Académique Documents
Professionnel Documents
Culture Documents
Mirror Image
An Interactive Internet Safety Program
GRADE 7
TEACHER RESOURCE PACKAGE
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
ACKNOWLEDGEMENTS
Ophea would like to acknowledge the following for their contributions to this resource:
Development team:
Michael Brophy, Ontario Principals Council
Debra Courville, Ophea Curriculum Advisory Council
Colin Harris, Educational Computing Organization of Ontario
Ken Morris, Toronto Catholic District School Board
Kelly Pace, Conference of Independent Schools
Jennifer Jilks-Racine, Educational Computing Organization of Ontario
Steve Soroko, Ophea
Mel Trojanovic, Halton District School Board
Reviewers:
Michael Brophy, Toronto District School Board
Jennifer Jilks-Racine, Educational Computing Organization of Ontario
Sharron McKeever, Institute for Catholic Education
Ken Morris, Toronto Catholic District School Board
Tim Overholt, Halton Catholic District School Board
Troy Parkhouse, Ophea Curriculum Advisory Council
Lara Paterson, Limestone District School Board
All field test participant schools.
LiveWires Design Ltd.
Ministry of Education
This Internet Safety Initiative was made possible by a grant from the Ministry of
Education in partnership with the Ministry of the Attorney Generals Victim Justice Fund.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
TABLE OF CONTENTS
Section 1 Upfront
Introduction....
The Principal.
The Teacher.
The Student..
The Parent..
Connections to the Grade 7 Curriculum....
Using CyberCops .....
Background......
Definitions.
Section 3 Supports
Copy Masters..
Appendices
A Literacy Small-Group Discussions Placemats ...
B Literacy Getting Ready to Read
C Literacy Gathering and Evaluating
D Reporting Child Abuse and Neglect.
Additional Supports....
Glossary ...
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
SECTION 1
Upfront
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
INTRODUCTION
The Ontario Curriculum for elementary schools recognizes the importance of and strongly encourages the
use of technology to support learning in all curriculum areas. Elementary schools are more equipped with
higher levels of technology to support and extend classroom learning. With this increased ability to
explore the cyberworld and all the benefits that come with it, there is also a new set of concerns for the
personal safety of the children and youth using this technology. As a result, new levels of safety are
required to ensure all students are able to learn in a safe and supportive environment with the tools
needed to achieve success.
A wealth of information is available through CD ROMs, the Internet, and many other simulation activities.
As a result, our students are spending more time on computers, both at home and at school, accessing
previously unavailable information. With increased access, however, comes an increased risk for those
who explore cyberspace. In the information age, schools can and should take a role in teaching students
how to be multimedia and technology literate in a world that is increasingly digital. Principals must be
aware of Internet safety and the dangers that exist for students; classroom teachers must also be aware
of and teach students about strategies to stay safe on-line (Jilks-Racine, 2005).
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
THE PRINCIPAL
Role of the Principal
School Administrators have a DUTY OF CARE to:
Ensure that all reasonable safety procedures are carried out to protect the well
being of: students, staff, volunteers, visitors and others.
CODE OF CONDUCT
Principals, under the direction of
their school board, take a leadership
role in the daily operation of a school.
They provide this leadership by:
demonstrating care and
commitment to academic
excellence and a safe teaching
and learning environment;
holding everyone, under their
authority, accountable for their
behaviour and actions;
communicating regularly and
meaningfully with all members of
their school community.
Healthy Living
Personal Safety and Injury Prevention
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
THE TEACHER
Role of the Teacher
Education Act - Duties of the teacher: (Reg. 298, S.20)
g) Ensure that all reasonable safety procedures are carried out in courses and activities for
which the teacher is responsible.
CODE OF CONDUCT
Teachers and School staff, under the
leadership of their principals, maintain
order in the school and are expected to
hold everyone to the highest standard
of respectful and responsible
behaviour. As role models, staff uphold
these high standards when they:
help students work to their full
potential and develop their selfworth;
communicate regularly and
meaningfully with parents;
maintain consistent standards of
behaviour for all students;
demonstrate respect for all
students, staff and parents;
prepare students for the full
responsibilities of citizenship.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
3. Communicate to Students
Listen to students concerns and fears and help them seek appropriate help. If it is related to school use,
follow appropriate board policies for reporting inappropriate internet use and disclosure of student
information.
Post in the computer lab or by computers safety tips for using the computer. You may want to have a
learning bulletin board that outlines safe Internet practices and what students should do if inappropriate
situations arise.
Teach students how to use technology respectfully and how to be a responsible cybercitizen.
This includes information on appropriate participation in chat rooms, how to appropriately deal with
potentially dangerous situations and how to access support.
It is important to teach the students how to look after and protect themselves. They must learn to question
all people they meet, whether in person or on the Internet. There are warning signs when students are out
in the real world, there are few in cyberspace.
4. Communicate with Parents
Ensure all parents are informed and understand that students will be using the Internet, the type of
technology that will be used and the Acceptable Use Policy of the school prior to students using the
Internet. Parents must understand the seriousness of inappropriate Internet use and the potential threats
associated with it.
Provide ongoing communication about the use of technology in the classroom and tips for safe Internet
use. This information can be published in class newsletters.
5. Work in Partnership
Contact the local police department or Ontario Provincial Police to access an officer with expertise and
experiences in the areas of cybersafety to come in to support the teaching of Internet safety in the
classroom.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
THE STUDENT
How Students can Help
The increase in information and communication access for youth through the Internet and chat rooms
provides new freedom and access to the world, and with this comes new responsibilities. Students are
responsible for understanding and following the Acceptable Use Policies of the Internet while at school
and at home. Students should also ensure that they know what to do if a potentially dangerous situation
arises.
1. Acceptable Use Policy
Read carefully the Acceptable Use Policy and share with your parents. Remember that nothing you
write on the web is completely private including email, so be careful and think about what you type and
who you tell. Never use language in chat rooms that you would not use in public.
2. Organization and Supervision
Never arrange a face-to-face meeting without telling your parent/guardian. If your parent/guardian
agrees to the meeting make sure you meet in a public place with a parent/guardian present. It is
potentially dangerous to meet unsupervised.
Be wary of those who want desperately to be your friend, especially if they try to turn you against your
parents or real friends.
Respect the feelings and privacy of others online.
Choose a password that is easy to remember and hard to guess.
Only chat over a webcam with people that you already know and trust in the real world, under adult
supervision wherever possible.
Be sure that you are dealing with someone that you and your parent/guardian know and trust before
giving out any personal information about yourself via email such as name, home address, school
name, or telephone number in a public message, such as a chat room or on bulletin boards.
Never send a person a picture of yourself without first checking with a parent/guardian.
Never open emails, files, links, images or games from people you do not know or trust.
3. Communicate to Parents
Remind your parents to keep the family computer properly protected by installing up to date security
patches, current anti-virus software and a firewall.
Let your parents know the moment something worries you
CODE OF CONDUCT
online and report it to the chat service provider. Save any
Students are to be treated with respect
conversations that you think could prove someone has
and dignity. In return, they must
been bullying or harassing you. Some chat rooms have
demonstrate respect for themselves, for
instructions on how to do this.
others and for the responsibilities of
Be careful when someone offers you something for
citizenship
through
acceptable
nothing, such as gifts and money. Be very careful about
behaviour.
Respect
and
responsibility
any offers that involve you coming to a meeting or having
are demonstrated when a student:
someone visit your house.
comes to school prepared, on time
4. Communicate with School
and ready to learn;
Understand the school/board Acceptable Use Policy and
shows respect for themselves, for
ensure that you are using the computers for school related
others and for those in authority;
work. Report potentially dangerous situations immediately.
refrains from bringing anything to
Know who to talk to at the school and the steps to take if a
school that may compromise the
potentially dangerous situation arises.
safety of others;
5. Work in Partnership
takes responsibility for his or her own
If a dangerous situation arises communicate the situation
action.
to parents, teachers, peers, police officers, etc.,
immediately in order to support yourself in addressing and
resolving the situation and preventing the situation from getting worse.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
THE PARENT
How Parents can Help
Parents must stay well informed about the dangers that their children could encounter as they explore the
Internet. By understanding these dangers and discussing them with their children, parents can help
realize the positive potential of the Internet while minimizing its inherent risks.
1. Acceptable Use Policy
Establish a set of rules for your child(ren) to follow when using the Internet that include amount of use,
how to interact appropriately online, and what to do if they feel uncomfortable or in danger.
Be familiar with the school/board Acceptable Use Policy. When this document comes home to be
signed, discuss the components with your child and outline the benefits of using technology and the
safety procedures that need to be taken when using it.
2. Organization and Supervision
Keep Internet-connected computers in an open area and out
of the bedrooms. Check out your childs Instant Messaging
(IM) names and profiles to ensure personal information is
not being shared or accessed over the Internet.
Supervise childrens computer usage. Do not rely on filtering
software to do the work.
3. Communicate with Your Child(ren)
Talk to your children about Internet safety and ethical
behaviour on the Internet. Participate with them online. If
they know more than you, let them teach you.
Ensure that, if your children are thinking of meeting an online
friend, they check with you. It is potentially dangerous for
this meeting to take place unsupervised.
Teach your child(ren) never to give out personal information
without your permission when using email, chat rooms, or
instant messaging, filling out registration forms and personal
profiles, and entering online contests.
Encourage your child(ren) to come to you if they receive a
message that makes them feel uncomfortable or threatened.
The Internet should not be used to spread gossip, bully or
threaten others.
CODE OF CONDUCT
Parents play an important role in the
education of their children and have a
responsibility to support the efforts of
school staff in maintaining a safe and
respectful learning environment for all
students.
Parents
fulfill
this
responsibility when they:
show an active interest in their child's
school work and progress;
communicate regularly with the
school;
help their child be neat, appropriately
dressed and prepared for school;
ensure that their child attends school
regularly and on time;
promptly report to the school their
childs absence or late arrival;
become familiar with the Code of
Conduct and school rules;
encourage and assist their child in
following the rules of behaviour;
assist school staff in dealing with
disciplinary issues.
5. Work in Partnership
Be aware the supports available in the community to support safe Internet practices and how to access
them if needed.
Be aware of the safety features that the Internet Provider has available.
If a situation becomes potentially dangerous contact and report the situation immediately to the local
police, school administrator, or other support agencies.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
USING CYBERCOPS
The CyberCops: Mirror Image disc included in this resource includes the following: a Guide for Parents
and Teachers, the Detectives Notebook, a slide show that demonstrates how the game can be used in
the classroom, the Mirror Image game, Internet Safety Plan pages, and the Behind the
Headlines module.
1. Download the Guide for Parents and Teachers and the Detectives Notebook. The guide is a PDF
that can be downloaded to paper. It gives useful background information and suggestions for using the
game in the classroom. Teachers should also download the Detectives Notebook and the Internet Safety
Plan pages. The Answer Page is included in this resource.
2. View the slide show for background and suggestions on how the game can be played in the
classroom.
There are two ways of playing Mirror Image in the classroom:
Theatre Style: The game can be played on a single computer, hooked up to a projector at the front of the
classroom. The teacher assigns one student to use the keyboard, while the rest of the class is asked to
call out their answers to the puzzles. Played this way, the class will finish the game in approximately 40
minutes.
Small Groups: The game can also be loaded onto multiple computers, with students playing in pairs.
One student is in charge of the keyboard, while the other writes down the clues. Played this way, it will
take approximately 60 minutes to play the game.
Note: the game must be played in sequence as it can not be stopped and restarted at the point stopped.
3. Download the game from the disc. The Mirror Image story is told through two simultaneous streams
of video. In order to achieve a smooth playback of both video streams, use a computer with a minimum of
128 Mg of RAM (256 is preferred). The computer should be loaded with Quicktime 6.0.
4. View Behind the Headlines. Behind the Headlines is an interactive newspaper featuring interviews
with a teenage victim of the New Brunswick stalking case. "Caitlin", her parents, two police officers and
the prosecutor describe how the stalker was caught and convicted. The interviews encourage students to
discuss the real life consequences of stalking. Note: Be aware that the content in this story is factual
and references are made to sexual conduct. Appropriate pre-teaching should take place, and teachers
should check with school board guidelines around addressing this issue.
Teachers and police officers can visit the website www.cybercops.net for other ways of using Mirror
Image in the classroom.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
BACKGROUND
The Ontario Government has funded the CyberCops game series Mirror Image (Grade 7) and Air Dogs
(Grade 8) as part of its commitment to ensuring that youth in Ontario schools learn through concrete
applications, the critical thinking skills required to make judicious decisions associated with Internet use.
The Personal Safety and Injury Prevention component of the Health and Physical Education Curriculum
document is the primary subject area in the curriculum where students can learn about Internet safety.
This component of the Health and Physical Education curriculum focuses on effective decision making
skills, conflict resolution, resistance and refusal techniques at all age levels to respond to various
situations effectively. Students in grades 7 and 8 would have prior knowledge related to these living skills
and thus a solid foundation on which to apply the knowledge acquired through the CyberCops programs,
Mirror Image and Air Dogs.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
DEFINITIONS
The following definitions can help teachers and other users, such as community police officers to identify
and understand the following elements within the game: criminal harassment, pornography and child
luring.
Harrassment
The Ophea H&PE Curriculum Resource Support Document, Grade 7(2005) defines harassment as any
unwanted, uninvited remarks, gestures, sounds or actions of a persistent nature that make you feel
unsafe, degraded or uncomfortable. It includes any overt, subtle, verbal or written comments or any
physical conduct which places pressure on, ridicules, degrades, or expresses hatred based on a persons
sex or sexual orientation, race, ethnicity, cultural background, place of birth, religion, citizenship or
ancestry.
Some examples are:
unwanted, unwelcome physical contact like touching, grabbing or patting;
sexual gossip;
obscene phone calls;
rude jokes or suggestive remarks of a sexual nature;
demeaning nicknames;
catcalls, rating, or embarrassing whistles;
stalking;
graffiti;
threats, abuse, or assault;
sexually insulting remarks about race, culture, ability or class.
It is not:
a hug between friends;
mutual flirtation;
sincere and personal compliments.
These types of harassment can take place in person or over the Internet. Harassment of any kind is
unacceptable both in and out of the school environment.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Criminal Harassment
Criminal harassment can take the form of stalking. This form of criminal harassment involves persistent
behaviours that instill apprehension and fear in its victim. With the advent of new technologies, traditional
stalking has taken on entirely new forms through media such as Internet and email - sometimes referred
to as cyberstalking.
How Cyberstalking Occurs
a. Searching for a Victim
The Internet offers hundreds of thousands of websites with personal profiles and photographs: online
beauty contests, dating services, and sites dedicated to hobbies and sports. This enables the
cyberstalker to conduct an exhaustive search for victims who fit his personal preferences. Note that
income, education, urban or rural living makes no difference on who a cyberstalker will select.
b. Tracking the Victim
Once a cyberstalker has chosen a victim, they can assemble a dossier on their quarry before they make
contact. The Internet provides instant access to addresses, maps, telephone directories, and school
websites. Many cyberstalkers create detailed lists of their victims activities each day of the week.
c. Creating a False Identity
The Internet is the ideal tool for a predator who wants to meet young people, because they can invent a
persona that will appeal to their victim. The cyberstalker may converse with a potential victim for weeks
before revealing who they really are.
d. Disappearing without a Trace.
A cyberstalker whose identity is known can be cautioned by a restraining order or a visit from police. But
a cyberstalker who uses the Internet is difficult to trace. They may mask their email address behind
multiple facades and torment their victims for months before being discovered.
It is important to note that these actions can escalate very quickly into other forms of harassment and put
the victim in danger. In 2005, the Canadian Centre for Justice Statistics reported that one third of stalking
victims feared for their life. Cyberharassment can lead to criminal charges and should therefore not be
ignored. It should be reported to police.
Cyberstalking and the Law
The Criminal Code of Canada makes reference to stalking as criminal harassment. It states that no
person shall engage in repeated conduct (such as following or stalking, communicating directly or
indirectly or threatening) that causes the other person to fear for their safety or the safety of anyone
known to them. These actions are all punishable by law.
Prevention
If cyberstalking persists, children must confide in their parents, a teacher or a police officer. Adults are
best situated to take the next step, which may be reporting the behaviour to their Internet Service
Provider, the school board, the local police or the RCMP.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Child Pornography
Indirectly, the widespread presence of child pornography on the Internet confirms the existence of an
organized and mobilized community of predators who regard the sexualized imagery of children as
instrumental to the satisfaction of their sexual appetites. The ready availability of online imagery promises
to affirm and possibly increase these appetites.
More directly, child pornography may also serve as a tool in the arsenal of sexual predators who are
engaged in the business of "grooming" and "luring" child victims. Here, examples of child pornography
may serve as proof to their prey that child sexuality is "normal." Predators are also known to solicit photos
from children and youth. These photos may then become an irretrievable part of an international library of
child pornography.
As always, the responsibility rests with adults to educate children about these dangers and to be
proactive about supervising the Internet activities of children and youth.
How Child Pornography Occurs
The creation and distribution of child pornography, once a backroom industry, has been radically
transformed by computer and digital technology. Hardware such as digital cameras, video cameras and
webcams, combined with sophisticated software and an Internet connection, increases exponentially the
sheer volume of available product even while it creates instantaneous access to that product. In the
borderless world that is the Internet, child pornography has become a truly global industry.
Cheap admission to a vast, unregulated international marketplace represents a stunning benefit for
purveyors of child pornography. First, since their work is illegal, it has been, by definition, clandestine.
Second, the rate at which this technology can be adapted and improved effectively guarantees that the
race to apprehend these criminals will be rigorous, intense and ongoing. International policing efforts over
the past decade confirm that the worldwide volume of child pornography is extensive. Third, the Internet
currently provides purveyors with a degree of anonymity.
Consumers of child pornography also enjoy anonymity as an online benefit. The Internet creates
opportunities for consumers to seek and find not only a product, but also a supportive community. In
numbers, there is not only safety but shared information.
Child Pornography and the Law
The Criminal Code of Canada defines Child Pornography as:
A photographic film, video or other visual representation, whether or not it was made by electronic or
mechanical means that shows a person who is or is depicted as being under the age of 18 years and is
engaged in or is depicted as engaged in explicit sexual activity.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Child Luring
Luring is an illegal act whereby someone communicates with a child on the Internet for the purpose of
committing a sexual offense against that child. Depending on the offense committed the required age of
the child can vary from 14 to 18 years old.
The Media Awareness Network conducted a research program in 2000 that revealed that of all young
Internet users, 25% of children and youth have been asked, by someone they have only ever met on the
Internet, to meet face to face. Also reported, and of perhaps greater concern, is that 15% of all young
Internet users have met, in person, at least one individual they first met on the Internet - putting
themselves in real danger.
How Child Luring Occurs
Over the course of an Internet friendship, familiarity, trust and affection develop between the predator and
the victim. Some predators are willing to travel thousands of miles and cross international borders to
connect with their online victims. Many studies show, however, that most predators reside within 100
kilometers of the victim's home.
It is common for a predator to spend time quietly observing the dialogue in youth chat rooms. Such
anonymous "spying" offers a means of identifying a vulnerable child and staying in synch with a chat
room's dynamic. They stay current on issues, trends and cultural references that are important to their
target age group. It is this knowledge that makes it easy to join in the conversation.
Once a conversation has been initiated, the predator will devote a great deal of time and energy to
establishing "trust" and a "friendship" with the target child. At the outset, conversations may appear
normal. The predator, however, soon employs strategies to exploit the vulnerabilities of youth. They will
demonstrate a "genuine" interest in the child and will go to great lengths to flatter the child and convey
understanding for all aspects of his or her life. This attention - heavy acquaintanceship quickly becomes a
"friendship" where confidences and secrets are shared.
Predators soon lure their victims into increasingly intimate conversations. They send photos and then soft
porn leading to more and more sexual content laden conversations. At this point the predator might
maneuver the child into meeting with him. Youth suffering from a lack of intimacy and have needs for
friendship are the most vulnerable. Predators know that these troubled adolescents are looking for selfvalidation and companionship; these kids are vulnerable as they lack the protective networks that the rest
of us have around us.
Since 2002, Cybertip.ca, Canadas national online child protection website, noted that luring accounted
for 10% of their reports, making it the second-largest category of complaint. The majority of these
incidents involved luring adolescent girls.
Cyberluring and the Law
Canadian legislation prohibits the luring of children. Since 2002, the Criminal Code of Canada has
criminalized electronic communication with a person believed to be a child for the purpose of facilitating
the commission of sexual offences. Internet luring of children is punishable by law.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
SECTION 2
The Unit
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
1. Magnify. Internet predators use fake emails and websites to fool recipients into
revealing personal information. To combat this, cyberpolice look for errors, false information or spelling
mistakes showing that the suspect has altered the document. Police also use magnification to compare
the unique characteristics of original documents with documents seized from suspects.
2. Search a Directory. The Internet offers hundreds of directories where a stalker can find
information about a person he is targeting. But cyberpolice can use the same directories to find the
predator. They cross-reference phone numbers, addresses, city maps, email and website information to
build up a picture of the man they are trying to find.
3. Look Up a Domain Name: Whois. If cyberpolice officers believe that a stalker is using
a specific website to lure young people, they employ a "domain name lookup", also called a Whois. This
service provides all the information that was provided at the time that the website was registered, usually
the names of the host server and the subscriber.
4. Retrieve Emails: Scavenger. When a search warrant is issued, the electronic devices
in the suspect's home or office are seized and brought to the police lab. There, police review all of the
files. They also use special software to retrieve files, including emails, that have been deleted. In the
Mirror Image game we have given this technology the name Scavenger.
Healthy Living
Personal Safety and Injury Prevention
Mirror Image opens as the CyberCop is getting ready to end his shift. Suddenly he receives a call on his
webcam. Two young girls, Sheena and Megan, want to report a crime.
Sheena is being stalked by a man she met on the Internet. Mitch contacted Sheena after reading her
profile on Instant Messaging. He claimed to be a modelling agent and offered to send her photos to a
New York agency that was engaged in a 'search for new faces'. Sheena was thrilled. She filled in the
application form Mitch sent her, giving him personal information.
Soon after, she noticed that a black van was following her in the street. Then she began to receive
threatening phone calls. To protect herself from the stalker, Sheena turned to the cyberpolice.
Challenge: The CyberCop asks Sheena to send the home page for the modelling agency and the
application form that Mitch sent her. Students must compare the two documents to determine whether the
application form really comes from the modelling agency or whether it was faked by Mitch.
Solution: Students click on the magnifier and compare the two documents, section by section. When they
compare the right side of the two documents a sharp-eyed student should notice that the address of the
modelling agency - Berkeley Street - is spelled wrong on the application.
Megan also posted her profile on Instant Messaging (IM) where it caught the eye of Mike. The two
exchanged emails. Then Mike began to send Megan gifts. Now Mike has invited Megan to a romantic
dinner at an expensive restaurant.
Meanwhile, Sheena has persuaded her cousin to shoot a photo portfolio. She sent Mitch photos in her
cheerleading outfit and in street clothes. Soon afterward, Mitch asked Sheena to pose for more
provocative pictures, but she refused.
Challenge: The CyberCop asks Sheena to send him the profile that she posted on Instant Messaging.
She also forwards the photographs she emailed to Mitch. The challenge is to determine whether Mitch
would have been able to use this information to discover the location of Sheena's school.
Solution: The IM Profile indicates that Sheena goes to a Toronto school that is located close to her gym.
The logo on her shirt suggests that either her school or her gym has the letters 'ing' in its name. When
students use the telephone directory to look up the names and addresses of gyms and schools, they find
that Springboard Gym is located on the same street as Glen High School. This is how Mitch was able to
find the address of the high school that Sheena attends.
The cyberpolice officer breaks the bad news to Sheena: her photographs have been altered and placed
on pornographic websites all over the world. Her dreams of a modelling career are over.
Then, to the dismay of both girls, the cyberpolice discover that Mitch and Mike are the same man. He has
been able to track the two girls because the application form for the modelling agency has placed a
Trojan on their computers.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
"Mitch" is able to open all of their files, read their Instant Messages, and activate their webcams to
videotape them in their bedrooms.
Challenge: Students are asked what facts they can discover about the man who calls himself Mitch and
Mike. They are given his email address and the website of his model search company.
Solution: Students click on the icon of the Whois to get the information that was filed with Mitch's website
when it was registered. They follow the trail of the website owners until it reaches a dead-end in Moscow.
However, they do find that Sheena's photos are now posted on a website owned by a man named
Vladimir.
The CyberCop warns: "We have to catch the predator with his hands on the keyboard or he'll just claim
someone else made the child pornography."
Challenge: First, students must remember an unusual, specific word that was used in a conversation with
Mitch: 'Panorama', 'g-string' and 'mysterious beauty' are options. Then, students use Scavenger to search
the hard drive of Sheena's computer for the email that contains this word.
Challenge: Students search the code at the bottom of the email to find the Internet Protocol (IP) address
of the server Mitch used. The IP address is embedded in the code: 156.114.152.256.
Challenge: Nomad technology gives us the latitude and longitude of the computer that Mitch is using.
Students have to scour the satellite images for the Toronto building at this location. When students run
the cursor over the building, the the IP address confirms the address where the police must go to make
the arrest.
Solution: To find Sheena's images, students will have to remember the name of the computer: Keyhole.
The cyberpolice enter Mitch's office and arrest him while he is still deleting files from the computer.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Caitlin is one of the victims of the stalker Robert Laking. Now eighteen, she can speak openly about the
months when she was afraid to open her email messages or to answer the phone.
After she played the Mirror Image game, Caitlin agreed to be interviewed so that other teens could learn
from her experience. Her parents and the police officers who solved the case were also gave their
thoughts on the legal, social and ethical dilemmas posed by the case.
1. Caitlin - When Caitlin's friends began to complain about "Rob", a man who was harassing them online,
Caitlin offered to tell him off. Soon she became the target of abuse herself. In her interview, Caitlin
explains what happened when she tried to deal with the situation alone.
2. Caitlin's Parents - When Caitlin finally told her parents about the stalker, their emotions ran from anger
to panic. This interview follows the family's first attempts to protect their daughter, attempts that could
have landed them in legal difficulties of their own.
3. Inspector Jeff Adam - The police were initially stumped in their attempts to track Robert Laking. In his
interview, Insp. Jeff Adam of the Royal Canadian Mounted Police tells how he was able to find the
electronic evidence to arrest the stalker.
4. Sgt. Fred Morton - When Caitlin's family approached Sgt. Fred Morton of the Saint John Police
Department, they were distraught. Sgt. Morton mapped out a strategy to protect the victims and their
families in the days leading up to the arrest.
5. James McAvity - As Crown Prosecutor, James McAvity was responsible for bringing Robert Laking to
trial. In this interview he explains how he chose his trial strategy.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Description:
By the end of this unit the students will connect the harassment definition previously introduced (in the
Personal Safety and Injury Prevention unit) to include the description of the term cyberharassment and
identify specific ways that they can deal with it. Students will identify people and resources that can
support someone experiencing cyberharassment.
Sub-Task Title
1. Defining Cyberharassment
2. Mirror Image Playing the Game
3. Is this Just a Game?
4. Making Good Decisions and Choices
5. Making Good Decisions and Choices II
Expectation Codes
7p14, 7p15
7p14, 7p15
7p14, 7p15
7p14, 7p15
7p14, 7p15
Healthy Living
Personal Safety and Injury Prevention
Appendices
Copy Master 1 Internet Inventory
Copy Master 2 Dealing with Cyberharassment
Copy Master 3 Cyber Organizer
Copy Master 4 Self/Peer Assessment Tool
Copy Master 5 Graphic Organizer Checklist
Copy Master 6 Introduction to the Game (The Real Story)
Copy Master 7 CyberCop Log Book
Copy Master 8 CyberCop Log Book Answers
Copy Master 9 Profile and Supports
Copy Master 10 Sample Letter to Parents
Copy Master 11 Code of Conduct
Copy Master 12 Cybercrime Specialist
Appendix A Placemat (Oral Communication)
Appendix B Word Wall (Writing)
Appendix C Gathering and Evaluating (Reading)
Appendix D - Reporting Child Abuse and Neglect
Appendix E Additional Supports
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Sub Task # 1
Title: Defining Cyberharassment
Materials
CM1 Internet Inventory
CM3 Cyber Organizer
CM5 - Graphic Organizer Checklist
Appendix B - Word Wall Description
Chart Paper
Description
Students develop an understanding of cyberharassment and explore a variety of ways to deal with it.
Expectation
Code
7p14
7p15
Learning Expectation
describe harassment and identify ways of dealing with it (e.g., by communicating
feelings and reporting incidents of harassment)
identify people and resources that can support someone experiencing
harassment
Background Information
Internet terminology (etiquette) Students need to recognize that bullying, harassment and other
inappropriate activities often happen on the Internet and there are consequences for these behaviours.
This discussion should take place prior to the first sub-task through a class discussion or small group
activity.
Identification of words used to replace longer words on the Internet or in chat rooms (e.g., lol) and how to
respond appropriately to messages.
Notes to Teacher
Students require strategies to be critical thinkers when on the Internet. This will allow them to identify the
information that others have access to and how to ensure that they are acting in a safe manner.
Teaching/Learning Strategies
Class Discussion
Review of the term harassment that was taught in Unit 1 Personal Safety and Injury Prevention,
Overview, p. 35 in the Ophea Curriculum Resource Support Document, Grade 7. See Section 1
Definitions in this resource (page XX).
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Word Wall
See Appendix B - Word Wall Strategy for descriptions and samples of the strategy.
The teacher will give an introduction to the language that they will be exposed to in this unit and compare
it to the list the students came up with.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Sub Task #2
Title: Mirror Image Playing the Game
Materials
Mirror Image game (loaded on the computer)
CM8 CyberCop Log Book Answers
CM6 - Introduction to the Game (The Real Story)
Description
In this sub-task students will play the CyberCops game. This lesson will need to take place in the
computer lab using an LCD projector or in a room with multiple computers.
Expectation
Code
7p14
7p15
Learning Expectation
describe harassment and identify ways of dealing with it (e.g., by communicating
feelings and reporting incidents of harassment)
identify people and resources that can support someone experiencing
harassment
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
CyberCop Log Book Provide each student with CM7 - CyberCop Log Book to record important
information. Instruct students to use the log book to enter their responses to the clues. Inform
students that if they do not accurately get the clue within three attempts to bring the log book to the
teacher and the teacher can direct the students to the correct response.
Time Remind students that the amount of time they have access to the computers is limited and
in order to finish the game the students must stay on task.
Playing the Game:
The teacher can begin the game, or have students work in groups to complete the game.
After the Game:
Allow students to discuss areas of interest, concerns and topics that need further clarification.
Graphic Organizer: Have the students complete the sections on their Cyber Organizer entitled
Could this happen to you? and Choices and Decisions. In the Could this happen to you? section have
the students reflect on what happened in the game and provide a response paragraph outlining why or
why not they think this could happen to them. In the Choices and Decisions Section have the students list
and explain one positive and one negative choice/decision the characters made in the game.
Curricular Extension Technology Used in the Game
Language Expectations:
identify various types of media works and a variety of the techniques used in each
analyze and interpret media works
Divide students into five groups. Provide each group with one of the types of technology used in the game
(page XX). Each group will discuss how this type of technology can be used and the benefits of this
technology in todays world and come up with one other type of new technology that is being used.
Students may want to do some additional research on this topic.
Notes:
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Sub Task #3
Title: Is this Just a Game?
Materials
CM1 Internet Inventory
CM3 Cyber Organizer
CM8 CyberCop Log Book - Answer
Appendix C Website Evaluation Guide
www.cybercops.net
Writing Utensil
Description
Students will critically examine the Mirror Image game and identify the areas and situations that could
potentially put them at risk of being safe and how to make good decisions and deal with them
appropriately and safely. Students will also identify the areas of the game that are fictional and identify
what supports are available to ensure safety on the Internet.
Expectation
Code
7p14
7p15
Learning Expectation
describe harassment and identify ways of dealing with it (e.g., by communicating
feelings and reporting incidents of harassment)
identify people and resources that can support someone experiencing
harassment
Healthy Living
Personal Safety and Injury Prevention
Individual Activity:
Graphic Organizer List the people, resources, and/or supports that are available to assist someone
experiencing cyberharassment or difficulties online in your school and community.
Curricular Extensions Gathering and Evaluating Information from a World Wide Web Page
Have students discuss how they can tell if a website or email is authentic and how they can tell if the
information a website has is accurate and credible.
Discuss with students some of the sites they have recently searched on for information and why they
chose those sites.
Have the students use the Website Evaluation Guide and Checklist for Evaluating Websites found in
Appendix C to reflect on a web site they have visited. After reflecting on recently visited websites have
students share any of the criteria that they used to determine if a website is safe and/or credible.
Notes:
Be aware that the content in the Behind the Headlines story is factual and references are made to sexual
conduct. Appropriate pre-teaching should take place, and teachers should check with school board
guidelines around addressing this issue.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Sub Task #4
Title: Making a Good Decision
Materials
CM4 - Self/Peer Assessment Checklist
CM12 Cybercrime Specialist
Writing tool
Description
Students will examine the script from the Mirror Image game and choose one situation where a better
choice could have lead to a better decision. Students will use the information collected on their graphic
organizer to inform their decision and write their script.
Expectation
Code
7p14
7p15
Learning Expectation
describe harassment and identify ways of dealing with it (e.g., by communicating
feelings and reporting incidents of harassment)
identify people and resources that can support someone experiencing
harassment
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Sub Task #5
Title: Making a Good Decision II
Materials
1 Props for role play
CM5 Graphic Organizer Checklist
Description
Students will present their role plays showing how a different action, decision or choice would have made
a more positive outcome to the story. Upon completion of the role play students will submit their graphic
organizers.
Expectation
Code
7p14
7p15
Learning Expectation
describe harassment and identify ways of dealing with it (e.g., by communicating
feelings and reporting incidents of harassment)
identify people and resources that can support someone experiencing
harassment
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
SECTION 3
Copy Masters
Appendices
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Copy Master 1
Internet Inventory
My chat room name(s)
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Copy Master 2
____________ _____________
After discussing with a small group indicate the way you would deal with this situation.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Copy Master 3
Cyber Organizer
How would you deal with
Cyberharassment?
Cyberharassment
Any unwanted, uninvited remarks of a
persistent nature that make you feel
unsafe, degraded or uncomfortable. It
includes any overt, subtle written
emails or text messages that express
hatred based on a persons sex, race,
ethnicity, religion.
Other important
information/research
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Copy Master 4
Self/Peer Assessment
Please indicate if you feel the group met the criteria listed. Please add in any additional comments
to support your choice.
Criteria
YES
NO
Strengths/Weaknesses
Organization
The speaker(s) had an equal part in the
play.
The individual roles are clear.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Copy Master 5
Criteria
Yes
No
Comments:
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Copy Master 6
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Copy Master 7
Question 2:
Sheenas IM profile says her gym is near her school. Use the directory to find gyms and schools in the
same area. What is the address of Sheenas school?
Answer: ________________________________________________________________________
Question 3:
Use the Whois tool to further investigate Mitchs website. Who has control over Sheenas pictures?
Answer: ________________________________________________________________________
Question 4:
Can you remember a word that Mitch used in a conversation with Sheena, or a word that Mike used in a
conversation with Megan?
Answer: ________________________________________________________________________
Question 5:
What is Mitchs IP address?
Answer: _________________________________________________________________________
Question 6:
What is the latitude and longitude of Mitchs office?
Answer: latitude:__________________longitude:____________________
Question 7:
What is the name of the computer?
Answer: _____________________________________________________________________
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Copy Master 8
Question 2
Sheenas IM profile says her gym is near her school. Use the directory to find gyms and schools in the
same area. What is the address of Sheenas school?
Answer: 7574 Glen Road
Question 3
Use the Whois tool to further investigate Mitchs website. Who has control over Sheenas pictures?
Answer: Vladimir
Question 4
Can you remember a word that Mitch used in a conversation with Sheena, or a word that Mike used in a
conversation with Megan?
Answer: Any one of these words is correct: Panorama, t-backs, g-strings, modeling career, icy
mysterious beauty.
Question 5
What is Mitchs IP address?
Answer: 156.114.152.256
Question 6
What is the latitude and longitude of Mitchs office?
Answer: latitude: 43.7600 longitude: 79.0200
Question 7
What is the name of the computer?
Answer: Keyhole
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Copy Master 9
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Copy Master 10
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Copy Master 11
Code of Conduct
What does the Code of Conduct Say:
Standards of Behaviour
Standards of Behaviour
Physical Aggression
All school members must:
not inflict or encourage others to inflict
bodily harm on another person;
seek staff assistance, if necessary, to
resolve conflict peacefully.
Physical Aggression
All school members must:
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Copy Master 12
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Appendices
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
Appendix A
In this easy-to-use strategy, students are divided into small groups, gathered around a piece of chart paper.
First, students individually think about a question and write down their ideas on their own section of the chart
paper. Then students share ideas to discover common elements, which can be written in the centre of the
chart paper.
Purpose
Give all students an opportunity to share ideas and learn from each other in a cooperative small-group
discussion.
Payoff
Students will:
have fun interacting with others and extending their learning while accomplishing the task.
Tips and Resources
The strategy can be used with a wide variety of questions and prompts.
Use the place mat strategy for a wide range of learning goals, for example:
- to encourage students to share ideas and come to a consensus on a topic
- to activate the sharing of background knowledge among students
- to help students share problem-solving techniques in mathematics and science
- to take group notes during a video or oral presentation
Groups of two to four are ideal for place mat, but it can also work with up to seven students in a group.
You may choose several questions or issues for simultaneous consideration in a place mat strategy. To
start, each group receives a different question or issue to work on. Once they have completed their
discussion, the groups rotate through the various questions or issues until all have been explored.
Place mat also works well as an icebreaker when students are just getting to know each other.
Give careful consideration to the composition of the small groups, and vary the membership according
to the students styles of learning and interaction, subject-matter proficiency, and other characteristics.
Some students may benefit from being able to pass during group sharing.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
THINK LITERACY: Cross-Curricular Approaches, Grades 7-12
What students do
Notes
Before
During
After
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
THINK LITERACY: Cross-Curricular Approaches, Grades 7-12
Teacher Resource
Topic: Cyberharassment
Write quietly on your own in your section of the place mat for
several minutes.
Example: Take a few minutes to think about and then individually write down what you know about:
CYBERHARASSMENT
-When someone harasses you using a computer
- it is illegal
Note: These are sample student responses and to be used only as a teacher resource. This is not meant to be
used as an answer sheet or to distribute to students.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
Appendix B
Students are required to learn, on average, over 2 000 words each year in various subject areas. Those who
have trouble learning new words will struggle with the increasingly complex texts that they encounter in the
middle and senior school years. A word wall is a wall, chalkboard or bulletin board listing key words that will
appear often in a new unit of study, printed on card stock and taped or pinned to the wall/board. The word wall is
usually organized alphabetically.
Purpose
Identify unfamiliar vocabulary and create a visible reference in the classroom for words that will appear often
in a topic or unit of study.
Payoff
Students will:
practice skimming and scanning an assigned reading before dealing with the content in an intensive way.
Students will then have some familiarity with the location of information and with various elements of the text.
develop some sense of the meaning of key words before actually reading the words in context.
improve comprehension and spelling because key words remain posted in the classroom.
Skimming means to read quickly horizontally - through the text to get a general understanding of the
content and its usefulness.
Scanning means to read quickly vertically or diagonally to find single words, facts, dates, names, or
details.
This strategy can be used during a fitness blast or a sport activity to review concepts or to review health
terms for an evaluation.
Words for the word wall may be created by teachers but preferably students should be involved in the
process. Consider posting certain words for longer periods (for example: words that occur frequently in the
unit or course, words that are difficult to spell, and words that students should learn to recognize on sight).
Before building the word wall, consider using the strategy Analyzing the Features of Text to help students
become familiar with the text.
See Teacher/Student Resources:
- Extending Vocabulary; Skimming and Scanning to Preview a Text.
- Extending Vocabulary; CyberCops (Grade 7).
For background information:
- Ophea, Health and Physical Education, Grade 7. Unit #1 Personal Safety and Injury Prevention.
- Ophea, CyberCops Unit, Grade 7.
Further Support
Add a picture to the word cards (preferably a photograph from a magazine) as a support for ESL students
and struggling readers.
Provide each student with a recording sheet so that they can make their own record of the key words for
further review.
If it appears that students will need additional support, review the terminology on the word wall in the two
classes following the activity, using Take Five or Think/Pair/Share, (Think Literacy) which are described in the
Oral Communication section.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
THINK LITERACY: Cross-Curricular Approaches, Grades 7-12
What students do
Notes
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
THINK LITERACY: Cross-Curricular Approaches, Grades 7-12
Teacher Resource
CyberCops
Chatting
Instant
Messaging
Profile
IP
Address
Webcam
Hard Drive
Internet
CUL8R
Cyber
harassment
Domain
Name
Cyberharassment
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
THINK LITERACY: Cross-Curricular Approaches, Grades 7-12
Teacher Resource - Health and Physical Education
Coaching
Praising
Tolerance
Asking for help
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
Appendix C
Students need to develop the skills and knowledge of information technologies to harness the power,
effectiveness, efficiency and excitement of learning in the information age. (OSLA, 1998)
The World Wide Web has become a pervasive influence on all of our lives. Effective use of the Internet to
acquire information is an essential skill to becoming literate in the 21st century. A large majority of students
are now using the Web as their main source of information. However, the results often lead to endless pages
of information much of which can be ignored for various reasons. Providing students with an approach to
critically evaluating websites can be the key to tap into this vast resource.
Purpose
Payoff
Students will:
become more efficient at assessing the value and usability of Internet websites.
develop critical thinking and information literacy skills.
analyze and evaluate information using a variety of strategies.
establish criteria for evaluating an Internet resource.
Some of the issues that need to be addressed when evaluating Internet resources are bias, stereotyping,
inclusivity and credibility. Students will need an understanding of these concepts before accessing the
computer. The teacher can lead a brainstorming session on the meanings/examples of these terms to
assess if the students have the required knowledge and previous experience to continue. See Teacher
Resource, Website Evaluation Guide and Student Resource, Checklist for Evaluating Websites.
Some terminology may be new for students and teachers. Refer to Student/Teacher Resource, Glossary
of Website Terms.
To prepare for this activity:
- make arrangements to access the necessary computer hardware, e.g., LCD projector and demonstration computer.
- select two or three examples of good and bad websites (See, The ABCs of Website Evaluation and/or The Good,
The Bad and The Ugly in Website Supports).
- visit the suggested sites in the Teacher Resource, Website Supports to find further teaching strategies and links to
possible sites.
- check to make sure that all of the sites are still active.
- decide which sites will be used and how the students will access them.
Refer to Teacher Resource, Website Evaluation Guide to see criteria for evaluation of websites.
See Teacher Resource, Website Supports for related information and further assistance.
See Student/Teacher Resource, Citing Website Sources.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
THINK LITERACY: Cross-Curricular Approaches, Grades 7-12
What students do
During
Model the process of evaluating a website
with a Think Aloud using two or three
examples.
Model the reading strategies students would
use when reading informational text.
Have students investigate advanced
searching techniques on search engine sites
(e.g. www.google.com, www.yahoo.com) See
Information about search engines in Website
Supports for more information.
Remind students of the need to properly cite
any information used; provide an appropriate
style with examples. See Student/Teacher
Resource, Citing Website Sources.
After
Encourage students to reflect on the sites
they find and the process they used to search
(see Student Resource, Student Checklist for
Evaluating Websites)
Notes
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
THINK LITERACY: Cross-Curricular Approaches, Grades 7-12
Student/Teacher Resource
3. Use the list of key words generated the more precise the words to include or exclude, the
more valuable your search results will be.
4. If a page has gone missing (Error 404), or if there might be more useful information on this
site, trim back the URL to the previous slash. Repeating this process might turn up other
error messages, but it might also lead to a better starting point.
5. Do not get stuck sifting through pages that do not seem quite right. Move on to other pages,
or revisit and revise previous steps taken.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
THINK LITERACY: Cross-Curricular Approaches, Grades 7-12
Teacher Resource
Information
Website design
Bias
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
LITERACY STRATEGIES
THINK LITERACY: Cross-Curricular Approaches, Grades 7-12
Student Resource
URL: _________________________________________________________
If you have answered Yes to all of the statements, this website may be useful to you.
If you have answered No to any of the statements, you need to consider whether
this website will be of use to you.
If you have a ?, you should discuss the statement with a teacher or group member.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Appendix D
Reporting Child Abuse and Neglect
Introduction
Ontario's Child and Family Services Act (CFSA) provides for a broad range of services for families and
children, including children who are or may be victims of child abuse or neglect.
The paramount purpose of the Act is to promote the best interests, protection and well being of children.
The Act recognizes that each of us has a responsibility for the welfare of children. It states clearly that
members of the public, including professionals who work with children, have an obligation to report
promptly to a Children's Aid Society if they suspect that a child is or may be in need of protection.
The Act defines the term "child in need of protection" and sets out what must be reported to a Children's
Aid Society. This definition (CFSA s.72(1)) is set out in detail on the following pages. It includes physical,
sexual and emotional abuse, neglect and risk of harm.
This information summarizes reporting responsibilities under Ontario's Child and Family Services Act. It is
not meant to give specific legal advice. If you have questions about a given situation, you should consult
a lawyer or the Children's Aid Society.
Responsibility to report a child in need of protection
CFSA s.72(1)
If a person has reasonable grounds to suspect that a child is or may be in need of protection, the person
must promptly report the suspicion and the information upon which it is based to a Children's Aid Society.
The situations that must be reported are listed in detail below.
Child and Family Services Act CFSA s.72 (1)
Despite the provisions of any other Act, if a person, including a person who performs professional or
official duties with respect to children, has reasonable grounds to suspect one of the following, the person
shall forthwith report the suspicion and the information on which it is based to a society:
1. The child has suffered physical harm, inflicted by the person having charge of the child or caused
by or resulting from that person's,
i.
failure to adequately care for, provide for, supervise or protect the child, or
ii.
pattern of neglect in caring for, providing for, supervising or protecting the child.
2. There is a risk that the child is likely to suffer physical harm inflicted by the person having charge
of the child or caused by or resulting from that person's,
i.
failure to adequately care for, provide for, supervise or protect the child, or
ii.
pattern of neglect in caring for, providing for, supervising or protecting the child.
3. The child has been sexually molested or sexually exploited, by the person having charge of the
child or by another person where the person having charge of the child knows or should know of
the possibility of sexual molestation or sexual exploitation and fails to protect the child.
4. There is a risk that the child is likely to be sexually molested or sexually exploited as described in
paragraph 3.
5. The child requires medical treatment to cure, prevent or alleviate physical harm or suffering and
the child's parent or the person having charge of the child does not provide, or refuses or is
unavailable or unable to consent to, the treatment.
6. The child has suffered emotional harm, demonstrated by serious,
i.
anxiety,
ii.
depression,
iii.
withdrawal,
iv.
self-destructive or aggressive behaviour, or
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
v.
delayed development,
and there are reasonable grounds to believe that the emotional harm suffered by the child results from
the actions, failure to act or pattern of neglect on the part of the child's parent or the person having charge
of the child.
7. The child has suffered emotional harm of the kind described in subparagraph i, ii, iii, iv or v of
paragraph 6 and the child's parent or the person having charge of the child does not provide, or
refuses or is unavailable or unable to consent to, services or treatment to remedy or alleviate the
harm.
8. There is a risk that the child is likely to suffer emotional harm of the kind described in
subparagraph i, ii, iii, iv or v of paragraph 6 resulting from the actions, failure to act or pattern of
neglect on the part of the child's parent or the person having charge of the child.
9. There is a risk that the child is likely to suffer emotional harm of the kind described in
subparagraph i, ii, iii, iv or v of paragraph 6 and that the child's parent or the person having
charge of the child does not provide, or refuses or is unavailable or unable to consent to, services
or treatment to prevent the harm.
10. The child suffers from a mental, emotional or developmental condition that, if not remedied, could
seriously impair the child's development and the child's parent or the person having charge of the
child does not provide, or refuses or is unavailable or unable to consent to, treatment to remedy
or alleviate the condition.
11. The child has been abandoned, the child's parent has died or is unavailable to exercise his or her
custodial rights over the child and has not made adequate provision for the child's care and
custody, or the child is in a residential placement and the parent refuses or is unable or unwilling
to resume the child's care and custody.
12. The child is less than 12 years old and has killed or seriously injured another person or caused
serious damage to another person's property, services or treatment are necessary to prevent a
recurrence and the child's parent or the person having charge of the child does not provide, or
refuses or is unavailable or unable to consent to, those services or treatment.
The child is less than 12 years old and has on more than one occasion injured another person or caused
loss or damage to another person's property, with the encouragement of the person having charge of the
child or because of that person's failure or inability to supervise the child adequately.
Ongoing duty to report CFSA s.72(2)
The duty to report is an ongoing obligation. If a person has made a previous report about a child, and has
additional reasonable grounds to suspect that a child is or may be in need of protection, that person must
make a further report to a Children's Aid Society.
Persons must report directly CFSA s.72(3)
The person who has the reasonable grounds to suspect that a child is or may be in need of protection
must make the report directly to a Children's Aid Society. The person must not rely on anyone else to
report on his or her behalf.
What are "reasonable grounds to suspect"?
You do not need to be sure that a child is or may be in need of protection to make a report to a Children's
Aid Society. "Reasonable grounds" are what an average person, given his or her training, background
and experience, exercising normal and honest judgement, would suspect.
Special responsibilities of professionals and officials, and penalty for failure to report CFSA
s.72(4), (6.2)
Professional persons and officials have the same duty as any member of the public to report a suspicion
that a child is in need of protection. The Act recognizes, however, that persons working closely with
children have a special awareness of the signs of child abuse and neglect, and a particular responsibility
to report their suspicions, and so makes it an offence to fail to report.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Any professional or official who fails to report a suspicion that a child is or may be in need of protection,
where the information on which that suspicion is based was obtained in the course of his or her
professional or official duties, is liable on conviction to a fine of up to $1,000.
Professionals affected CFSA s.72(5)
Persons who perform professional or official duties with respect to children include the following:
health care professionals, including physicians, nurses, dentists, pharmacists and psychologists;
teachers, and school principals;
social workers and family counsellors;
priests, rabbis and other members of the clergy;
operators or employees of day nurseries;
youth and recreation workers (not volunteers);
peace officers and coroners;
solicitors;
service providers and employees of service providers; and
any other person who performs professional or official duties with respect to a child.
This list sets out examples only. If your work involves children but is not listed above, you may still be
considered to be a professional for purposes of the duty to report. If you are not sure whether you may be
considered to be a professional for purposes of the duty to report, you should contact your local children's
aid society, professional association or regulatory body.
Professional confidentiality CFSA s.72(7),(8)
The professional's duty to report overrides the provisions of any other provincial statute, specifically,
those provisions that would otherwise prohibit disclosure by the professional or official.
That is, the professional must report that a child is or may be in need of protection even when the
information is supposed to be confidential or privileged. (The only exception for "privileged" information is
in the relationship between a solicitor and a client.)
Protection from liability CFSA s. 72(7)
If a civil action is brought against a person who made a report, that person will be protected unless he or
she acted maliciously or without reasonable grounds for his or her suspicion.
What will the Children's Aid Society do?
Children's Aid Society workers have the responsibility and the authority to investigate allegations and to
provide services to protect children.
A Children's Aid Society worker may, as part of the investigation and plan to protect the child, involve the
police and other community agencies.
How to contact a Children's Aid Society
Check the telephone directory for the office closest to you. In some communities, the Children's Aid
Society is known as "Family and Children's Services". The emergency pages in most Ontario telephone
directories have the number to call to report to a Children's Aid Society.
All the Children's Aid Societies/Family and Children's Services have emergency service 24 hours a day,
so that you can call anytime.
For more information
Contact your local Children's Aid Society or Family and Children's Services. If you suspect that a child is
or may be in need of protection, contact a Children's Aid Society immediately. Your co-operation is vital to
making Ontario's child protection system work.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Appendix E
ADDITIONAL SUPPORTS
Cybertip.ca (www.cybertip.ca)
Cybertip.ca is Canada's National Tipline for reporting the online sexual exploitation of children. It is a
centralized web portal for receiving and addressing reports from the public regarding child pornography,
luring, child sex tourism, and children who are exploited through prostitution. Cybertip.ca also provides
the public with information, referrals and other resources to help Canadians keep their children safe while
on the Internet.
Child Find Manitoba's Cybertip.ca operates as one of the organization's core services. Although the
majority of Cybertip.ca's reports are provided online, the public is also able to contact the tipline by phone
or fax.
Media Awareness Network: Be Web Aware (www.bewebaware.ca)
Be Web Aware is a national, bilingual public education program on Internet safety. The objective of
everyone involved in this project is to ensure young Canadians benefit from the Internet, while being safe
and responsible in their online activities. Be Web Aware grew out of a series of discussions and a
collective concern among Microsoft Canada, Media Awareness Network and Bell Canada about online
safety. A national coalition of Canadian media companies and non-profit organizations has formed to
promote this initiative across the country.
The goal of the Be Web Aware initiative is two-fold: to raise awareness amongst parents that there are
safety issues when their children go online and that they need to get involved and to provide practical
information and tools that will equip parents to effectively manage Internet use in the home and to teach
their kids to be web aware.
The Be Web Aware initiative includes a comprehensive Web site. The site, developed by Media
Awareness Network, is full of information and tools to help parents teach their children to handle the
potential risks associated with going online.
Ontario Provincial Police (www.opp.ca)
The Ontario Provincial Police provide support of both an information and protective nature regarding
many aspects of safety including Internet Safety. The E-crime section focuses their work both on the
preventative aspects as well as the investigative aspects of many types of Internet related crimes.
Cybercops.net (cybercops.net)
Hosted by Livewires Design Ltd., Cybercops.net provides additional information on Internet Safety as well
as additional classroom activities to accompany the Mirror Image game.
Beyondborders.ca (www.beyondborders.org)
Beyond Borders advances the rights of children to be free from abuse and exploitation without regard to
race, religion, gender or sexual orientation. Beyond Borders does not have any religious or political
affiliation. In September 1999, Beyond Borders was granted affiliate status with ECPAT International. The
campaign to End Child Prostitution, Pornography and the Trafficking of Children for Sexual Purposes
operates in 70 countries around the world. Their common goal is the elimination of all forms of
commercial sexual exploitation of children.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
GLOSSARY
Internet Vocabulary
Acceptable Use Policy (AUP)
A legally binding document agreed to by online users, which regulates the rules of Internet use at a
school, business, or home. Schools can embed these into agendas or planners, or send home specific
newsletters requiring a signature from parents and students.
Backdoor
A way to bypass authentication and obtain remote access to a computer. A hacker/cracker might install
a backdoor to retrieve files and gain access to confidential information.
Bookmark list
A personal list of favorite Web addresses, organized in a single list. All Web browsers allow users to
create bookmarks so users can return to their favourite Websites. Also known as Hotlists. Hackers can
target these lists through software, viruses and Trojan Horses.
Chat Room
Public places on the Internet where Internet users have live, real-time conversations with many people at
the same time. Everyone in the chat room can see what everyone else writes, but they can remain
anonymous if they wish.
Cybercops
A word used by informal groups of police officers who assist one another to solve Internet based crimes.
Most police units are called High-Tech Crimes Units or Electronic Crime Units in Ontario.
Domain Name
The unique name that identifies an Internet site. Domain Names always have two or more parts,
separated by dots. The part on the left is the most specific, and the part on the right is the most general.
Government sites contain gov and many educational sites will have edu in their domain names.
Fire Wall
A combination of hardware and or software that protects computers connected to the Internet. Monitors
programs that communicate with the Internet.
Grooming
The process by which a pedophile stalks a victim and lulls them into thinking they are chatting with a
friend. They act as if they were the same age, ask seemingly innocuous questions that helps them
identify the location of the victim. There are several stages in this process during which time they become
increasingly more bold and may mention personal subjects such as removing clothing or asking about
sex.
Hacker
Individual who obtains unauthorized access to computer data most commonly via the Internet.
Hotlist
A personal list of favourite Web addresses, organized in a single list. All Web browsers allow users to
create hotlists so users can return to their favorite Websites. Also known as Bookmarks.
Instant Messaging (IM)
A means by which Internet users communicate in real-time. A form of chat but controlled by user utilizing
the software. Users choose who they communicate with and maintain buddy lists for IM purposes that
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
could include strangers if proper precautions are not taken. Users can block those they do not wish to
have on their list. Can allow the use of web cameras (web cams).
Internet
The network that connects more than four million computers in 160 countries. The Internet is the virtual
space in which users send and receive email, login to remote computers (telnet), browse databases of
information (gopher, World Wide Web), and send and receive programs (ftp) contained on these
computers.
Internet account
Purchased through an Internet service provider, the account assigns a password and email address to
an individual or group, and access to the Internet at large.
Internet Protocol Number or Address (IP)
The specific number of a computer on the Internet. Can be traced and is identified in email messages in
the hypertext. Sometimes called a dotted quad. A unique number consisting of four parts separated by
dots, e.g. 165.113.245.2
Internet Relay Chat (IRC)
Interactive, real-time discussions between Internet users using text messages. Users logon via telnet to
designated Internet computers and join discussions already in progress, or create conversations of their
own.
Internet Service Provider (ISP)
Any organization that provides access to the Internet. Many ISPs also offer technical assistance to
schools looking to become Internet information providers by placing their school's information online.
Login or Logon
The account name used to gain access to a computer system. Not a secret (the antonym is Password).
Or (verb) the act of entering into a computer system. It is not recommended that users create a login
name that would reflect their gender or age to sign onto a computer system.
Mailing lists
There are more than 4,000 topic-oriented, email-based discussion groups that may be read and to which
users post. Internet users subscribe to the lists they want to read and receive messages via email. Also
known as discussion groups or listservs. Students are discouraged from belonging to such groups since
pedophiles search for young people on whom to prey.
Network
A group of connected computers. Most school networks are known as LANs, or Local Area Networks,
because they are networks linking computers in one small area. The Internet could be referred to as a
WAN, or a Wide Area Network, because it connects computers in more than one local area.
Online/Offline
When you are logged onto a computer through your modem, you are said to be online. When you are
using your computer but are not connected to a computer through your modem, you are said to be
working offline.
Password
A code used to gain access to a locked system or file. A good password does not reveal your identify or
your gender. It may include numbers and letters, some people replace a word, such as password using
numbers for vowels. i.e. p2ssw0rd.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
Server
A company providing many different services to clients on the WWW, such as web page hosting, email
services .
Signature file (SIG)
A return address and information such as name, phone number, and email address that users put at the
bottom of email messages. Usually a simple text message, automatically added by your email program.
Spam
Unsolicited email. Applies primarily to commercial messages posted across a large number of Internet
Newsgroups, especially when the ad contains nothing of specific interest to the posted Newsgroup. Spam
sent in bulk, slows down bandwidth and causes the users server to work more slowly.
Trojan (Horse)
Trojan Horse is a form of a program that can plant itself on a hard drive. It can be received via a hacker or
as a file masquerading as an innocuous downloadable file within an email or peer to peer network. It
could simply delete files on your system, or it can plant itself and give remote users full access to your
system. Similar to worms and viruses, which replicate themselves. The biggest danger with a worm is its
ability to replicate itself on your system, so rather than your computer sending out a single worm, it could
send out hundreds or thousands of copies of itself, creating a huge devastating effect.
Typosquat Site (misspellings)
Children and even adults often misspell words when searching for something on the Internet.
Pornographers will take advantage of that and will create websites that use these commonly misspelled
words to lead you onto their pornography sites. For example, Britney Spears is one of the most
commonly searched for terms on the Internet. Misspellings such as Brittney Spears, or Britney Speers
will lead you to pornography sites.
Uniform Resource Locator (URL)
The address and method used to locate a specific resource on the Internet. A URL beginning with http://
indicates that the site is a WWW resource and that a Web browser will access it. However, http:// is not
required when typing most URLs into the browser.
Virus
A computer virus attaches itself to a program or file so it can spread from one computer to another,
leaving infections as it travels. There are dialers which change your dial-up number. There are many
ways to prevent this from happening, including Fire Walls and also protections against Spyware and
HiJackers (hackers). Computers should have anti-virus software, which are available online.
Web Browser (Also known as Internet Browser or Browser)
Software that allows computer users to access and navigate the contents of the Internet. e.g. Internet
Explorer, Netscape.
World Wide Web (WWW, W3 or Web)
An information and retrieval system based upon the hypertext transfer protocol (http) that transfers
hypertext documents across computer systems. The Web was created by the CERN High-Energy
Physics Laboratories in Geneva, Switzerland in 1991.
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention
REFERENCES
Criminal Code of Canada R.S. (1985).
Institute for Catholic Education. (1998). Ontario Catholic School Graduate Expectations. Toronto.
Jilks-Racine, J. (2005) Internet Safety. Ontario Principal's Council Register Spring 2005, Vol. 7 (1).
Toronto.
Ministry of Education. (1998).The Ontario Curriculum, Grades 1-8, Health and Physical Education.
Queens Printer for Ontario.
Ministry of Education. (2001). Code of Conduct, Ontario Schools. Queen's Printer for Ontario.
Ophea, (2000). Health and Physical Education Curriculum Support Documents, Grade 7.
Ontario Child and Family Services Act, R.S.O. (1990).
Ontario Conference of Catholic Bishops. Fully Alive (Grades 1-8). Pearson.
Ontario Provincial Police. Internet Safety Tips for Teens and Internet Safety Tip for Parents.
Statistics Canada.(2005). Family Violence in Canada: A Statistical Profile. Canadian Centre for Justice
Statistics.
www.bewebaware.ca. Media Awareness Network
www.cybercops.net. LiveWires Design Ltd.
www.cybertip.ca. Canadas National Tipline
CyberCops Unit
Health and Physical Education
Grade 7
Healthy Living
Personal Safety and Injury Prevention