2007 URMIA Journal

Total Page:16

File Type:pdf, Size:1020Kb

2007 URMIA Journal URMIA Journal 2007–08 Denver UNIVERSITY RISK MANAGEMENT AND INSURANCE ASSOCIATION 5692 Cover_NoSpine.indd 1 12/17/2010 4:05:49 PM The mountains they are silent folk They stand afar—alone, And the clouds that kiss their brows at night Hear neither sigh nor groan. Each bears him in his ordered place As soldiers do, and bold and high They fold their forests round their feet And bolster up the sky. —HAMLIN GARLAND (1860–1940), “THE MOUNTAINS ARE A LONELY FOLK” Front cover: Rocky Mountains, Colorado Denver: host city for the 2007 URMIA Conference. 5692 Cover_NoSpine.indd 2 12/17/2010 4:06:27 PM URMIAURMIA JournalJournal 2007–08 University Risk Management and Insurance Association OFFICERS President Ellen M. Shew Holland, ARM University of Denver (303) 871-2327 [email protected] President-Elect Vincent E. Morris, CPCU, ARM, AIC, CRM, CIC Wheaton College (630) 752-5013 [email protected] Secretary Anita C. Ingram, MBA, ARM Southern Methodist University (214) 768-4047 [email protected] Treasurer Margaret Tungseth, CPA, MBA Concordia College (218) 299-3327 [email protected] Downtown Denver, Colorado Parliamentarian Photo credit: Denver Metro Convention & Visitors Bureau Gary W. Langsdale, ARM Pennsylvania State University (814) 865-6308 [email protected] Immediate Past President Allen J. Bova, MBA, ARM, DRM Cornell University (607) 277-1188 [email protected] DIRECTORS Julie C. Baecker, AIC, ARM (’10) University of Alaska (907) 450-8153 [email protected] Mary Breighner, CPCU, DRM (’09) FM Global (513) 742-9516 [email protected] Steve Bryant, CRM, ARM (’09) Texas Tech University System (806) 742-0212 [email protected] Mary Dewey, ARM, CIC, CPCU, DRM (’08) University of Vermont (802) 656-8453 [email protected] Jill Laster, ARM, DRM (’08) Texas Christian University (817) 257-6798 [email protected] Marjorie F. B. Lemmon, ARM, CPCU (’10) Yale University (203) 432-0140 [email protected] David Pajak, ARM (’10) Syracuse University (315) 443-5334 [email protected] National Offi ce P.O. Box 1027 Donna Pearcy, ARM (’09) Bloomington, Indiana 47402 The University of Iowa (319) 335-3425 Tel. (812) 855-6683 FAX (812) 856-3149 [email protected] E-mail: [email protected] Paul Pousson, ARM (’08) Web: www.urmia.org University of Texas System (512) 499-4653 [email protected] Larry V. Stephens, AIC, ARM, CPCU, AAM, DRM (’09) A Professional Non-Profi t Forum for the Exchange of Information, Concepts, Indiana University (812) 855-9758 Practices and Developments Between Higher Education Risk Managers [email protected] The food of hope Is meditated action; robbed of this Her sole support, she languishes and dies. We perish also; for we live by hope And by desire; we see by the glad light And breathe the sweet air of futurity; And so we live, or else we have no life. —WILLIAM WORDSWORTH (1770–1850) “DISCOURSE OF THE WANDERER, AND AN EVENING VISIT TO THE LAKE” From the President Welcome to the University Risk Management and Insurance Association’s annual journal publication for 2007–08. Th e journal has a rich history of showcasing topics of interest from the profession of risk management in higher education. While the topics vary in nature, they will explore some of the more relevant risks and hazards of our unique risk environment while providing insight into best practices for managing these risks. In addition, we hope that these articles provoke further discussion and awareness within your institution or entity, supporting your eff orts to inform your colleagues who may benefi t from the experiences and knowledge highlighted within. Th e topics vary from coping with student psychological problems in the aftermath of the Virginia Tech tragedy; to maintaining awareness of national security threats; to preventing computer security breaches that result in identity theft. We know that we have only tapped into a small portion of the broad scope of responsibilities and potential risks within higher education risk man- agement. Yet we trust you will fi nd these articles an informative and valuable resource for your program. I would like to thank the authors who took the initiative and eff ort to research and write these articles, the volunteer and committee members who assisted, and the national offi ce staff for their countless hours of hard work and eff ort in editing and publishing this year’s journal for our members. We hope you will enjoy reading it. Ellen Shew Holland, ARM President, URMIA (2008) Contributors URMIA thanks each of the fi nancial contributors who supported the publication of the 2007–08 edition of the URMIA Journal: Arthur J. Gallagher Higher Education Practice Group Gallagher’s Higher Education Practice Group specializes in serving The Gallagher Centre the risk management and insurance needs of institutions of higher Two Pierce Place learning. The education community has long been a core competency Itasca, Illinois 60143-3141 of our company, and today represents a signifi cant portion of our business. For assistance in assessing and protecting your institution, please contact your Gallagher Higher Education Practice represen- tative or our Executive Directors, Leta Finch at 802-861-6804 and John Watson at 818-539-1445. Marsh, Inc. Global Education Practice For over 38 years, Marsh has been honored to serve the higher One State Street, 19th Floor education community. Our legacy stems from a company-wide com- Hartford, CT 06103 mitment to higher education as a core part of our operation. We have created tailored insurance products and risk management solutions to protect your institution. For assistance please contact your Marsh higher education professional or our Global Practice Leader, Jean Demchak at 860-723-5635 or [email protected]. John L. Wortham & Son, L.P. 2727 Allen Parkway, Suite 2000 As the largest privately held insurance partnership in the U.S., Houston, TX 77019 John L. Wortham & Son L.P. places our clients’ interests fi rst. This approach includes a higher education practice where we create productive, consultative relationships by crafting innovative solutions for this sector’s unique challenges. We invite you to learn about Wortham and our capabilities by visiting our website at www.worthaminsurance.com or contacting Jim McCann, J.D. at 713-346-1220 or [email protected]. Without the assistance of these contributors, this publication could not exist. Features 7 Tragedy at Virginia Tech: Student Suicide, School Shootings, and the Campus Mental Health Crisis Robert B. Smith and Dana L. Fleming, Nelson, Kinder, Mosseau & Saturley P. C . 21 The Yin and Yang of an Aging Work Force J. Tim Query, Associate Professor of Risk Management and Insurance, New Mexico State University 29 The Threat Level Is Orange Leta C. Finch, Executive Director of Higher Education Practice, Arthur J. Gallagher Risk Management Services, Inc. 41 Mold in the Environment: The Diffi culty of Assessing the Risk George H. Bender, Manager of Environmental Health and Safety, Duquesne University 49 Assessing RMIS Needs for Colleges and Universities David A. Tweedy, CMC, Practice Leader for Risk Information Consulting Practice, Albert Risk Management Consultants, Inc. 61 In Case of Emergency: Selecting a Qualifi ed Air Ambulance Provider Denise Treadwell, CRNP, MSN, CEN, CFRN, CMTE, Executive Vice President, AirMed International 69 The Mixed Motive Instruction in Employment Discrimination Cases: What Employers Need to Know David Sherwyn, J.D., Steven Carvell, Ph.D., Joseph Baumgarten, J.D. 83 Risk Manager as a Grievance Petitioner? Manage Lobbying Risks or Lose Pamela J. Rypkema, Risk Manager, Gallaudet University 97 Identity Theft and Data Loss on Campus—Minimizing and Addressing Risk James A. Keller, Esq., and Melissa Hill, Esq., Saul Ewing LLP Tragedy is a tool for the living to gain wisdom, not a guide by which to live. —ROBERT F. KENNEDY (1925 –1968), U.S. ATTORNEY GENERAL Tragedy at Virginia Tech Student Suicide, School Shootings, and the Campus Mental Health Crisis Robert B. Smith and Dana L. Fleming, Nelson, Kinder, Mosseau & Saturley P.C. Abstract: Th e Virginia Tech shootings and other acts of however, colleges and universities are being forced to school violence are causing lawmakers, school administrators, reexamine the way they deal with students with mental and the public at large to reevaluate how educational illness and related on-campus emergencies. Th e complex institutions deal with the mental health problems of students. legal and societal problems associated with mental illness Th is article explores the historical context of student violence have been laid at the doorstep of colleges and universities and examines the events leading up to and surrounding the for years, but now schools are under more scrutiny than massacre at Virginia Tech. It further reviews the aftermathf ever before. Not surprisingly, the response has run the of the nation’s deadliest school shooting,g, and the ensuiensuingng gamutgamut from thethe implementationimplem of new, high-tech emer- dialogue about what can be done to preventevent gencygency notifi cation systems to the aug- future tragedies. mentationment of existing counseling services The real learning andand oother mental health resources. On April 16, 2007, every college and WhileW these measures may be entirely university in the country was asking opportunity appropriateappro for some schools to under- itself the same questions: What now?? take,take, they are, by and large, reactionary. presented by What next? Could we be the next Virginiaginia Th e realr learning opportunity
Recommended publications
  • Proceedings of the Nebraska State Bar Association House of Delegates Meeting, 1959 Joseph C
    Nebraska Law Review Volume 39 | Issue 1 Article 2 1960 Proceedings of the Nebraska State Bar Association House of Delegates Meeting, 1959 Joseph C. Tye Nebraska State Bar Association Follow this and additional works at: https://digitalcommons.unl.edu/nlr Recommended Citation Joseph C. Tye, Proceedings of the Nebraska State Bar Association House of Delegates Meeting, 1959, 39 Neb. L. Rev. 1 (1960) Available at: https://digitalcommons.unl.edu/nlr/vol39/iss1/2 This Article is brought to you for free and open access by the Law, College of at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Nebraska Law Review by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. PRESIDENT JOSEPH C. TYE 1959 OFFICERS OF THE NEBRASKA STATE BAR ASSOCIATION President JOSEPH C. TYE Kearney Chairman of the House of Delegates RICHARD E. HUNTER Hastings Secretary-Treasurer GEORGE H. TuRNER Lincoln EXECUTIVE COUNCIL Joseph C. Tye ------------------------------------------------------------------------------------Kearney Paul H. Bek ....................---------------------------------------------------------------------- Seward Thomas F. Colfer .................................----------------------------....--------- McCook Alfred G. Ellick ----------------------...........................------------------------ - ------- Om aha John R. Fike ----------------------------------------------------------------------------------------Omaha Clarence E. Haley ------------------------------------------------------------------------Hartington
    [Show full text]
  • Unmasking the Teen Cyberbully: a First Amendment-Compliant Approach to Protecting Child Victims of Anonymous, School-Related Internet Harassment Benjamin A
    The University of Akron IdeaExchange@UAkron Akron Law Review Akron Law Journals November 2017 Unmasking the Teen Cyberbully: A First Amendment-Compliant Approach to Protecting Child Victims of Anonymous, School-Related Internet Harassment Benjamin A. Holden Please take a moment to share how this work helps you through this survey. Your feedback will be important as we plan further development of our repository. Follow this and additional works at: http://ideaexchange.uakron.edu/akronlawreview Part of the Constitutional Law Commons, First Amendment Commons, and the Internet Law Commons Recommended Citation Holden, Benjamin A. (2017) "Unmasking the Teen Cyberbully: A First Amendment-Compliant Approach to Protecting Child Victims of Anonymous, School-Related Internet Harassment," Akron Law Review: Vol. 51 : Iss. 1 , Article 1. Available at: http://ideaexchange.uakron.edu/akronlawreview/vol51/iss1/1 This Article is brought to you for free and open access by Akron Law Journals at IdeaExchange@UAkron, the institutional repository of The nivU ersity of Akron in Akron, Ohio, USA. It has been accepted for inclusion in Akron Law Review by an authorized administrator of IdeaExchange@UAkron. For more information, please contact [email protected], [email protected]. Holden: Unmasking the Teen Cyberbully UNMASKING THE TEEN CYBERBULLY: A FIRST AMENDMENT-COMPLIANT APPROACH TO PROTECTING CHILD VICTIMS OF ANONYMOUS, SCHOOL-RELATED INTERNET HARASSMENT By: Benjamin A. Holden* I. Introduction and Overview ............................................ 2 II. Minors and The First Amendment ................................. 9 A. The First Amendment and Minors Generally ....... 10 B. The First Amendment and The Student Speech Cases ..................................................................... 10 C. The First Amendment and The Child Protection Cases ..................................................................... 12 1.
    [Show full text]
  • Socio-Economic Status: a Determinant of Perceptions and Responses to Bullying
    Socio-Economic Status: A Determinant of Perceptions and Responses to Bullying A dissertation submitted to the Graduate School Of the University of Cincinnati in partial fulfillment of the requirements for the degree of Doctor of Philosophy In the Department of Education, Criminal Justice and Social Work by Kelli M. Jette M.Ed. Xavier University June 2007 Committee Chair: Marvin Berlowitz, Ph.D Dissertation Bullying ii Abstract Bullying has been examined by a variety of international professionals, all intent upon stopping this unmanageable problem in the school setting. Many experts have designed and implemented strategic whole-group, anti-bullying campaigns that are purchased by school administrators in the attempt that bullying will be thwarted by a one-size-fits-all “fix” of the pervasive and troublesome behaviors. Bullying continues to impede the efforts of school officials, regardless of the program by which they are educating students. The reason? There are no anti-bullying campaigns that adequately address the dynamics of class, race, and gender. These factors act as a catalyst for different manifestations in the definition of bullying, the perceptions of bullying, and the reactions of teachers and staff towards bullying situations. These factors also account for the differences in behavioral manifestations among students. Race, class, and gender are major determinants of “how” and “why” and “what” perpetrators and victims experience when faced with a bullying incident. Therefore, it is necessary to understand these complex dynamics
    [Show full text]
  • Penalty for Cyber Bullying in California
    Penalty For Cyber Bullying In California insufferablyWhen Parsifal after permutate Keil goffer his palatably, entrenchment quite toweledunlatched. not Orpheanluculently Brodie enough, sometimes is Alaa enuretic? keratinizing Brainy his planimetryGuthry terrace vexingly no lepidopterology and alter so needily! brown-nose Prior record in turn for handling all remaining states havespecific provisions for cyber harassment; minnesota house bill no requirement. Maryland creates a part is potentially serious threats from the penalty for cyber bullying in california and the dissemination of bullying prevention and feha, experiences and accessibility of justice system for. Leavetheschools a cyber bullies are you use in california law specifically cyberbullying to nearly all incidents. The california and santos, teachers should not harass. What they are more useful for bullying for cyber bullying prevention programs are more expansive legislation and email in. Far more specifically for help police department also extends to provide. These model policies and veteran military service to create an insurmountable task force has recently cyberbullying in the common model policy related context or. Many have an electronic conduct was sexually abused by request form directly on cyber bullying for receiving bullying and administrators. Includes communications in california for their own. Keep a penalty of whom the penalty for cyber bullying in california? For information in british academy, electronic device or repeated instances of the requirements concerning the penalty for cyber bullying in california law offices of the cell phone. In Iowa a law mandates that schools create anti-cyberbullying policies for incidents. You really has been developed for a connection between policies and violence policy development and legally permissible as massachusetts does it has excelled and all relevant school penalty for cyber bullying in california was very careful how behavior intended or.
    [Show full text]
  • THE ROLE of NOSTALGIA in a DETACHED COMMUNITY Martin
    A PLACE APART: THE ROLE OF NOSTALGIA IN A DETACHED COMMUNITY Martin Otto Zimmann A Dissertation Submitted to the Graduate College of Bowling Green State University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY August 2011 Committee: Dr. Scott C. Martin, Advisor Dr. Ruben V. Anguiano Graduate Faculty Representative Dr. Kristine Blair Dr. Ellen Berry Dr. Duane Larson ii ABSTRACT Dr. Scott C. Martin, Advisor This work investigated the power of nostalgia in perpetuating rituals and folkways in detached communities. The focus of this study was Camp Luther, a family camp operated under the auspices of Lutheran Outdoor Ministries. Over the summer of 2010, approximately sixty interviews were conducted at the camp, and qualitative data from these interviews was used to formulate ideas and theoretical underpinnings for a concept the author calls “the nostalgic reflex.” These interviews were transcribed and then coded to indicate the manner in which nostalgia was driving the thought processes of the interview subjects. Quotations from the interviews were used throughout the document to support the theory of the nostalgic reflex. The interview data was rich with language and notions that indicated the level to which adherents of the camp were “under the influence” of the nostalgic reflex insofar as their devotion to the ethos of the camp’s character was concerned. One of the most interesting data points was people’s willingness to raise a large sum of money to preserve the lakefront of the camp, giving credence to the theory of “solastalgia” as coined by Glenn Albrecht. The language of the interview subjects also dovetailed neatly into Diane Barthel’s tenets of the Staged Symbolic Community.
    [Show full text]
  • 1144 05/16 Issue One Thousand One Hundred Forty-Four Thursday, May Sixteen, Mmxix
    #1144 05/16 issue one thousand one hundred forty-four thursday, may sixteen, mmxix “9-1-1: LONE STAR” Series / FOX TWENTIETH CENTURY FOX TELEVISION 10201 W. Pico Blvd, Bldg. 1, Los Angeles, CA 90064 [email protected] PHONE: 310-969-5511 FAX: 310-969-4886 STATUS: Summer 2019 PRODUCER: Ryan Murphy - Brad Falchuk - Tim Minear CAST: Rob Lowe RYAN MURPHY PRODUCTIONS 10201 W. Pico Blvd., Bldg. 12, The Loft, Los Angeles, CA 90035 310-369-3970 Follows a sophisticated New York cop (Lowe) who, along with his son, re-locates to Austin, and must try to balance saving those who are at their most vulnerable with solving the problems in his own life. “355” Feature Film 05-09-19 ê GENRE FILMS 10201 West Pico Boulevard Building 49, Los Angeles, CA 90035 PHONE: 310-369-2842 STATUS: July 8 LOCATION: Paris - London - Morocco PRODUCER: Kelly Carmichael WRITER: Theresa Rebeck DIRECTOR: Simon Kinberg LP: Richard Hewitt PM: Jennifer Wynne DP: Roger Deakins CAST: Jessica Chastain - Penelope Cruz - Lupita Nyong’o - Fan Bingbing - Sebastian Stan - Edgar Ramirez FRECKLE FILMS 205 West 57th St., New York, NY 10019 646-830-3365 [email protected] FILMNATION ENTERTAINMENT 150 W. 22nd Street, Suite 1025, New York, NY 10011 917-484-8900 [email protected] GOLDEN TITLE 29 Austin Road, 11/F, Tsim Sha Tsui, Kowloon, Hong Kong, China UNIVERSAL PICTURES 100 Universal City Plaza Universal City, CA 91608 818-777-1000 A large-scale espionage film about international agents in a grounded, edgy action thriller. The film involves these top agents from organizations around the world uniting to stop a global organization from acquiring a weapon that could plunge an already unstable world into total chaos.
    [Show full text]
  • Entire Issue (PDF 2MB)
    E PL UR UM IB N U U S Congressional Record United States th of America PROCEEDINGS AND DEBATES OF THE 116 CONGRESS, FIRST SESSION Vol. 165 WASHINGTON, WEDNESDAY, SEPTEMBER 11, 2019 No. 145 House of Representatives The House met at 10 a.m. and was by what was happening that we paused COMMEMORATING THE 18TH ANNI- called to order by the Speaker pro tem- to sing God Bless America. I remember VERSARY OF THE SEPTEMBER 11 pore (Mrs. TORRES of California). at least one person sobbing. It was a ATTACKS f day when people within that courtroom The SPEAKER pro tempore. The were faced with uncertainties unlike Chair recognizes the gentleman from DESIGNATION OF SPEAKER PRO we had seen before, a day when all of Pennsylvania (Mr. THOMPSON) for 5 TEMPORE our first responders were challenged. minutes. The SPEAKER pro tempore laid be- But allow me, please, for just a mo- Mr. THOMPSON of Pennsylvania. fore the House the following commu- ment, to talk and say a few words Madam Speaker, I rise today, on the nication from the Speaker: about those who were there at the site 18th anniversary of September 11, 2001, of the Twin Towers. to reflect on the events of that fateful WASHINGTON, DC, We could see on television the cloud September 11, 2019. day and to honor the lives lost and the I hereby appoint the Honorable NORMA J. of dust as it started to emerge and set- heroes that united us. TORRES to act as Speaker pro tempore on tle, people rushing, bodies covered.
    [Show full text]
  • RUTH BADER GINSBURG AMERICAN INN of COURT Social
    RUTH BADER GINSBURG AMERICAN INN OF COURT October 2019 Pupilage Team Social Media and the Law Written Materials I. What is Social Media? II. Case Studies of Social Media Gone Wrong a. Cyber Bullying b. Disbarred Federal Prosecutor c. Federal Government Employees and Social Media III. Top Ten List of Social Media No No’s IV. Discussion, time permitting Team Members: April Kelso Aaron Arnall Michelle Edstrom Don Evans Joan Green Joanne Horn Sarrah Johnson Mary McMahan Beverly Palmer JulieAnn Robison Charles Schreck Peter Scimeca Kelli Stump Caleb Anthony Mike Radovcic Social Media in Legal Practice What Do You Use? What Could You Be Using? The number and variety of social-media platforms can overwhelm even those most eager to incorporate social media into their legal practice. And many of us simply do not have (or do not make) time to think through how certain platforms may enhance our practices. With that in mind, this exercise seeks to serve as a cheat sheet, allowing you to hear from those at your table on how they use social media in their professional lives. Here’s the task: for the platforms below that you use in your practice, share with your table how you have done so and how it has enhanced your practice. For those platforms that you (or those at your table) have not used, discuss how you could possibly utilize them. And for those (if any) who scoff at the thought of using social media in legal practice, remember the mantra of our recently departed Russell Westbrook: #WhyNot. Facebook WhatsApp profiles, messaging, groups, ads, etc.
    [Show full text]
  • Abusive Online Conduct: Discrimination and Harassment in Cyberspace Andra Gumbus Sacred Heart University, [email protected]
    Sacred Heart University DigitalCommons@SHU WCOB Faculty Publications Jack Welch College of Business 12-2013 Abusive Online Conduct: Discrimination and Harassment in Cyberspace Andra Gumbus Sacred Heart University, [email protected] Patricia Meglich University of Nebraska at Omaha Follow this and additional works at: http://digitalcommons.sacredheart.edu/wcob_fac Part of the Gender, Race, Sexuality, and Ethnicity in Communication Commons, Organizational Behavior and Theory Commons, and the Social Media Commons Recommended Citation Gumbus, Andra and Patricia Meglich. "Abusive Online Conduct: Discrimination and Harassment in Cyberspace." Journal of Management Policy and Practice 14.5 (2013): 47-56. This Article is brought to you for free and open access by the Jack Welch College of Business at DigitalCommons@SHU. It has been accepted for inclusion in WCOB Faculty Publications by an authorized administrator of DigitalCommons@SHU. For more information, please contact [email protected]. Abusive Online Conduct: Discrimination and Harassment in Cyberspace Andra Gumbus Sacred Heart University Patricia Meglich University of Nebraska at Omaha Discrimination and harassment that were once committed in real time have now moved to the online environment. Discrimination and harassment on the Internet take many forms and can be more damaging and insidious than the face-to-face forms of abuse. This conceptual paper looks at two types of abusive online conduct that have emerged due to the proliferation of the Internet in our lives: Weblining and cyberbullying. These topics are examined from an ethical perspective with a focus on gender and racial discrimination issues. INTRODUCTION Online discrimination by using data footprints to classify and group Internet users based on patterns of Internet activity is becoming more prevalent.
    [Show full text]
  • Teenbullyingparentuniversity (Read-Only)
    Preventing Teen Bullying Dr. Monica Uppal 4/14/2021 The Medical Center of Aurora Behavioral Health and Wellness Center What is Bullying? • Unwanted aggressive behavior among school aged children that involves a real or perceived power imbalance. The behavior is repeated or has potential to be repeated, over time • The modern concept of bullying as the 4 P’s: • Power: imbalance of power, victims don’t defend themselves • Pain: tummy aches, depression, anxiety, emotional distress • Persistence: not just once or twice • Premeditation: unable to empathize with distress of peers, continues even when the victim has expressed pain Types of Bullying • Verbal Bullying: saying or writing mean things • Teasing, name-calling, inappropriate sexual comments, taunting, threatening to cause harm • Social Bullying: “relational bullying,” hurting someone’s reputation or relationships. • Leaving someone out on purpose, telling other children not to be friends with someone, spreading rumors, embarrassing someone in public • Physical Bullying: hurting a persons body or possessions • Hitting, kicking, pinching, spitting, tripping, pushing, breaking someone’s possessions, making mean or rude hand gestures • Cyber-Bulling: through SMS, text, apps, social media, forums, gaming. Can be viewed by strangers and larger audience. • Persistent: continuous 24h contact • Permanent: can impact college admissions, employment, etc • Hard to Notice: teachers and parents may not overhear or see it take place Consequences of Bullying • School truancy • Difficulties concentrating in class • Becoming lonely • Avoiding people • Mental illness • Committing suicide or violently harming others or groups of people are the worst cases of this painful experience for victims and family members History of Bullying • Age-old problem but it doesn’t make it a “rite of passage.” Attitude that “children will be children.” • 1857: Tom Browns School Days was first example of bullying in literature • 1862: A 12 year old died from "bullying behavior" at Kings School in Canterbury, United Kingdom.
    [Show full text]
  • "Keeping up with Technology": an Analysis of the Fourth Amendment
    Seton Hall University eRepository @ Seton Hall Law School Student Scholarship Seton Hall Law 5-1-2013 "Keeping Up With Technology": An Analysis of the Fourth Amendment Concerning the Search and Seizure of Students' Cell Phones to Investigate Instances of Bullying Thomas Patrick McGrady Follow this and additional works at: https://scholarship.shu.edu/student_scholarship Recommended Citation McGrady, Thomas Patrick, ""Keeping Up With Technology": An Analysis of the Fourth Amendment Concerning the Search and Seizure of Students' Cell Phones to Investigate Instances of Bullying" (2013). Law School Student Scholarship. 365. https://scholarship.shu.edu/student_scholarship/365 "Keeping Up With Technology": An Analysis of the Fourth Amendment Concerning the Search and Seizure of Students' Cell Phones to Investigate Instances of Bullying Thomas McGrady * I. Introduction In full, the Fourth Amendment provides that "the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." 1 Under New Jersey v. T.L. 0., however, school administrators are not required to adhere to the strict letter of the Fourth Amendment? In TL.O., the Supreme Court held that (1) school officials are not required to obtain a warrant in order to search a student tmder their authority; (2) school officials do not
    [Show full text]
  • Cyberbullying and Indian Legal Regime: an Overview
    A Publication from Creative Connect International Publisher Group 137 CYBERBULLYING AND INDIAN LEGAL REGIME: AN OVERVIEW Written by Rakesh Chandra Research Scholar (Law), Lucknow University Introduction: The word cyberbullying did not even exist a decade ago, yet the problem has become a pervasive one today.1 Kids have been bullying each other for generations. The latest generation, however, has been able to utilize technology to expand their reach and the extent of their harm. This phenomenon is being called cyberbullying defined as: "willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices." Basically we are referring to incidents where adolescents use technology to harass, threaten, humiliate, or otherwise hassle their peers. For example, youth can send hurtful texts to others or spread rumours using smartphones or tablets. Teens have also created web pages, videos, and profiles on social media platforms making fun of others. With mobile devices, adolescents have taken pictures in a bedroom, a bathroom, or another location where privacy is expected, and posted or distributed them online. Others have recorded unauthorised videos of their peers and uploaded them for the world to see, rate, tag, and discuss. Still others are embracing anonymous apps or the interactive capabilities on gaming networks to tear down or humiliate others.2 Bullying and hostility among children is a longstanding and pervasive social issue (Jones, Manstead, & Livingstone, 2011). Cyberbullying is the unfortunate by-product of the union of adolescent aggression and electronic communication and its growth is giving cause for concern (Hinduja & Patchin, 2008). 3 1 Charles E.
    [Show full text]