Cyberbullying & Computer Crimes. Chatham-Kent Police Service Crime Prevention and Community Safety. What is Cyberbullying?. the use of information and communication technologies to bully, embarrass, threaten or harass another
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Chatham-Kent Police Service
Crime Prevention and Community Safety
Blogging - on-line diary, MySpace.com
Cell Phones - camera phone with text messaging
Discussion Boards, News Groups and Guest Books - often used to make fun of others, people can add to it www.rateteacher.com
E-mail - not real time, forwarding hurtful e-mails
Instant Messaging ”IM’s” - MSN, YAHOO, ICQ-Real time chat, web cam, photos
Interactive Games - bullying can occur while playing on-line games-moderator can assist in terminating the bullying
Profiles - personal information, pretend to be someone else
Websites – can be used to target victimCommunication Technologies
There is no escape.
Home is no longer a place to feel safe or free from the hurtful words.
Change e-mail or cell phone number
Don’t reply to messages from cyberbullies
Don’t erase or delete messages
Tell an adult
Inform your ISP (Internet Service Provider)
Call police if messages are threateningTips For The Bullied
authority and knowing that another person
is harassed or recklessly as to whether the
other person is harassed engage in
conduct referred to in subsection (2) that
causes that other person reasonably, in all
the circumstances, to fear for their safety
or the safety of anyone known to them.
manner, knowingly utters, conveys or causes
any person to receive a threat
a) to cause death or bodily harm to any person
b) to burn, destroy or damage real or personal property; or
c) to kill, poison or injure an animal or bird that is the property of any person.
a) without the consent of another person, he applies force intentionally to that other person, directly or indirectly;
b) he attempts or threatens, by an act or a gesture, to apply force to another person, if he has, or causes that other person to believe upon reasonable grounds that he has, present ability to effect his purpose; or
c) while openly wearing or carrying a weapon or an imitation thereof, he accosts or impedes or begs.
(a) in words legibly marked upon any substance, or
(b) by any object signifying a defamatory libel otherwise than by words.
without reasonable justification or excuse
and with intent to obtain anything, by
threats, accusations, menaces or violence
induces or attempts to induce any person,
whether or not he is the person threatened,
accused or menaced or to whom violence
is shown, to do anything or cause anything
to be done.
(a) repeatedly following from place to place another person or anyone known to them;
(b) repeatedly communicating with, either directly or indirectly, the other person or anyone known to them;
(c) besetting or watching the dwelling-house, or place where the other person, or anyone known to them, resides, works, carries on business or happens to be;
(d) engaging in threatening conduct directed at the other person or any member of their family.
(a) with intent to gain advantage for himself or another person,
(b) with intent to obtain any property or an interest in any property, or
(c) with intent to cause disadvantage to the person whom he personates or another person.
Dear CIBC Customer,
As a customer of CIBC, the security of your personal and account information is extremely important to us. By practicing good security habits, you can help us to ensure that your private information is protected.Our new security system will help you to avoid frequently fraud transactions and to keep your investments in safety.
Due to technical update we recommend you to update your banking information of your account to update your account information we are asking you to provide CIBC all the information requested in the form, otherwise we will not be able to verify your identity and your CIBC Account's Access will be denied, you might update your records following the next link below:
We appreciate your business. Its truly our pleasure to serve you.
Sincerely Canadian Imperial Bank of Commerce.
Public Advisory:Beware Internet E-mail Fraud
The Ministry of Transportation has recently learned that a fraudulent e-mail is being sent to members of the public. It contains a link to a web page which looks similar to the Ministry of Transportation website. It states that the ministry is updating its licence database system and requests that the recipient confirm driver license information such as name, address and driver's license number.
Do not comply with this fraudulent request. This email was not sent by the Ministry of Transportation.
We are investigating this situation. The police have been notified. Do not, under any circumstances, respond to this e-mail. If you receive further e-mails from the same source, or anyone you know receives a similar e-mail, please notify the Licensing Administration Office at email@example.com and attach the suspect e-mail to your correspondence.
To safeguard your security we recommend prudence when communicating personal information in e-mail or online. The Internet is not always a secure communications vehicle.
The Government of Ontario is committed to privacy protection. The safety and integrity of personal information are top priorities. Ontario's e-government services are built on secure technologies and processes to ensure privacy.
We do not tolerate any misuse of your personal information
Ministry of Transportation of Ontario
Malicious security breaking program disguised as something benign
Example: downloading a music or movie file
erased disks, credit card numbers and passwords sent to strangers, computers hijacked
(a) to deprive, temporarily or absolutely, the owner of it or a person who has a special property or interest in it, of the thing or of his property or interest in it.
(d) to deal with it in such a manner that it cannot be restored in the condition in which it was at the time it was taken or converted.
(a) obtains, directly or indirectly, any computer service,
(b) by means of an electro-magnetic, acoustic, mechanical or other device, intercepts or causes to be intercepted, directly or indirectly, any function of a computer system,
(c) uses or causes to be used, directly or indirectly, a computer system with intent to commit an offence under paragraph (a) or (b) or an offence under section 430 in relation to data or a computer system, or
(d) uses, possesses, traffics in or permits another person to have access to a computer password that would enable a person to commit an offence under paragraph (a), (b) or (c)
(a) destroys or alters data;
(b) renders data meaningless, useless, or ineffective
(c) obstructs, interrupts or interferes with the lawful use of data