            
6. Explain the dangers of revealing too much personal information to 
     an online acquaintance.
                  q
7.  Tell what to do if an online acquaintance says something personal 
      that makes you uncomfortable or asks to meet.




                                                                                12
11/12/2009




JISD Philosophy          Student 
Definition               Responsibilities
Rationale/Legal          Reprisal or 
Statistics               Retaliation
Prevention               Discipline and 
                              p
                         Consequences
Warning Signs
Reporting
Investigating
Examples
Staff Responsibilities


                                                   13
11/12/2009




1.  Define cyber bullying and explain why it can be 
     very dangerous.
2.  Give 2 examples of cyber bullying.
3.  Explain what to do if you receive a threatening 
     cyber bully message.




                                                              14
11/12/2009




Thanks for attending this meeting.




                                            15

More Related Content

What's hot

Chapter 18 eighteen the electronic courtroom and trial presentation
Chapter 18 eighteen the electronic courtroom and trial presentationChapter 18 eighteen the electronic courtroom and trial presentation
Chapter 18 eighteen the electronic courtroom and trial presentation
difordham
 
Conference programme
Conference programmeConference programme
Conference programme
SchoolNet SA
 
"Building Intelligent Content from 30 Years of Legacy Documents," Intelligent...
"Building Intelligent Content from 30 Years of Legacy Documents," Intelligent..."Building Intelligent Content from 30 Years of Legacy Documents," Intelligent...
"Building Intelligent Content from 30 Years of Legacy Documents," Intelligent...
Earley Information Science
 
Intellectual property for legal practitioners
Intellectual property for legal practitionersIntellectual property for legal practitioners
Intellectual property for legal practitioners
Ajithaa Edirimane
 
Hp Fortify Mobile Application Security
Hp Fortify Mobile Application SecurityHp Fortify Mobile Application Security
Hp Fortify Mobile Application Security
Ed Wong
 
Important keyword to remember
Important keyword to rememberImportant keyword to remember
Important keyword to remember
Mummy Irdina
 

What's hot (18)

Chapter 18 eighteen the electronic courtroom and trial presentation
Chapter 18 eighteen the electronic courtroom and trial presentationChapter 18 eighteen the electronic courtroom and trial presentation
Chapter 18 eighteen the electronic courtroom and trial presentation
 
Conference programme
Conference programmeConference programme
Conference programme
 
An architecture for privacy-enabled user profile portability on the Web of Data
An architecture for privacy-enabled user profile portability on the Web of DataAn architecture for privacy-enabled user profile portability on the Web of Data
An architecture for privacy-enabled user profile portability on the Web of Data
 
Learning Technologies Presentation 2011
Learning Technologies Presentation 2011Learning Technologies Presentation 2011
Learning Technologies Presentation 2011
 
Teaching tips and technologies for reaching net generation
Teaching tips and technologies for reaching net generationTeaching tips and technologies for reaching net generation
Teaching tips and technologies for reaching net generation
 
"Building Intelligent Content from 30 Years of Legacy Documents," Intelligent...
"Building Intelligent Content from 30 Years of Legacy Documents," Intelligent..."Building Intelligent Content from 30 Years of Legacy Documents," Intelligent...
"Building Intelligent Content from 30 Years of Legacy Documents," Intelligent...
 
Atm Communication Online Meeting
Atm Communication Online MeetingAtm Communication Online Meeting
Atm Communication Online Meeting
 
Intellectual property for legal practitioners
Intellectual property for legal practitionersIntellectual property for legal practitioners
Intellectual property for legal practitioners
 
What to curate? Preserving and Curating Software-Based Art
What to curate? Preserving and Curating Software-Based ArtWhat to curate? Preserving and Curating Software-Based Art
What to curate? Preserving and Curating Software-Based Art
 
Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010
 
Curriculum Innovation for DE meeting
Curriculum Innovation for DE meetingCurriculum Innovation for DE meeting
Curriculum Innovation for DE meeting
 
Sharp Electronic portfolio
Sharp Electronic portfolioSharp Electronic portfolio
Sharp Electronic portfolio
 
Hp Fortify Mobile Application Security
Hp Fortify Mobile Application SecurityHp Fortify Mobile Application Security
Hp Fortify Mobile Application Security
 
Ict News July 2009
Ict News July 2009Ict News July 2009
Ict News July 2009
 
DLFAN
DLFANDLFAN
DLFAN
 
Heads of computing dec 2011
Heads of computing   dec 2011Heads of computing   dec 2011
Heads of computing dec 2011
 
Important keyword to remember
Important keyword to rememberImportant keyword to remember
Important keyword to remember
 
Transitioning web application frameworks towards the Semantic Web (master the...
Transitioning web application frameworks towards the Semantic Web (master the...Transitioning web application frameworks towards the Semantic Web (master the...
Transitioning web application frameworks towards the Semantic Web (master the...
 

Similar to Judson ISD Internet Safety and Filtering Hearing November 16th, 2009

Edld 5352 Week 4 Assignment Part 3 Blog
Edld 5352 Week 4 Assignment Part 3 BlogEdld 5352 Week 4 Assignment Part 3 Blog
Edld 5352 Week 4 Assignment Part 3 Blog
Lamar University
 
Building Tech Vision
Building Tech VisionBuilding Tech Vision
Building Tech Vision
Josh Allen
 
OWD2011 - 3 - Heads in the cloud, feet on the ground - a pragmatic approach t...
OWD2011 - 3 - Heads in the cloud, feet on the ground - a pragmatic approach t...OWD2011 - 3 - Heads in the cloud, feet on the ground - a pragmatic approach t...
OWD2011 - 3 - Heads in the cloud, feet on the ground - a pragmatic approach t...
SURF Events
 
Taking it on the road walsdorf
Taking it on the road   walsdorfTaking it on the road   walsdorf
Taking it on the road walsdorf
Mary Jo Walsdorf
 

Similar to Judson ISD Internet Safety and Filtering Hearing November 16th, 2009 (20)

Stucky Rwagasana Presentation
Stucky Rwagasana PresentationStucky Rwagasana Presentation
Stucky Rwagasana Presentation
 
Edld 5352 Week 4 Assignment Part 3 Blog
Edld 5352 Week 4 Assignment Part 3 BlogEdld 5352 Week 4 Assignment Part 3 Blog
Edld 5352 Week 4 Assignment Part 3 Blog
 
Baltimore NAF Vision
Baltimore NAF VisionBaltimore NAF Vision
Baltimore NAF Vision
 
CEL Technology Update
CEL Technology UpdateCEL Technology Update
CEL Technology Update
 
080807 Distance Ed Conference
080807 Distance Ed Conference080807 Distance Ed Conference
080807 Distance Ed Conference
 
Creating a Cross-Corporate Knowledge Pool
Creating a Cross-Corporate Knowledge PoolCreating a Cross-Corporate Knowledge Pool
Creating a Cross-Corporate Knowledge Pool
 
Supporting On-Demand E-Reserves for Non-Print Educational Media
Supporting On-Demand E-Reserves for Non-Print Educational MediaSupporting On-Demand E-Reserves for Non-Print Educational Media
Supporting On-Demand E-Reserves for Non-Print Educational Media
 
VSB education committee - philosophy and strategy for technology
VSB education committee - philosophy and strategy for technologyVSB education committee - philosophy and strategy for technology
VSB education committee - philosophy and strategy for technology
 
ICT for VEC CIO
ICT for VEC CIOICT for VEC CIO
ICT for VEC CIO
 
Sandra Golightly
Sandra  GolightlySandra  Golightly
Sandra Golightly
 
A Centralised Lecture Capture System for Irish Higher Education
A Centralised Lecture Capture System for Irish Higher EducationA Centralised Lecture Capture System for Irish Higher Education
A Centralised Lecture Capture System for Irish Higher Education
 
Building Tech Vision
Building Tech VisionBuilding Tech Vision
Building Tech Vision
 
Accademic learning network
Accademic learning networkAccademic learning network
Accademic learning network
 
Itgs scheme 2011-2012
Itgs scheme 2011-2012Itgs scheme 2011-2012
Itgs scheme 2011-2012
 
Your Learners ARE Mobile. Is Your Learning?
Your Learners ARE Mobile. Is Your Learning?Your Learners ARE Mobile. Is Your Learning?
Your Learners ARE Mobile. Is Your Learning?
 
Distance Learning Technologies
Distance Learning TechnologiesDistance Learning Technologies
Distance Learning Technologies
 
Ict Policy Planning Ethiopia 240208
Ict Policy Planning Ethiopia 240208Ict Policy Planning Ethiopia 240208
Ict Policy Planning Ethiopia 240208
 
OWD2011 - 3 - Heads in the cloud, feet on the ground - a pragmatic approach t...
OWD2011 - 3 - Heads in the cloud, feet on the ground - a pragmatic approach t...OWD2011 - 3 - Heads in the cloud, feet on the ground - a pragmatic approach t...
OWD2011 - 3 - Heads in the cloud, feet on the ground - a pragmatic approach t...
 
Taking it on the road walsdorf
Taking it on the road   walsdorfTaking it on the road   walsdorf
Taking it on the road walsdorf
 
Dragonsden 2012
Dragonsden 2012Dragonsden 2012
Dragonsden 2012
 

More from Steve Young

Case study using idm and a web portal as a gateway to the cloud june 2012
Case study   using idm and a web portal as a gateway to the cloud june 2012Case study   using idm and a web portal as a gateway to the cloud june 2012
Case study using idm and a web portal as a gateway to the cloud june 2012
Steve Young
 
Social Media: Risks and Benefits
Social Media: Risks and BenefitsSocial Media: Risks and Benefits
Social Media: Risks and Benefits
Steve Young
 
Judson ISD X-Series Deployment Savingsand Energy Savings
Judson ISD X-Series Deployment Savingsand Energy SavingsJudson ISD X-Series Deployment Savingsand Energy Savings
Judson ISD X-Series Deployment Savingsand Energy Savings
Steve Young
 

More from Steve Young (11)

The cto’s role in driving community engagement 10 22-14
The cto’s role in driving community engagement 10 22-14The cto’s role in driving community engagement 10 22-14
The cto’s role in driving community engagement 10 22-14
 
Technology as a Tool for Learning Symposium 2015
Technology as a Tool for Learning Symposium 2015Technology as a Tool for Learning Symposium 2015
Technology as a Tool for Learning Symposium 2015
 
The ubiquity of inequity myth of the robust and reliable connection
The ubiquity of inequity myth of the robust and reliable connection The ubiquity of inequity myth of the robust and reliable connection
The ubiquity of inequity myth of the robust and reliable connection
 
Some tools to bring new life to your classroom
Some tools to bring new life to your classroomSome tools to bring new life to your classroom
Some tools to bring new life to your classroom
 
How Judson ISD Implemented and Tracks IT Metrics & Key Performance Indicators
How Judson ISD Implemented and Tracks IT Metrics & Key Performance IndicatorsHow Judson ISD Implemented and Tracks IT Metrics & Key Performance Indicators
How Judson ISD Implemented and Tracks IT Metrics & Key Performance Indicators
 
Case study using idm and a web portal as a gateway to the cloud june 2012
Case study   using idm and a web portal as a gateway to the cloud june 2012Case study   using idm and a web portal as a gateway to the cloud june 2012
Case study using idm and a web portal as a gateway to the cloud june 2012
 
Social Media: Risks and Benefits
Social Media: Risks and BenefitsSocial Media: Risks and Benefits
Social Media: Risks and Benefits
 
Judson ISD – To The Cloud June 2011
Judson ISD – To The Cloud   June 2011Judson ISD – To The Cloud   June 2011
Judson ISD – To The Cloud June 2011
 
Green Computing Tech Forum Texas 2010
Green Computing Tech Forum Texas 2010Green Computing Tech Forum Texas 2010
Green Computing Tech Forum Texas 2010
 
Judson ISD X-Series Deployment Savingsand Energy Savings
Judson ISD X-Series Deployment Savingsand Energy SavingsJudson ISD X-Series Deployment Savingsand Energy Savings
Judson ISD X-Series Deployment Savingsand Energy Savings
 
Green(Er) Computing
Green(Er) ComputingGreen(Er) Computing
Green(Er) Computing
 

Judson ISD Internet Safety and Filtering Hearing November 16th, 2009

  • 1. 11/12/2009 Judson ISD ERC, November 16th, 6:00pm Steve Young, CTO, Technology Services, syoung@judsonisd.org Doretta Walker, Director of Desktop Services, dwalker@judsonisd.org Beverly Ahr, Director of Instructional Technology, bahr@judsonisd.org 1
  • 2. 11/12/2009 • It’s the law.   • Judson ISD must comply with Children s Internet  Judson ISD must comply with Children’s Internet  Protection Act (CIPA) • Requirement of Federal eRate program, which  funds a lot or technology and network access for  Judson ISD • While Judson ISD staff monitors students, the  filter servers as extra eyes, especially as the  numbers of internet devices proliferate  b   f i t t d i   lif t   2
  • 3. 11/12/2009 • Judson ISD Board Policy CQ sets out rules for  Electronic Communication and Data Management at  Judson ISD • These were last update and adopted by the Board on  10/9/2006 (CQ Local) • CQ Local says: “The District shall provide a filtering   CQ L l   “Th  Di i   h ll  id    fil i service that attempts to block access to…..” • CQ Legal says  …as a prerequisite to receiving these  CQ Legal says “…as a prerequisite to receiving these  funds, implement certain Internet safety  measures…” • CQ Legal says “…the District must educate minors  CQ Legal says “ the District must educate minors  about appropriate online behavior, including  interacting with other individuals on social  networking Web sites and in chat rooms and  t ki  W b  it   d i   h t    d  cyberbullying awareness and response.” 3
  • 5. 11/12/2009 • Every year they receive a student handbook,  which contains JISD Board of Trustee Approved  verbiage (including student code of conduct) • Handbook includes  Acceptable Use of  Handbook includes “Acceptable Use of  Internet/Computer facilities” and • “Computer/Internet Use  Offenses& Conseq ” Computer/Internet Use – Offenses& Conseq. • Parents & students must sign acknowledgement  form yearly. form  earl 5
  • 6. 11/12/2009 • All Internet requests are filtered through  q g LightSpeed Systems filter • Specific known users (staff) may have more  relaxed filter if they have been approved for the  l dfl f h h b df h access based on job need.  ( reference JISD  procedure C2 – must use Form C2‐3  Request for  procedure C2  must use Form C2 3 “Request for  Unfiltered Internet Access” • Unknown users are restricted to most limited  Internet access, which is student access 6
  • 8. 11/12/2009 • Porn and adult content • Security Risks • Drugs & Alcohol • Hacking • Weapons • Proxies • Violence & Hate Vi l  & H • Gambling • Spyware • Dating • Virus • Social Networking • Plagiarism • Instant Messaging • pp g Shopping • Peer 2 Peer File Sharing l h • Auctions • Forums, Newsgroups &  g Blogs • Music • Email & Chat • Games 8
  • 9. 11/12/2009 On April 28, 2008 JISD implemented  Administrative Procedure C‐7 “Cyber Bullying” Ad i i t ti  P d  C  “C b  B ll i ” Seeks to make staff & students aware of internet  safety guidelines Raise awareness so that victims feel comfortable  reporting incidents p g Establishes guidelines for administrative handling of  incidents Staff & students will undergo annual training 9
  • 10. 11/12/2009 Staff St ff Action Steps Time Line Resources Evidence of Attainment Responsible Internet Research topic Feb.-March, Instructional Internet Safety Video Research folder Locate and categorize resources 2009 Technology Staff Tape PowerPoint 2007 Create PowerPoint Presentation and June-Aug., Instructional CD of presentation and Blank CD Training Script 2009 Technology Staff hardcopy of training script Copy Paper Instructional Present to Technology Meeting scheduled and Nov-Dec., Copies of Script for Technology Staff Services/Curriculum & Instruction sign in sheets of 2009 each participant Student Services Departments for feedback attendance Staff Revised CD of Digital copies of Instructional Revise Presentation Dec., 2009 presentation and revised presentation and script Technology Staff hardcopy of training script Date of principal p p Instructional Present to Administrators P t t Ad i i t t Dec., 2009 D Meeting A M ti Agenda d meetings Technology Staff Meeting room CDs and Script for Train Counselors, Social Workers, Instructional Jan., 2009 each participant Sign in sheets CITs, Librarians Technology Staff Sign-in sheets Evaluation Forms CD and script for Counselors, Social Train all Teachers on Internet Safety trainer Feb.-May 2010 Worker, Librarians Sign in sheets and Cyber Bullying Sign in sheets and CITs Evaluation forms Train all Students in K 12 on Internet K-12 CD and script for Counselors, Social Safety trainer Feb.-May 2010 Worker, Librarians Sign in sheets Train all Students in 3-12 on Cyber Sign in sheets and CITs Bullying Evaluation forms 10
  • 12. 11/12/2009 1.  Explain the main points of the JISD acceptable use policy 2.  List examples of “bad neighborhood” websites   Li   l   f “b d  i hb h d”  b i 3.  Tell how to protect oneself when using a social network site. 4. Tell why one should reconsider before placing potentially  4  Tell why one should reconsider before placing potentially  embarrassing pictures or information online 5. List rules to follow when blogging, writing instant messages,  emailing and visiting chat rooms  ili   d  i i i   h     6. Explain the dangers of revealing too much personal information to  an online acquaintance. q 7.  Tell what to do if an online acquaintance says something personal  that makes you uncomfortable or asks to meet. 12
  • 13. 11/12/2009 JISD Philosophy Student  Definition Responsibilities Rationale/Legal Reprisal or  Statistics Retaliation Prevention Discipline and  p Consequences Warning Signs Reporting Investigating Examples Staff Responsibilities 13
  • 14. 11/12/2009 1.  Define cyber bullying and explain why it can be  very dangerous. 2.  Give 2 examples of cyber bullying. 3.  Explain what to do if you receive a threatening  cyber bully message. 14