SlideShare una empresa de Scribd logo
1 de 39
CHRISTY & SANFORD HOROWITZCHRISTY & SANFORD HOROWITZ
1032 SANTA BARBARA STREET1032 SANTA BARBARA STREET
SANTA BARBARA, CA 93101SANTA BARBARA, CA 93101
(805) 452-7214(805) 452-7214
CHRIS@HOROWITZFORLAW.COMCHRIS@HOROWITZFORLAW.COM
SANDY@HOROWITZFORLAW.COMSANDY@HOROWITZFORLAW.COM
WWW.HOROWITZFORLAW.COMWWW.HOROWITZFORLAW.COM
Protecting Our Schools Against
Cyber Crime
The Internet
is a wonderful place
The dark sideThe dark side
of the Internetof the Internet
The Suicide of Phoebe Prince
 Parents – “kids will be kids”
 School – No Policy; “kids will be kids”
 Law Enforcement – Vigorous Prosecution
Every time we engageEvery time we engage
with awith a
digital system wedigital system we
leave someleave some
trace of our activitiestrace of our activities
We can track you…We can track you…
We can track you…We can track you…
SEXTING
“Sexting?”
Sexting is the sharing of sexual images
and texts through cell phones.
Due to the widespread availability of mobile
technology, the sky-high hormone levels of
young people, and the difficulty that they can
have understanding the consequences of
their decisions, not-so-innocent text
messages are being sent from cell phones
“Sexting?”
 Penal Code Section 311.11 –
Possession of Child Pornography
 Penal Code Section 288.2 –
Sending Images of Minors
Meet Kacie WoodyMeet Kacie Woody
 typical 13 year old girltypical 13 year old girl
from Greenbrier,from Greenbrier,
ArkansasArkansas
 Honor studentHonor student
 a member of the schoola member of the school
bandband
 liked going onlineliked going online
 Kacie met 17 year oldKacie met 17 year old
Dave Fagan in aDave Fagan in a
Christian chat room forChristian chat room for
teens…..teens…..
Dave was friendly, cute,Dave was friendly, cute,
and played on his highand played on his high
school football team inschool football team in
California…California…
Kacie had no doubtsKacie had no doubts
about David’s identity…about David’s identity…
In reality, Kacie wasIn reality, Kacie was
really talking to 47 yearreally talking to 47 year
old cyber predator,old cyber predator,
David Fuller.David Fuller.
Kacie made the fatal mistake ofKacie made the fatal mistake of
sharing personal information.sharing personal information.
Fuller tracked Kacie all the wayFuller tracked Kacie all the way
from his home in San Diego tofrom his home in San Diego to
the small town in Arkansasthe small town in Arkansas
where she lived.where she lived.
Kacie went missing; the policeKacie went missing; the police
ultimately found her dead.ultimately found her dead.
Internet Impersonation
 Penal Code § 528.5 – Internet Impersonation
 …to knowingly and without consent credibly
impersonate another person through or on an
Internet Web site or by other electronic
means with the intent to harm, intimidate,
threaten or defraud another person
Geo taggingGeo tagging
What is it???
“Geo-tagging” is the term given to
the adding of geographical
metadata to photos, videos,
tweets, websites and other media.
This ' metadata ‘ includes
longitude and latitude, and other
attributes of the photo location.
How does it work?
 Someone takes a photoSomeone takes a photo
 Photo is saved to their phone or is uploadedPhoto is saved to their phone or is uploaded
to Facebook, Flickr or Picasato Facebook, Flickr or Picasa
 Geo-data is embedded into the photoGeo-data is embedded into the photo
 Anyone can search the Google orAnyone can search the Google or
Flicker mapFlicker map
 They can find other photos as wellThey can find other photos as well
 Probably find a great deal of informationProbably find a great deal of information
including where you live…including where you live…
Cyberbullying Laws
 Penal Code § 653m – Sending Harassing
Text Messages
 Penal Code § 653.2 – Cyberbullying;
Cyberharassment
 Penal Code § 646.9(a) - Stalking
 Penal Code § 422 – Criminal Threats
Cyberbullying Laws
Penal Code § 528.5 – Internet Impersonation
 …to knowingly and without consent credibly
impersonate another person through or on an
Internet Web site or by other electronic
means with the intent to harm, intimidate,
threaten or defraud another person
 Penal Code 530.5(a) – Identity Theft
 No intent to defraud necessary
 For ANY unlawful purpose
 Each post is a separate Count
“Sexting?”
 Penal Code § 311.11 – Possession of Child Pornography
 Knowingly possess a photo
 Of a minor
 Depicting “Sexual Conduct”
 Penal Code § 288.2 – Sending Images of Minors
 Knowingly send a photo
 To a minor
 Depicting “Sexual Conduct
 With intent to arouse…
 Sexual Conduct: …exhibition of the genitals or pubic or rectal
area for purpose of sexual stimulation….what about “breasts?”
What can School Resource
Officers do?
“Can a police officer assigned as a school resource officer
search a student’s cell phone while on school grounds just
like a regular school employee can?”
 Yes.
 The standard is “Reasonableness” or
“Reasonable Suspicion”
What can School Resource
Officers do?
 “A school official (teacher, administrator,
principal, vice-principal, etc.) may conduct a
search of a student’s person and/or personal
property when it is “reasonable”….there must
be reasonable grounds for suspecting that the
search will turn up evidence that the student has
violated or is violating the law or rules of the
school and the search must be reasonable in
scope.” New Jersey v. TLO (1985) 469 U.S. 325.
What can School Resource
Officers do?
 Reasonableness, or “Reasonable Suspicion” not
“Probable Cause.” The “reasonableness” standard for
school officials applies to police officers working on
school campuses in their capacity as school resource
officers. In Re William V. (2003) 111 Cal.App.4th 1464.
 A police officer assigned as a school resource officer is
allowed to provide information to a school official, who
is allowed to search on the “reasonableness” standard.
And, the School Resource Officer is allowed to be
present while the school official conducts the search. In
Re K.S. 183 Cal.App.4th 72 (2010).
What can School Resource
Officers do?
 Education Code §§ 32261, 32262, 32265, 32270 and 48900
 Search and Seizure – BP/AR 5145.12
 Keep lines of communication open with parents and students
 Encourage parents and victims to save the evidence
 Educate yourself about the internet and internet safety
 Be sensitive to changes in student’s behaviors – both on and
offline…They may be victims of bullying – both in cyberspace
and face to face
Resources
www.netsmartz.orgwww.netsmartz.org
CHRISTY & SANFORD HOROWITZCHRISTY & SANFORD HOROWITZ
1032 SANTA BARBARA STREET1032 SANTA BARBARA STREET
SANTA BARBARA, CA 93101SANTA BARBARA, CA 93101
(805) 452-7214(805) 452-7214
CHRIS@HOROWITZFORLAW.COMCHRIS@HOROWITZFORLAW.COM
SANDY@HOROWITZFORLAW.COMSANDY@HOROWITZFORLAW.COM
WWW.HOROWITZFORLAW.COMWWW.HOROWITZFORLAW.COM
Protecting Our Schools Against
Cyber Crime

Más contenido relacionado

Similar a Protecting Our Schools Against Cyber Crime

1B/12 domestic sex trafficking
1B/12 domestic sex trafficking1B/12 domestic sex trafficking
1B/12 domestic sex trafficking
StopTrafficking
 
Digital Footprints
Digital FootprintsDigital Footprints
Digital Footprints
Eric Cole
 
Critical thinking
Critical thinkingCritical thinking
Critical thinking
Jiawei Lee
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
PHSD
 
2 Nj0102 D0126
2 Nj0102 D01262 Nj0102 D0126
2 Nj0102 D0126
tomiacuzio
 
Keeping your Children Safe Online
Keeping your Children Safe OnlineKeeping your Children Safe Online
Keeping your Children Safe Online
Matt Smith
 
Overview of Child Sexual Abuse_April 2017.pptx
Overview of Child Sexual Abuse_April 2017.pptxOverview of Child Sexual Abuse_April 2017.pptx
Overview of Child Sexual Abuse_April 2017.pptx
TyraCrews1
 

Similar a Protecting Our Schools Against Cyber Crime (16)

1B/12 domestic sex trafficking
1B/12 domestic sex trafficking1B/12 domestic sex trafficking
1B/12 domestic sex trafficking
 
Privacy in cyberspace
Privacy in cyberspacePrivacy in cyberspace
Privacy in cyberspace
 
Digital Footprints
Digital FootprintsDigital Footprints
Digital Footprints
 
Critical thinking
Critical thinkingCritical thinking
Critical thinking
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
2 Nj0102 D0126
2 Nj0102 D01262 Nj0102 D0126
2 Nj0102 D0126
 
Essay Introduce Myself. 006 Essay Example About Myself Introduction Best Phot...
Essay Introduce Myself. 006 Essay Example About Myself Introduction Best Phot...Essay Introduce Myself. 006 Essay Example About Myself Introduction Best Phot...
Essay Introduce Myself. 006 Essay Example About Myself Introduction Best Phot...
 
Benefits Of On Line Social Networks (Tin180.com)
Benefits Of On Line Social Networks (Tin180.com)Benefits Of On Line Social Networks (Tin180.com)
Benefits Of On Line Social Networks (Tin180.com)
 
2013 05-29 Advertising and Marketing Law Presentation
2013 05-29 Advertising and Marketing Law Presentation2013 05-29 Advertising and Marketing Law Presentation
2013 05-29 Advertising and Marketing Law Presentation
 
Keeping your Children Safe Online
Keeping your Children Safe OnlineKeeping your Children Safe Online
Keeping your Children Safe Online
 
CYBER SAFETY.pptx
CYBER SAFETY.pptxCYBER SAFETY.pptx
CYBER SAFETY.pptx
 
Hackbama Cyber Crimes Investigations
Hackbama Cyber Crimes InvestigationsHackbama Cyber Crimes Investigations
Hackbama Cyber Crimes Investigations
 
Overview of Child Sexual Abuse_April 2017.pptx
Overview of Child Sexual Abuse_April 2017.pptxOverview of Child Sexual Abuse_April 2017.pptx
Overview of Child Sexual Abuse_April 2017.pptx
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Internet Safety For Kids By Tanmay
Internet Safety For Kids By TanmayInternet Safety For Kids By Tanmay
Internet Safety For Kids By Tanmay
 
Obstruction of justice
Obstruction of justiceObstruction of justice
Obstruction of justice
 

Más de Sanford Horowitz

Más de Sanford Horowitz (8)

Information for witnesses in criminal cases
Information for witnesses in criminal casesInformation for witnesses in criminal cases
Information for witnesses in criminal cases
 
Child and spousal support
Child and spousal supportChild and spousal support
Child and spousal support
 
Investigation & Prosecution of Domestic Violence
Investigation & Prosecution of Domestic ViolenceInvestigation & Prosecution of Domestic Violence
Investigation & Prosecution of Domestic Violence
 
Investigation and Prosecution of Hate Crimes
Investigation and Prosecution of Hate CrimesInvestigation and Prosecution of Hate Crimes
Investigation and Prosecution of Hate Crimes
 
Identity theft- Horowitz Law
Identity theft- Horowitz LawIdentity theft- Horowitz Law
Identity theft- Horowitz Law
 
Famous Santa Barbara Criminal Cases- Horowitz For Law
Famous Santa Barbara Criminal Cases- Horowitz For LawFamous Santa Barbara Criminal Cases- Horowitz For Law
Famous Santa Barbara Criminal Cases- Horowitz For Law
 
Horowitz Law- The Anatomy Of A DUI Investigation
Horowitz Law- The Anatomy Of A DUI InvestigationHorowitz Law- The Anatomy Of A DUI Investigation
Horowitz Law- The Anatomy Of A DUI Investigation
 
Divorce, Child Support, Rape? An Introduction to California Courts
Divorce, Child Support, Rape? An Introduction to California CourtsDivorce, Child Support, Rape? An Introduction to California Courts
Divorce, Child Support, Rape? An Introduction to California Courts
 

Último

一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
F La
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
A AA
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
Airst S
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
A AA
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
Airst S
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
Airst S
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
CssSpamx
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
Airst S
 

Último (20)

The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 

Protecting Our Schools Against Cyber Crime

  • 1. CHRISTY & SANFORD HOROWITZCHRISTY & SANFORD HOROWITZ 1032 SANTA BARBARA STREET1032 SANTA BARBARA STREET SANTA BARBARA, CA 93101SANTA BARBARA, CA 93101 (805) 452-7214(805) 452-7214 CHRIS@HOROWITZFORLAW.COMCHRIS@HOROWITZFORLAW.COM SANDY@HOROWITZFORLAW.COMSANDY@HOROWITZFORLAW.COM WWW.HOROWITZFORLAW.COMWWW.HOROWITZFORLAW.COM Protecting Our Schools Against Cyber Crime
  • 2. The Internet is a wonderful place
  • 3. The dark sideThe dark side of the Internetof the Internet
  • 4.
  • 5.
  • 6. The Suicide of Phoebe Prince  Parents – “kids will be kids”  School – No Policy; “kids will be kids”  Law Enforcement – Vigorous Prosecution
  • 7. Every time we engageEvery time we engage with awith a digital system wedigital system we leave someleave some trace of our activitiestrace of our activities
  • 8.
  • 9.
  • 10.
  • 11. We can track you…We can track you…
  • 12. We can track you…We can track you…
  • 14.
  • 15. “Sexting?” Sexting is the sharing of sexual images and texts through cell phones. Due to the widespread availability of mobile technology, the sky-high hormone levels of young people, and the difficulty that they can have understanding the consequences of their decisions, not-so-innocent text messages are being sent from cell phones
  • 16.
  • 17.
  • 18.
  • 19. “Sexting?”  Penal Code Section 311.11 – Possession of Child Pornography  Penal Code Section 288.2 – Sending Images of Minors
  • 20. Meet Kacie WoodyMeet Kacie Woody  typical 13 year old girltypical 13 year old girl from Greenbrier,from Greenbrier, ArkansasArkansas  Honor studentHonor student  a member of the schoola member of the school bandband  liked going onlineliked going online  Kacie met 17 year oldKacie met 17 year old Dave Fagan in aDave Fagan in a Christian chat room forChristian chat room for teens…..teens…..
  • 21. Dave was friendly, cute,Dave was friendly, cute, and played on his highand played on his high school football team inschool football team in California…California… Kacie had no doubtsKacie had no doubts about David’s identity…about David’s identity… In reality, Kacie wasIn reality, Kacie was really talking to 47 yearreally talking to 47 year old cyber predator,old cyber predator, David Fuller.David Fuller.
  • 22. Kacie made the fatal mistake ofKacie made the fatal mistake of sharing personal information.sharing personal information. Fuller tracked Kacie all the wayFuller tracked Kacie all the way from his home in San Diego tofrom his home in San Diego to the small town in Arkansasthe small town in Arkansas where she lived.where she lived. Kacie went missing; the policeKacie went missing; the police ultimately found her dead.ultimately found her dead.
  • 23. Internet Impersonation  Penal Code § 528.5 – Internet Impersonation  …to knowingly and without consent credibly impersonate another person through or on an Internet Web site or by other electronic means with the intent to harm, intimidate, threaten or defraud another person
  • 25. “Geo-tagging” is the term given to the adding of geographical metadata to photos, videos, tweets, websites and other media. This ' metadata ‘ includes longitude and latitude, and other attributes of the photo location.
  • 26.
  • 27. How does it work?  Someone takes a photoSomeone takes a photo  Photo is saved to their phone or is uploadedPhoto is saved to their phone or is uploaded to Facebook, Flickr or Picasato Facebook, Flickr or Picasa  Geo-data is embedded into the photoGeo-data is embedded into the photo  Anyone can search the Google orAnyone can search the Google or Flicker mapFlicker map  They can find other photos as wellThey can find other photos as well  Probably find a great deal of informationProbably find a great deal of information including where you live…including where you live…
  • 28.
  • 29.
  • 30.
  • 31. Cyberbullying Laws  Penal Code § 653m – Sending Harassing Text Messages  Penal Code § 653.2 – Cyberbullying; Cyberharassment  Penal Code § 646.9(a) - Stalking  Penal Code § 422 – Criminal Threats
  • 32. Cyberbullying Laws Penal Code § 528.5 – Internet Impersonation  …to knowingly and without consent credibly impersonate another person through or on an Internet Web site or by other electronic means with the intent to harm, intimidate, threaten or defraud another person  Penal Code 530.5(a) – Identity Theft  No intent to defraud necessary  For ANY unlawful purpose  Each post is a separate Count
  • 33. “Sexting?”  Penal Code § 311.11 – Possession of Child Pornography  Knowingly possess a photo  Of a minor  Depicting “Sexual Conduct”  Penal Code § 288.2 – Sending Images of Minors  Knowingly send a photo  To a minor  Depicting “Sexual Conduct  With intent to arouse…  Sexual Conduct: …exhibition of the genitals or pubic or rectal area for purpose of sexual stimulation….what about “breasts?”
  • 34. What can School Resource Officers do? “Can a police officer assigned as a school resource officer search a student’s cell phone while on school grounds just like a regular school employee can?”  Yes.  The standard is “Reasonableness” or “Reasonable Suspicion”
  • 35. What can School Resource Officers do?  “A school official (teacher, administrator, principal, vice-principal, etc.) may conduct a search of a student’s person and/or personal property when it is “reasonable”….there must be reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating the law or rules of the school and the search must be reasonable in scope.” New Jersey v. TLO (1985) 469 U.S. 325.
  • 36. What can School Resource Officers do?  Reasonableness, or “Reasonable Suspicion” not “Probable Cause.” The “reasonableness” standard for school officials applies to police officers working on school campuses in their capacity as school resource officers. In Re William V. (2003) 111 Cal.App.4th 1464.  A police officer assigned as a school resource officer is allowed to provide information to a school official, who is allowed to search on the “reasonableness” standard. And, the School Resource Officer is allowed to be present while the school official conducts the search. In Re K.S. 183 Cal.App.4th 72 (2010).
  • 37. What can School Resource Officers do?  Education Code §§ 32261, 32262, 32265, 32270 and 48900  Search and Seizure – BP/AR 5145.12  Keep lines of communication open with parents and students  Encourage parents and victims to save the evidence  Educate yourself about the internet and internet safety  Be sensitive to changes in student’s behaviors – both on and offline…They may be victims of bullying – both in cyberspace and face to face
  • 39. CHRISTY & SANFORD HOROWITZCHRISTY & SANFORD HOROWITZ 1032 SANTA BARBARA STREET1032 SANTA BARBARA STREET SANTA BARBARA, CA 93101SANTA BARBARA, CA 93101 (805) 452-7214(805) 452-7214 CHRIS@HOROWITZFORLAW.COMCHRIS@HOROWITZFORLAW.COM SANDY@HOROWITZFORLAW.COMSANDY@HOROWITZFORLAW.COM WWW.HOROWITZFORLAW.COMWWW.HOROWITZFORLAW.COM Protecting Our Schools Against Cyber Crime

Notas del editor

  1. If you've been keeping tabs on the news lately, you may have noticed an alarming amount of stories detailing how teens are using cell phones to send sexual messages and pictures.