Recognize Acceptable and Unacceptable Behavior

Recognize Acceptable and Unacceptable Behavior

Minors and staff should develop an awareness of their digital footprints/online reputation and the consequences associated with this.

“Think before you post” and maintain control over the content you/they choose to share with others.

Expand All

  • Intentional and repeated harm inflicted through the use of computers, cell phones, and other electronic devices.
  • Cyberbullying can happen via social media, text messages, video gaming, online forums, and through a variety of apps. It typically comes in the form of negative or false content or media that is designed to embarrass or humiliate another person.
  • NC Cyberbullying laws and penalties: https://www.ncleg.gov/enactedlegislation/statutes/pdf/bysection/chapter_14/gs_14-458.1.pdf

Obscene literature and exhibitions.
(a) It shall be unlawful for any person, firm or corporation to intentionally disseminate obscenity: https://www.ncleg.gov/EnactedLegislation/Statutes/PDF/BySection/Chapter_14/GS_14-190.1.pdf

Preparation of obscene photographs, slides and motion pictures
https://www.ncleg.gov/EnactedLegislation/Statutes/PDF/BySection/Chapter_14/GS_14-190.5.pdf

Dissemination to minors
Dissemination to minors under the age of 16 years. Every person 18 years of age or older who knowingly disseminates to any minor under the age of 16 years any material which he knows or reasonably should know to be obscene shall be guilty of a Class I felony:
https://www.ncleg.gov/EnactedLegislation/Statutes/PDF/BySection/Chapter_14/GS_14-190.7.pdf

Every person 18 years of age or older who knowingly disseminates to any minor under the age of 13 years any material which he knows or reasonably should know to be obscene within the meaning of G.S. 14-190.1 shall be punished as a Class I felon.
https://www.ncleg.gov/EnactedLegislation/Statutes/PDF/BySection/Chapter_14/GS_14-190.8.pdf

Indecent Exposure
https://www.ncleg.gov/EnactedLegislation/Statutes/PDF/BySection/Chapter_14/GS_14-190.9.pdf

Stalking
Involves severe intrusions on the victim's personal privacy and autonomy. It is a crime that causes a long-lasting impact on the victim's quality of life and creates risks to the security and safety of the victim and others, even in the absence of express threats of physical harm. Stalking conduct often becomes increasingly violent over time.

NC State Statute: https://www.ncleg.gov/enactedlegislation/statutes/pdf/bysection/chapter_14/gs_14-277.3a.pdf

Identity Theft
A person who knowingly obtains, possesses, or uses identifying information of another person, living or dead, with the intent to fraudulently represent that the person is the other person for the purposes of making financial or credit transactions in the other person's name, to obtain anything of value, benefit, or advantage, or for the purpose of avoiding legal consequences is guilty of a felony.
https://www.ncleg.gov/enactedlegislation/statutes/pdf/bysection/chapter_14/gs_14-113.20.pdf

Learn the terms of service and policies of the social media sites in which you participate and pay attention to updates.

  • Communicate appropriately by using the right language for your audience.
  • Keep things private. Do not share personal information.
  • Respect others by being courteous and polite, even when disagreeing.
  • Be an “upstander.” If someone is being bullied, stand up for that person and report the behavior.
  • Report inappropriate behavior.
  • Follow the code of conduct.
  • Think before you post, text or share by considering how you or others might feel after your post.

  • Cyberbullying:
    • Posting comments, rumors, or photos online that are mean, hurtful, embarrassing or illegal
    • Threatening to hurt someone.
    • Encouraging someone to kill themselves.
    • Pretending to be someone else in order to obtain personal information or post personal or false information about someone else. 
  • Posting information that violates policy on discrimination.
  • Creating a webpage targeting someone in an inappropriate or illegal manner.
  • Online harassment (doxing) used to exact revenge and threaten and destroy the privacy of someone by making their personal information public.

Resource: www.stopbullying.gov

Includes information or images that upset the child, material that is for adults, inaccurate information or information that might lead or tempt the child into unlawful or dangerous behavior. Can include but not limited to:

  • Pornographic material
  • Inappropriate language for participant’s age
  • Sites that encourage illegal activity or suicide
  • Pictures, videos or games showing violence or cruelty towards people or animals
  • Gambling sites
  • Unmoderated chat rooms – where there’s no one supervising the conversation and barring unsuitable comments

Grooming takes place when a sexual predator initiates and forms a relationship with a child online that can lead to:

  • Taking sexual photos
  • Sending sexual messages, videos, etc. (sexting)
  • Sextortion (Refers to the crime of extortion as it applies to sex-related photographs sent via the internet or text messaging. It is a form of blackmail. For example, if two people are sexting one another, and one of those people threatens the other with distribution of the explicit content, this is sextortion.)
  • In-person sexual abuse
  • Trafficking

Targeting
Many predators initiate conversations on public chat apps or in the chat section of games for kids, pretending to be younger than they really are.

Engaging
Many times, the predator will try to fill some sort of need the child has, such as a desire for attention. The adult might also try to connect with their victim by paying them compliments, listening to them, or buying gifts.

Boundary Testing
The predator might ask questions to see how closely the child’s devices are monitored and try to figure out whether the child would be believed if they tell staff or their parents about the relationship. During this time, kids may become more secretive about their online activity, so pay attention if their attitude changes when discussing what they do while they’re on their devices.

Isolating
A predator will also look for opportunities to create emotional distance between the child and the program staff and their family, often using sly tactics to create situations to reinforce the idea of a “special relationship.” Trust your instincts when something isn’t right when it comes to how the child is acting.

Sexualizing
This stage culminates in sexual activity. While some perpetrators might attempt to meet their victims in person, others carry out their sexual abuse entirely online. Predators will begin to discuss sex explicitly, mentioning sexual activities with the child to desensitize them. Some predators have been known to show children pictures of other minors without their clothing in order to make it appear more normal. This influx of sexual information will make the child know far more about sexual activity than is age-appropriate. At this point, the predator may also begin to request sexual videos of their victim and/or send their own.

Controlling
When a predator starts to abuse a child, they will go to great lengths to maintain control and ensure the child is emotionally dependent on them. In most cases, the offender uses secrecy, blame, and even threats of retribution to keep children from saying anything. Let your participants know they can come to you when anyone asks them to do something they are not comfortable with, even if that person is their parent, step-parent or guardian.

Sexting
There are no laws in North Carolina specifically regarding sexting. However, sexting falls under child pornography regulations, which state that pictures of a person under 18 engaged in sexual behaviors is a crime.

Ensure staff and minor participants understand that having someone’s permission to take or share images of them is important, but even if they have permission, taking or sharing nude or sexual images of someone under 18 could be considered illegal.

 

Next: Reporting