Close Menu
The Village Reporter
  • Home
  • Subscribe
  • Current Edition
  • Store Locations
  • Photo Albums
  • Rate Card
  • Classifieds
  • Contact Us
Facebook X (Twitter) Instagram
Thursday, April 16
Facebook X (Twitter) Instagram YouTube TikTok
Login
The Village Reporter
  • Home
  • Subscribe
  • Current Edition
  • Store Locations
  • Photo Albums
  • Rate Card
  • Classifieds
  • Contact Us
The Village Reporter
Home»News»Rick Mann Informs Wauseon Truth In Cyber Security
News

Rick Mann Informs Wauseon Truth In Cyber Security

By Newspaper StaffApril 19, 2015Updated:November 30, 2016No Comments4 Mins Read
Share Facebook Twitter Email Copy Link

by Jake Weber: The Village Reporter

(April 14th, 2015): WAUSEON — As Wauseon’s High School auditorium began to fill Tuesday morning, Rick Mann observed the mob of students and faculty from the spotlit stage. Mann, an Ohio State alumni with degrees in both education and law, has served as Legal Counsel for school administrators for many years; publicly speaking to students and teachers failed to instill any pressure in his calm and collective ambience. 

After a warm and welcoming applause, Mr. Mann bluntly began his presentation with no informative introduction. Mann instilled his intentions with the audience: to openly educate the repercussions of abusing the internet and its infinite services. 

For the first time in history, what you do in the cyber world is permanent, it never goes away. Data and information can be retrieved in 10 to 15 years; security experts can recreate every keystroke of a device’s lifespan from the time you turn it on. There is a myth in privacy, nothing is private. Though you can make it harder for someone to get into your stuff, you can’t fully prevent it. Mann described a recent report in which a man in Columbus was arrested when authorities discovered nearly 40 computers lined up calculating algorithms to gain access to private accounts online. One bad mistake can haunt you for years to come; effects are already staggering in numbers. 

Cyber cheating is becoming more accessible to students every year. Mann estimates statistically that nearly 75% of students have cheated at least once, 15% routinely, and 20% constantly. Nearly one out of every three students confessed to cheating due to pressure. Mann pointed out that citing a source in a piece of work is not cheating. Even in the professional world employers will fire employees for lying on resumes and interviews. 

Cyber bullying continues to be more rampant despite extended measures to monitor and prevent online bullying. The most troublesome aspect of cyber bullying is the sheer number of different ways it can happen. The creation of crush sites has redefined the term “crush”: by expressing thoughts and opinions anonymously, most people find themselves with crushed spirits. Mann recommends to respond collectively and stop the bully in one’s culture and community. Those who wish to stop the bullying need to put an end to the bullying itself; the individuals to tend to bully don’t usually tend to engage in debate. A bully’s primary source of victimization tends to be singling out individuals for being different. Mann encourages using the bully’s recognition of individuality as a compliment and standing up for one’s self. Refusing to give a bully the satisfaction in knowing that they may be causing harm is crucial. Mann also recommends students to console in a trustworthy, faithful person physically not via computer. 

Mann explained the definition of free speech as outlined in the First Amendment to the U.S. Constitution. The notion of having freedom of speech is falsely associated with the presumption that one may say anything to any one at any time; however, the First Amendment actually means that the government cannot censor or control the content of one’s speech unless it creates a threat to society. Because defining a threat is so difficult under the current laws, the U.S. Supreme Court is in the process of determining and outlining the definition of a threat in the online world. 

The final segment of Mann’s presentation consisted of giving detailed examples of sexting, context of joking online, and the repercussions of making fatal mistakes that many young people see as irrelevant to themselves. Mann’s speech was an inspirational, edgy piece that deals with a bitter truth many find hard to swallow. 

More detailed information on Rick Mann and the topics he covered can be found at www.rick.mann-cyber-counsel.com

Previous ArticleStryker Village Council Proposes Reallocation Measure
Next Article Pettisville Loses To Holgate In Eight

Related Posts

Pioneer Mayor Addresses Fire Department Departures, Assures Residents Of Continued Protection

April 16, 2026 News

Gideon Banfield Brings “Algorithms In Archbold” Speedcubing Competition To Fulton County

April 15, 2026 News

Seasons Coffee & Bistro In Bryan Set To Close April 25

April 15, 2026 News

MONTPELIER VILLAGE COUNCIL: Council Clears Path For Port Authority Housing Project

April 15, 2026 News

Comments are closed.

Subscription Account
  • Login
Local Sponsor
Short Funeral Home

New Feature

Who Made Local News This Week?

Select an edition to view names

BROWSE EDITIONS
Facebook X (Twitter) Instagram
  • Opt-out preferences
  • Privacy Statement
  • Disclaimer
© 2026 The Village Reporter. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?