[Year 12 IPM] Cyber Bulling

Kevork Krozian Kroset at novell1.fhc.vic.edu.au
Wed Sep 6 09:24:05 EST 2006


Hi Folks,

    We actually have an online Student Suspension ( from the Network only ) form that is used to submit these requests. Any misuse of equipment, resources, or misbehaviour with computers ( playing games, downloading inappropriate material such as images, videos be they pornographic, anti-social or any othe category not related to the class activity at the time ) is reported by filling in the online form and requesting one or more of 

                 .  Revoking internet access
                 .  Revoking use of email  ( we use Novell Netware's Groupwise service )
                 .  Revoking log in access to the network ie. home drive, printing, applications

   There is a log of all web sites a student accesses ( down to machine, location, user, time , site visited ) and this can be used as evidence or for investigation purposes if there is any suspicion a student is doing the wrong thing. This usually picks up anyone using other students' accounts as well.
   The requesting teacher briefly outlines the offence on the form and the start and end date for the suspension. Length of suspension is no less than 1 month for a first offence. There is a database of all previous offences as well to help monitor any patterns or repeat offenders. There is also a lecture/counselling to inform the student of the offence and the consequences.
   Usually teacher prefer students bel allowed to log onto the Network to work on applications so the teacher is not punished as well.  This system reduces the high drama and labour intensive aspect of going through too many hoops to get a suspension in place. Usually the whole process takes 5 minutes as soon as the form is filled in. There is also an active page of current suspensions for teachers to view to better manage their classes.

   When it comes to cyber bullying, we take the "cyber" out of it and treat it as any other bullying offence with the same consequences. We only use the "cyber" for gathering evidence and history , if any , of the behaviour.  Obvoiusly this can become harder when it is done on an external email system such as hotmail, yahoo etc. But thankfully, we haven't had this problem to date. It does however present problems in that there is no access to the accounts of the alleged bullyer even if the bullied can present their emails.    
   What would others do in this case I wonder, especially if the bullyer's identity is not clear from their external email account  ??


Best Wishes




Kevork Krozian
IT Manager , Forest Hill College
k.krozian at fhc.vic.edu.au
http://www.fhc.vic.edu.au
Mobile: 0419 356 034

>>> hancobr at nagle.sale.catholic.edu.au 09/06/06 09:46am >>>
Chop his hands off and tie him to a pole in the quadrangle. 
 
While some may see this a little harsh, it is his second offence.
 
(for those who cant read sarcasm in email, I'm joking)
 
But it does raise the point of swift and strong punishment. It may seem like something small but small things can take hours to track down and correct. Send his parents a bill for 2 tech hrs at $150/hr.
 
I would certainly remove him from the network for a good length of time.
 
Brendyn
 
 
 
Brendyn Hancock
IT Manager
---------------------------------------------
Nagle College
5152 6122
Bairnsdale VIC 3875 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
Important - This email and any attachments may be confidential. If received in error, please contact us and delete all copies. Before opening or using attachments check them for viruses and defects. Regardless of any loss, damage or consequence, whether caused by the negligence of the sender or not, resulting directly or indirectly from the use of any attached files our liability is limited to resupplying any affected attachments. Any representations or opinions expressed are those of the individual sender, and not necessarily those of Nagle College, Bairnsdale. 


>>> samdenniston at iprimus.com.au 05/09/2006 8:21 pm >>>
How would people respond to the following:

A student is caught loading mischievous vb scripts onto a school computer more than once. What would be considered a suitable and fitting reprimand?


On 5/9/06 7:53 PM, "Charmaine Taylor" <tigeroz at alphalink.com.au> wrote:

At our school Hector,
The LT Coordinator removes the bully's network access privileges for a month for misusing the network and 
the Year Level Coordinator takes care of the discipline re bullying (quite a process here. I think its warning, meeting with bullied (if they agree) to sort out the problem, contact parents, repeat offence = detention or suspension).

Charmaine Taylor
Sunbury Downs College

Hector Miller wrote:
   
 
 

Hi to all

 
 

 
 
 
 

In light of the recent media coverage of bullying in schools.  

 
 

 
 
 
 

I have been asked to find out, if other schools have policies on cyber bullying. We have had a few incidents at our school in recent weeks and they seem to be on the rise.  I am looking for guidance or advice, on what other school have in place regarding cyber bullying.

 
 

 
 
 
 

Any documentation, links, insights, and ideas would be appreciated.

 
 

 
 
 
 

Hector Miller

 
 

IT Co-ordinator

 
 

Mackillop College 

 
 

Swan Hill

 
 

 
 
 
 

 
 
 
 

 
 
 
_______________________________________________ 
  http://www.edulists.com.au  <http://www.edulists.com.au> - FAQ, resources, subscribe, unsubscribe 
IPM Mailing List kindly supported by 
  http://www.vcaa.vic.edu.au  <http://www.vcaa.vic.edu.au> - Victorian Curriculum and Assessment Authority and 
  http://www.vitta.org.au  <http://www.vitta.org.au>  - VITTA Victorian Information Technology Teachers Association Inc
_______________________________________________ 
 http://www.edulists.com.au  <http://www.edulists.com.au>  - FAQ, resources, subscribe, unsubscribe 
IPM Mailing List kindly supported by 
 http://www.vcaa.vic.edu.au  <http://www.vcaa.vic.edu.au>  - Victorian Curriculum and Assessment Authority and 
 http://www.vitta.org.au   <http://www.vitta.org.au>  - VITTA Victorian Information Technology Teachers Association Inc

_______________________________________________ 
http://www.edulists.com.au - FAQ, resources, subscribe, unsubscribe 
IPM Mailing List kindly supported by 
http://www.vcaa.vic.edu.au - Victorian Curriculum and Assessment Authority and 
http://www.vitta.org.au - VITTA Victorian Information Technology Teachers Association Inc 



More information about the ipm mailing list