Cyberbullying, Cyberstalking, and Identity Theft

C.O.S.T.  What does cyber safety cost you OR what does the lack of cyber safety cost you as a parent, student or educator?

Let's start with a few basic definitions:

What do we even mean when we say "CYBER"?

Well, a few years ago, it was hard enough to keep abreast of all the safety issues involving home computers and the home telephone.  Now "cyber" issues involve computers, laptops, netbooks, I-PAD type devices, cell/smart phones, online gaming devices, and probably something new coming out any day.  It is almost impossible to keep up with all the changing technologies and children have access to these devices just about every where they might be, 24/7.

What is Cyberbullying?

 "Cyberbullying" is the use of e-mail, instant messaging, chat rooms, pagers,
cell phones, or other forms of information technology to deliberately
harass, threaten, or intimidate someone. "
** A bully can hide his/her true identity behind an electronic veil
** Can include acts of threats, insults, racial or ethnic slurs, spreading virus files
** More aggressive actions than what the bully might display in a

face-to-face situation (you can't see me and I can't see you!)
** Posting false information to humiliate another

From:  http://www.harcoboe.com/Parents/CyberSafety/cyberbullying.cfm 

Just a note: 
WASHINGTON, March 9, 2011 /PRNewswire/ -- In the last 12 months, 26 percent of K-12
 teachers say they've taught kids how to handle incidents of cyberbullying, while only 15 percent
said they spoke to students about online "hate speech."  This according to data released today
 by the National Cyber Security Alliance (NCSA) and Microsoft Corp.
From:  http://staysafeonline.mediaroom.com/index.php?s=43&item=76

An excerpt from:  http://www.us-cert.gov/cas/tips/ST06-005.html :
Report cyberbullying to the appropriate authorities - If you are being harassed or
 threatened, report the activity to the local authorities. Law enforcement agencies have
different policies, but your local police department or FBI branch are good starting points.
 Unfortunately, there is a distinction between free speech and punishable offenses,
 but the legal implications should be decided by the law enforcement officials and the
prosecutors. Depending on the activity, it may also be appropriate to report it to school
 officials who may have separate policies for dealing with activity that involves students.
 (This site is owned by the US Department of Homeland Security.)

What is Cyberstalking?

Cyberstalking can be defined as threatening behavior or unwanted advances
directed at another using the Internet and other forms of online and
computer communications.
From: http://www.ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&DocumentID=32458
This site also gives very detailed instructions on what to do if you are a victim of cyber stalking -- excellent source for help.

What is Identity Theft?

Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or
other crimes.
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html#Whatisidentitytheft 

Does Identity Theft occur with children?  YES, yes and yes! 
Check out this site and this study for statistics about identity theft involving children : http://childrenscreditcrisis.org/research/
Parents should check on children's identity status periodically just as they do their own.

"What should you do if your identity is stolen?

Filing a police report, checking your credit reports, notifying creditors, and disputing any unauthorized transactions are some of the steps you must take immediately to restore your good name. To learn more about these steps and more, visit the DEFEND:  Recover from Identity Theft section. To file a complaint, click here.  "   Taken from above site: 
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html#Whatisidentitytheft

Here is another site that has a wealth of information about identity theft: http://www.consumerfraudreporting.org/identitytheft.php

Real Life Cases

CBS News reported a cyberbulling case in 2010.  Check out this link for the story.   http://www.cbsnews.com/stories/2010/03/29/earlyshow/main6343077.shtml
 They go on to mention a few other incidents that gained national coverage.  At the bottom of this link is another link to a story CBS did on "cyber sexual harassment" where a young girl is the victim of someone who created a porn type site with her name and face.  If you question how prevalent all this cyberstalking or cyberbullying is , you should spend just a few minutes researching actual cases on the Internet.

Cyber Safety Tips for Children, Parents and Educators

From my research, there are lots of tips online for all of us --- it is almost overwhelming.  so, I will try to summarize them into 4 areas:
1.. Keep your computing devices up to date with the latest service providers' software, virus protection, as well as adware and spyware protection.  Know, understand, and USE the parental controls and blocking software.  This includes smart phones - they are just mini-computers.
2.  Communicate with your student about cyber safety possibilities and what you are monitoring and why. Be open, honest and frank.  The child does not have to do anything wrong to be a victim of these issues. They do need to know what to report to a parent or other authority.
3.  Check periodically for online information and/or possible identify theft issues for all people in the family.  Have you ever googled your own or your child's name?
4.  Know when and how to report instances of cyberbullying, cyberstalking, or identify theft.  Children should be taught what needs to be reported to parents or teachers.  Parents should know when and how to report issues to the local law enforcement officials.  We all need to keep watch to see if any of these issues become federal laws. Remember to keep all documentation;  it is recommended that if bullying or stalking is done on a computer, that the computer should be turned off to preserve the information until officials can review the documents.  Although I did not read this, I would assume that this would be a good policy for a smart phone also.

The FBI has published a guide on internet safety for parents' use.  It can be viewed or printed from this site:
http://www.fbi.gov/stats-services/publications/parent-guide/parent-guide 


WV and Putnam County Acceptable Use Policies

The WV Department of Education website makes the following statement that is very true.
" With connections to computers and people all over the world also comes the availability of material that may not be considered to be appropriate or have educational value. On a global network, it is impossible to restrict access to all controversial materials. It is the responsibility of the student, parent, teacher and administrator to ensure that access to telecommunication networks, computers and the Internet provided by the school, county, RESA and state educational systems is not abused."  (emphasis added)
From:  http://wvde.state.wv.us/policies/p2460.html 
This site fully explains the acceptable use policy and is very easy to follow and understand -- leaving no room for excuses if abuse is found.

The "Putnam County Schools Technology Acceptable Use Agreement Form" takes the form of a personal contract.  There is one for students and one for employees to read, understand, sign and follow. The student form states understandings and then lists the user responsibilities.  This form is signed by the student and parent or guardian. The student is not allowed access to the computer systems until this form is on file. The employee form has basically the same information but also adds a section on user responsibilities for users who "supervise" students using the schools' technology. This list includes information about reporting violations.  This is a big job for teachers, especially considering the number of students in each class and the impossible task of trying to monitor all of them on the computer at one time .

So, what does it C.O.S.T. you to be cyber safe?????.......not nearly as much as it might C.O.S.T. you if you are not!