09.01.2013 Views

Newsfrom the health, security, safety and environment (hsse)

Newsfrom the health, security, safety and environment (hsse)

Newsfrom the health, security, safety and environment (hsse)

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

H i g h S c h o o l N E W S<br />

Freedom From Chemical Dependency<br />

As part of <strong>the</strong> development of <strong>the</strong> High School Pastoral<br />

Programme in recent years we have invited various individuals<br />

<strong>and</strong> groups to come <strong>and</strong> visit <strong>the</strong> High School to speak about<br />

pertinent issues. We are pleased to advise you that on Friday 6th<br />

March visitors from a group called ‘Freedom From Chemical<br />

Dependency’ will be visiting <strong>the</strong> school <strong>and</strong> meeting with each<br />

of <strong>the</strong> grade levels. Nurse Melhus has outlined more details in<br />

her section of <strong>the</strong> Informer.<br />

Online <strong>safety</strong><br />

Earlier in <strong>the</strong> month Ms Wallace <strong>and</strong> I sent out a communication<br />

alerting parents to <strong>the</strong> potential dangers in using <strong>the</strong> internet<br />

at home <strong>and</strong> school <strong>and</strong> I thought it pertinent to extend <strong>the</strong><br />

discussion a little fur<strong>the</strong>r in this edition of <strong>the</strong> Informer.<br />

There are very few people in our community who are not<br />

’connected’ through one form of electronic communication<br />

equipment or ano<strong>the</strong>r. A mobile phone isn’t just a phone<br />

anymore. With texting, cameras, <strong>and</strong> web capacities, <strong>the</strong>re are<br />

many ways to send <strong>and</strong> receive information. Instant messaging<br />

has almost superseded email, <strong>and</strong> chat rooms, blogs (electronic<br />

diaries) <strong>and</strong> multi-purpose online services are <strong>the</strong> ‘must use’<br />

now.<br />

In this dizzying <strong>environment</strong> of digital possibilities it is<br />

essential that teachers <strong>and</strong> parents are ‘digitally literate’ too,<br />

<strong>and</strong> keenly aware of <strong>the</strong> potential for misuse of technology.<br />

This has been increasingly highlighted in <strong>the</strong> local press, many<br />

educational <strong>and</strong> family guidance websites, <strong>and</strong> for good reason<br />

with cyberbullying <strong>and</strong> digital predation being two of <strong>the</strong> main<br />

problems.<br />

A cyberbully is defined as “anyone who repeatedly misuses<br />

technology to harass, intimidate, bully or terrorize ano<strong>the</strong>r<br />

person. Such behavior usually takes <strong>the</strong> form of inappropriate<br />

<strong>and</strong> hurtful rumors or threats sent through e-mails, instant<br />

messages, text messages, or Web site posts, with <strong>the</strong> sender<br />

often anonymous or disguised as someone else.” Victims <strong>and</strong><br />

byst<strong>and</strong>ers are reluctant to admit or report <strong>the</strong>se actions until<br />

<strong>the</strong>y are desperate enough to involve adults. Cyberbullies will<br />

often have more than one victim <strong>and</strong> will continue until <strong>the</strong>y<br />

get caught.<br />

It is worth remembering though, that no computer or mobile<br />

phone <strong>and</strong> <strong>the</strong>refore no person is really anonymous in<br />

cyberspace. People tend to have <strong>the</strong> impression that everything<br />

that happens in cyberspace is temporary <strong>and</strong> fleeting, but<br />

<strong>the</strong> truth is that communication in cyberspace leaves a trail.<br />

Cyberspace reaches far <strong>and</strong> wide <strong>and</strong> deep in to <strong>the</strong> hard drives<br />

of individual computers in classrooms <strong>and</strong> private homes. More<br />

important, behaviors in cyberspace (yes, words are deeds) are<br />

downloadable, printable, <strong>and</strong> sometimes punishable by law.<br />

While technology serves to connect people <strong>and</strong> connect <strong>the</strong>m<br />

almost instantly, it also has reduced <strong>the</strong> ‘think time’ between<br />

an idea, opinion or action <strong>and</strong> confidentiality or privacy. In<br />

<strong>the</strong> case of an email or text message, once sent it is out of <strong>the</strong><br />

sender’s control <strong>and</strong> can be passed on to anyone, anywhere.<br />

The forum of a chat room broadens <strong>the</strong> audience with limited<br />

control of <strong>the</strong> recipients/participants <strong>and</strong> blogs, by <strong>the</strong>ir very<br />

nature, are open to anyone <strong>and</strong> everyone. You may have to ‘join’<br />

by submitting a few details but essentially all communications<br />

or postings are public domain, <strong>and</strong> <strong>the</strong>se days, public doesn’t<br />

mean local, it means global! The sender’s data can make appear<br />

to be older or younger than <strong>the</strong>y are.<br />

Chat rooms <strong>and</strong> o<strong>the</strong>r online services have been created to<br />

increase <strong>the</strong> spontaneity of communication. Along with this<br />

came <strong>the</strong> possibility of creating new or alternate identities<br />

through <strong>the</strong> choice of names, or profiles. Our young adolescents<br />

are attracted to <strong>the</strong>se forms of communication <strong>and</strong> <strong>the</strong>y certainly<br />

can be fun – however, <strong>the</strong>re are increasing numbers of cases<br />

of cyber bullying incidents as well as an increasing number of<br />

‘digital predators’ using chat rooms <strong>and</strong> <strong>the</strong> online services to<br />

identify <strong>and</strong> ‘stalk’ or ‘groom’ <strong>the</strong>ir victims.<br />

So what can adults do to prevent <strong>and</strong> address cyber bullying?<br />

Adults seldom are present in <strong>the</strong> online <strong>environment</strong>s frequented<br />

by children <strong>and</strong> youth. Therefore, it is extremely important that<br />

adults pay close attention to <strong>the</strong> cyber bullying <strong>and</strong> <strong>the</strong> activities<br />

of children <strong>and</strong> youth when using <strong>the</strong>se new technologies.<br />

suggestions for parents <strong>and</strong> tips to help prevent cyber<br />

bullying include:<br />

Keep your home computer(s) in easily viewable places, such<br />

as a family room or kitchen.<br />

8 · The In f o r m e r 18 fe b r u a ry 2009 www.isstavanger.no<br />

•<br />

•<br />

•<br />

•<br />

Talk regularly with your child about on-line activities he or<br />

she is involved in.<br />

•<br />

•<br />

•<br />

Talk specifically about cyber bullying <strong>and</strong> encourage<br />

your child to tell you immediately if he or she is <strong>the</strong><br />

victim of cyber bullying, cyberstalking, or o<strong>the</strong>r illegal<br />

or troublesome on-line behavior.<br />

Encourage your child to tell you if he or she is aware of<br />

o<strong>the</strong>rs who may be <strong>the</strong> victims of such behavior.<br />

Explain that cyber bullying is harmful <strong>and</strong><br />

unacceptable behavior. Outline your expectations for<br />

responsible online behavior <strong>and</strong> make it clear that <strong>the</strong>re<br />

will be consequences for inappropriate behavior.<br />

Although adults must respect <strong>the</strong> privacy of children <strong>and</strong><br />

youth, concerns for your child’s <strong>safety</strong> may sometimes<br />

override <strong>the</strong>se privacy concerns. Tell your child that you<br />

may review his or her on-line communications if you think<br />

<strong>the</strong>re is reason for concern.<br />

Consider installing parental control filtering software <strong>and</strong>/<br />

or tracking programs, but don’t rely solely on <strong>the</strong>se tools.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!