Upcoming Webinar: “Assessing Threats Made with Technology”

October 18, 2013

in News, Other


"Assessing Threats Made with Technology" Webinar

The ACCA, in cooperation with PaperClip Communications, are presenting a webinar Thursday February 12th. Click here to sign up and join host Brian Van Brunt Ed.D. for this event.

Product Summary

A faculty member is in jail after allegedly posting on FacebookTM that he might climb a campus facility with a high-powered rifle “with a good scope.”

A university student faces a felony charge after friends reported he posted a picture of a bomb threat on FacebookTM.

A college student was arrested following the discovery of threats texted to a friend that threatened to harm a faculty member that gave him a “D”.

These are just a few examples of scenarios that colleges have taken notice of in recent years, as more students and faculty use social media to communicate threats to a larger population.

Today’s technology allows an aggressor to share a direct communicated threat via a text message, website, blog or email. A person may share a FacebookTM status update that creates hysteria in school or campus. Another may post a TwitterTM comment that generates a law enforcement response.

Are you fully prepared to manage, address and respond to communicated threats via text, social media, websites or any other source within your campus community?Have you possibly over-reacted to something posted online in the past?

This webinar will walk you through recent case studies of direct communicated threats and offer guidance in terms of BIT, conduct and counseling response.

Each case will serve to illustrate the central premise of the program: rapid detection and intervention of social media and other forms of leakage must be paired with thoughtful, research-based assessment and management to truly mitigate potential threat.

[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]

Previous post:

Next post: