SlideShare uma empresa Scribd logo
1 de 28
There’s No Such Thing as Safe “Sext” How to Protect Your Kids  and Your District from Cell Phone Misuse Frederick S. Lane National School Boards Association Annual Conference 4 April 2011 www.FrederickLane.com
Seminar Overview What Is Sexting? The Technology of Sexting The Scope of the Problem Why Do Kids Sext? The Legal Issues The Consequences Are Your Policies In Order? Prevention Through Education Age-Appropriate Curricula www.FrederickLane.com
Introduction Attorney, Educational Consultant & Lecturer www.FrederickLane.com
Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books www.FrederickLane.com
Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books Computer Forensics Expert www.FrederickLane.com
Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books Computer Forensics Expert 10 Years -- Burlington (VT) School Board www.FrederickLane.com
Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books Computer Forensics Expert 10 Years -- Burlington (VT) School Board Technology & Privacy Specialist www.FrederickLane.com
Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books Computer Forensics Expert 10 Years -- Burlington (VT) School Board Technology & Privacy Specialist Student Safety Advocate www.FrederickLane.com
What Is “Sexting”? www.FrederickLane.com Spring 2008: Old Behavior, New Word No Precise Legal Definition of “Sext” Typically Covered by Federal and State Child Pornography Statutes General Definition:  Sending Texts, Photos, or Videos of a Sexual Nature from One Cellphone to Another
The Technology of Sexting www.FrederickLane.com SMS – Short Message Service First used in 1992, became popular in 2005/2006 Messages generally limited to 160 characters MMS – Multimedia Messaging Service Introduced in 1998 Enables sending of photos and videos Camera Phones 1997: First publicly-shared photo via phone 2001: Phones introduced with video capability Internet Access 1999: Japan’s NTT DoCoMo introduces mobile Internet
The Scope of the Problem - I www.FrederickLane.com Teen Usage of Cellphones Is Rising: Ages 15-18: ~ 84% Ages 10-14: ~ 60% Ages 6-9: ~ 22% The Average Age of First Cellphone Use: < 10 Teens LOVE to Send Texts: Boys (13-17): 2,539 texts per month Girls (13-17): 4,050 texts per month Roughly 90% of cellphones have cameras
The Scope of the Problem - II www.FrederickLane.com National Campaign to Prevent Teen and Unplanned Pregnancy (2008): 20% of teens 13-19 said that they had sent/posted nude photos or videos 39% of teens said that they had sent/posted sexually explicit messages Pew Research Center’s Internet & American Life Project (2009) Just 4% of teens 12-17 reported sending nude photos or videos 15 % reported receiving such messages Anecdotal Evidence Suggest These Figures Are Low
Why Do Kids Sext? www.FrederickLane.com National Campaign to Prevent Teen and Unplanned Pregnancy (2008): 2/3 of those who sexted sent the content to a boyfriend or girlfriend; 15% of recipients said they forwarded the message to someone else 15% of those who sexted sent the content to someone they knew only online Pew Research Center’s Internet & American Life Project (2009) 82% sent a sext to get attention 67% sent a sext “to be cool” 60% sent a sext to be like the “popular girls” 55% sent a sext to solicit or further a relationship
Some Other Reasons It’s Fast and Easy www.FrederickLane.com
Some Other Reasons It’s Fast and Easy The Internet www.FrederickLane.com
Some Other Reasons It’s Fast and Easy The Internet Porn Chic www.FrederickLane.com
Some Other Reasons It’s Fast and Easy The Internet Porn Chic Celebrity Sexting www.FrederickLane.com
Some Other Reasons It’s Fast and Easy The Internet Porn Chic Celebrity Sexting Hormones www.FrederickLane.com
The Legal Issues A sexually explicit image of an individual under 18* is child pornography Children can be prosecuted for receipt, possession, and/or production There is risk for teachers and school administrators in handling these images Conviction generally results in jail time and registration as a sex offender States are considering “Romeo and Juliet exceptions. www.FrederickLane.com
Emotional and Social Impact Short-Term: Embarrassment Bullying, Harassment, Ostracization Sexual Blackmail (Sextortion) Long-Term: Depression and Mental Illness Self-Injury and/or Suicide www.FrederickLane.com
Jesse Logan 18 year old high school senior in Ohio Sent nude photos of herself to her boyfriend When they broke up, he forwarded them to various students – 7 schools involved Logan was harassed, taunted, and even physically assaulted because of the photographs In July 2008, Logan committed suicide www.FrederickLane.com
Consequences for Students School Sanctions: Violation of various school policies Removal from extracurriculars or school Negative impact on college admissions or jobs Civil Liability: Invasion of privacy (depending on state) Intentional Infliction of Emotional Distress Criminal Prosecution: Federal child pornography statutes (< 18) State child pornography statutes (varies) www.FrederickLane.com
Consequences for Districts Disruption of Educational Activities Civil Lawsuits: State anti-bullying statutes (varies) Failure to provide /maintain a safe environment Criminal Liability for Employees: Relationship-Based Crimes Possible investigation / seizure of computers and network Possession / Distribution of Child Pornography www.FrederickLane.com
Are Your Policies In Order? Acceptable Use Policies: Does It Describe and Limit Student Use of District Resources? Does It Stress the Importance of and Respect for Personal Privacy? Does It Specifically Describe and Prohibit Illegal Conduct? Anti-Harassment and Anti-Bullying: Does It Encompass Electronic Communications? Does It Encompass Off-Campus Behavior That Affects the Classroom? www.FrederickLane.com
Education: It’s What We Do Schedule Annual Information Sessions for Teachers, Parents, and Students Require Students and Parents to Read and Sign AUP and Anti-Bullying Policies Incorporate Sexting and Cyberbullying Into Professional Development for Teachers and Administrators Liaise With Student Resource Officers, Law Enforcement, and Legislators www.FrederickLane.com
Age-Appropriate Curricula Elementary School: The Limits of Sharing Personal Boundaries Middle School: Much More on Personal Boundaries Anti-Cyberbullying and Anti-Harassment Introduction to Criminal Consequences and Cyberethics High School: Much More on Criminal Consequences and Cyberethics Long-Term Consequences of Digital Stupidity www.FrederickLane.com
Additional Resources Cybertraps for the Young www.CybertrapsfortheYoung.com (beginning 1 August 2011) Download This Presentation: www.FrederickLane.com (http://goo.gl/tWIuX) www.SlideShare.com/FSL3 Contact Me: FSLane3@gmail.com / 802-318-4604 www.FrederickLane.com
There’s No Such Thing as Safe “Sext” How to Protect Your Kids  and Your District from Cell Phone Misuse Frederick S. Lane National School Boards Association Annual Conference 4 April 2011 www.FrederickLane.com

Mais conteúdo relacionado

Mais procurados

Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence Gennia Holder
 
Living in a #metoo World
Living in a #metoo WorldLiving in a #metoo World
Living in a #metoo WorldBoyarMiller
 
We need to talk about porn
We need to talk about pornWe need to talk about porn
We need to talk about pornMaryrose Lyons
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet yadith_
 
#MeToo in the Workplace
#MeToo in the Workplace#MeToo in the Workplace
#MeToo in the Workplacebenefitexpress
 
Social networks 2013-dwm
Social networks 2013-dwmSocial networks 2013-dwm
Social networks 2013-dwmjsgagnon
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingkpwillia
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet SafetyJVGAJJAR
 
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)Frederick Lane
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internetryangregory55
 
THE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersTHE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersSWEET SPOT ACADEMY
 
Internet Safety Meeting New
Internet Safety Meeting NewInternet Safety Meeting New
Internet Safety Meeting NewRandy Rodgers
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
2015-02-12 Cybertraps for the Young
2015-02-12 Cybertraps for the Young2015-02-12 Cybertraps for the Young
2015-02-12 Cybertraps for the YoungFrederick Lane
 
2017 legal update for Williams supervisors
2017 legal update for Williams supervisors2017 legal update for Williams supervisors
2017 legal update for Williams supervisorseph-hr
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the LawSuna Gurol
 
Cyber Bullying and Sexting
Cyber Bullying and SextingCyber Bullying and Sexting
Cyber Bullying and Sextingmathman314
 

Mais procurados (20)

Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence Teens: Cyberbullying, Sexting And Your Internet Presence
Teens: Cyberbullying, Sexting And Your Internet Presence
 
Living in a #metoo World
Living in a #metoo WorldLiving in a #metoo World
Living in a #metoo World
 
We need to talk about porn
We need to talk about pornWe need to talk about porn
We need to talk about porn
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet
 
#MeToo in the Workplace
#MeToo in the Workplace#MeToo in the Workplace
#MeToo in the Workplace
 
Social networks 2013-dwm
Social networks 2013-dwmSocial networks 2013-dwm
Social networks 2013-dwm
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
 
Hs facebook pwrpoint
Hs facebook pwrpointHs facebook pwrpoint
Hs facebook pwrpoint
 
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
 
THE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital LeadersTHE BRAND OF YOU - Raising Digital Leaders
THE BRAND OF YOU - Raising Digital Leaders
 
Internet Safety Meeting New
Internet Safety Meeting NewInternet Safety Meeting New
Internet Safety Meeting New
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
2015-02-12 Cybertraps for the Young
2015-02-12 Cybertraps for the Young2015-02-12 Cybertraps for the Young
2015-02-12 Cybertraps for the Young
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
2017 legal update for Williams supervisors
2017 legal update for Williams supervisors2017 legal update for Williams supervisors
2017 legal update for Williams supervisors
 
Cyberbullying and the Law
Cyberbullying and the LawCyberbullying and the Law
Cyberbullying and the Law
 
Cyber Bullying and Sexting
Cyber Bullying and SextingCyber Bullying and Sexting
Cyber Bullying and Sexting
 

Semelhante a 2011-04-09 There's No Such Thing as Safe "Sext"

Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Karen Brooks
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullyingkschermerhorn
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overviewJohn Woodring
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28thJohn Field
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying John Field
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
Esafety b&s briefing update
Esafety b&s briefing update Esafety b&s briefing update
Esafety b&s briefing update Dan Bowen
 
Encyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety PresentationEncyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety Presentationqgecko
 
Violence Against Bullies
Violence Against BulliesViolence Against Bullies
Violence Against Bulliesjbaton
 

Semelhante a 2011-04-09 There's No Such Thing as Safe "Sext" (20)

Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31Internetsafetyandcyberbullingfinal april31
Internetsafetyandcyberbullingfinal april31
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
 
Cyberbullyingppt
CyberbullyingpptCyberbullyingppt
Cyberbullyingppt
 
Sexting
SextingSexting
Sexting
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
102009
102009102009
102009
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Pp Bt28th
Cyberbullying Pp Bt28thCyberbullying Pp Bt28th
Cyberbullying Pp Bt28th
 
Sexting
SextingSexting
Sexting
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Esafety b&s briefing update
Esafety b&s briefing update Esafety b&s briefing update
Esafety b&s briefing update
 
Encyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety PresentationEncyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety Presentation
 
Violence Against Bullies
Violence Against BulliesViolence Against Bullies
Violence Against Bullies
 

Mais de Frederick Lane

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical EducatorFrederick Lane
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for EducatorsFrederick Lane
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of CybersecurityFrederick Lane
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech DirectorsFrederick Lane
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital MobFrederick Lane
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational ToolFrederick Lane
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social MediaFrederick Lane
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for EducatorsFrederick Lane
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and ProfessionalFrederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEEFrederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?Frederick Lane
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR ProfessionalsFrederick Lane
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEEFrederick Lane
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEEFrederick Lane
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...Frederick Lane
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & CybersecurityFrederick Lane
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get CaughtFrederick Lane
 

Mais de Frederick Lane (20)

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught
 

Último

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 

Último (20)

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 

2011-04-09 There's No Such Thing as Safe "Sext"

  • 1. There’s No Such Thing as Safe “Sext” How to Protect Your Kids and Your District from Cell Phone Misuse Frederick S. Lane National School Boards Association Annual Conference 4 April 2011 www.FrederickLane.com
  • 2. Seminar Overview What Is Sexting? The Technology of Sexting The Scope of the Problem Why Do Kids Sext? The Legal Issues The Consequences Are Your Policies In Order? Prevention Through Education Age-Appropriate Curricula www.FrederickLane.com
  • 3. Introduction Attorney, Educational Consultant & Lecturer www.FrederickLane.com
  • 4. Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books www.FrederickLane.com
  • 5. Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books Computer Forensics Expert www.FrederickLane.com
  • 6. Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books Computer Forensics Expert 10 Years -- Burlington (VT) School Board www.FrederickLane.com
  • 7. Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books Computer Forensics Expert 10 Years -- Burlington (VT) School Board Technology & Privacy Specialist www.FrederickLane.com
  • 8. Introduction Attorney, Educational Consultant & Lecturer Author of 6 Books Computer Forensics Expert 10 Years -- Burlington (VT) School Board Technology & Privacy Specialist Student Safety Advocate www.FrederickLane.com
  • 9. What Is “Sexting”? www.FrederickLane.com Spring 2008: Old Behavior, New Word No Precise Legal Definition of “Sext” Typically Covered by Federal and State Child Pornography Statutes General Definition: Sending Texts, Photos, or Videos of a Sexual Nature from One Cellphone to Another
  • 10. The Technology of Sexting www.FrederickLane.com SMS – Short Message Service First used in 1992, became popular in 2005/2006 Messages generally limited to 160 characters MMS – Multimedia Messaging Service Introduced in 1998 Enables sending of photos and videos Camera Phones 1997: First publicly-shared photo via phone 2001: Phones introduced with video capability Internet Access 1999: Japan’s NTT DoCoMo introduces mobile Internet
  • 11. The Scope of the Problem - I www.FrederickLane.com Teen Usage of Cellphones Is Rising: Ages 15-18: ~ 84% Ages 10-14: ~ 60% Ages 6-9: ~ 22% The Average Age of First Cellphone Use: < 10 Teens LOVE to Send Texts: Boys (13-17): 2,539 texts per month Girls (13-17): 4,050 texts per month Roughly 90% of cellphones have cameras
  • 12. The Scope of the Problem - II www.FrederickLane.com National Campaign to Prevent Teen and Unplanned Pregnancy (2008): 20% of teens 13-19 said that they had sent/posted nude photos or videos 39% of teens said that they had sent/posted sexually explicit messages Pew Research Center’s Internet & American Life Project (2009) Just 4% of teens 12-17 reported sending nude photos or videos 15 % reported receiving such messages Anecdotal Evidence Suggest These Figures Are Low
  • 13. Why Do Kids Sext? www.FrederickLane.com National Campaign to Prevent Teen and Unplanned Pregnancy (2008): 2/3 of those who sexted sent the content to a boyfriend or girlfriend; 15% of recipients said they forwarded the message to someone else 15% of those who sexted sent the content to someone they knew only online Pew Research Center’s Internet & American Life Project (2009) 82% sent a sext to get attention 67% sent a sext “to be cool” 60% sent a sext to be like the “popular girls” 55% sent a sext to solicit or further a relationship
  • 14. Some Other Reasons It’s Fast and Easy www.FrederickLane.com
  • 15. Some Other Reasons It’s Fast and Easy The Internet www.FrederickLane.com
  • 16. Some Other Reasons It’s Fast and Easy The Internet Porn Chic www.FrederickLane.com
  • 17. Some Other Reasons It’s Fast and Easy The Internet Porn Chic Celebrity Sexting www.FrederickLane.com
  • 18. Some Other Reasons It’s Fast and Easy The Internet Porn Chic Celebrity Sexting Hormones www.FrederickLane.com
  • 19. The Legal Issues A sexually explicit image of an individual under 18* is child pornography Children can be prosecuted for receipt, possession, and/or production There is risk for teachers and school administrators in handling these images Conviction generally results in jail time and registration as a sex offender States are considering “Romeo and Juliet exceptions. www.FrederickLane.com
  • 20. Emotional and Social Impact Short-Term: Embarrassment Bullying, Harassment, Ostracization Sexual Blackmail (Sextortion) Long-Term: Depression and Mental Illness Self-Injury and/or Suicide www.FrederickLane.com
  • 21. Jesse Logan 18 year old high school senior in Ohio Sent nude photos of herself to her boyfriend When they broke up, he forwarded them to various students – 7 schools involved Logan was harassed, taunted, and even physically assaulted because of the photographs In July 2008, Logan committed suicide www.FrederickLane.com
  • 22. Consequences for Students School Sanctions: Violation of various school policies Removal from extracurriculars or school Negative impact on college admissions or jobs Civil Liability: Invasion of privacy (depending on state) Intentional Infliction of Emotional Distress Criminal Prosecution: Federal child pornography statutes (< 18) State child pornography statutes (varies) www.FrederickLane.com
  • 23. Consequences for Districts Disruption of Educational Activities Civil Lawsuits: State anti-bullying statutes (varies) Failure to provide /maintain a safe environment Criminal Liability for Employees: Relationship-Based Crimes Possible investigation / seizure of computers and network Possession / Distribution of Child Pornography www.FrederickLane.com
  • 24. Are Your Policies In Order? Acceptable Use Policies: Does It Describe and Limit Student Use of District Resources? Does It Stress the Importance of and Respect for Personal Privacy? Does It Specifically Describe and Prohibit Illegal Conduct? Anti-Harassment and Anti-Bullying: Does It Encompass Electronic Communications? Does It Encompass Off-Campus Behavior That Affects the Classroom? www.FrederickLane.com
  • 25. Education: It’s What We Do Schedule Annual Information Sessions for Teachers, Parents, and Students Require Students and Parents to Read and Sign AUP and Anti-Bullying Policies Incorporate Sexting and Cyberbullying Into Professional Development for Teachers and Administrators Liaise With Student Resource Officers, Law Enforcement, and Legislators www.FrederickLane.com
  • 26. Age-Appropriate Curricula Elementary School: The Limits of Sharing Personal Boundaries Middle School: Much More on Personal Boundaries Anti-Cyberbullying and Anti-Harassment Introduction to Criminal Consequences and Cyberethics High School: Much More on Criminal Consequences and Cyberethics Long-Term Consequences of Digital Stupidity www.FrederickLane.com
  • 27. Additional Resources Cybertraps for the Young www.CybertrapsfortheYoung.com (beginning 1 August 2011) Download This Presentation: www.FrederickLane.com (http://goo.gl/tWIuX) www.SlideShare.com/FSL3 Contact Me: FSLane3@gmail.com / 802-318-4604 www.FrederickLane.com
  • 28. There’s No Such Thing as Safe “Sext” How to Protect Your Kids and Your District from Cell Phone Misuse Frederick S. Lane National School Boards Association Annual Conference 4 April 2011 www.FrederickLane.com