Violent Crimes Awareness
Rogers State University strives to maintain a safe environment for all students and employees. However, violent crimes such as dating violence, date rape, domestic violence, sexual assault, and/or stalking can happen.
Report crimes as soon as possible to:
- Dial 911 in an emergency
- Claremore campus police at 918-343-7624
- Bartlesville campus police at 918-338-8020
- Pryor campus police at 918-825-6034
Resources for location of registered sex offenders:
- Claremore Police Department
- Oklahoma Sex Offender Registry
- National Sex Offender Registry
- The Oklahoma State Courts Network
Dating Violence
What is dating violence? Dating violence is abusive and violent behavior in a dating type relationship. It can be a long term or short term affiliation. It reflects the perpetrator’s desire to control and dominate the victim. It can happen in both heterosexual and homosexual connection. It covers a wide range of behavior that includes verbal, emotional, sexual, and physical violence and abuse.
Incidence of University Dating Violence:
- 32% of university students report dating violence by a previous partner and 21% report violence by their current partner.
- In 39%-54% of dating violence cases victims remain in the physically abusive relationships.
- 60% of acquaintance rapes on university campuses occur in casual or steady dating relationships.
- An estimated 5% of university women experience a completed or attempted rape in a giver year.
- In one year, more than 13% of college women indicated they had been stalked (42% by a boyfriend or ex-boyfriend).
- 51% of university males admit perpetrating one or more sexual assault incidents while attending a university.
Influence of Alcohol and Drugs:
- 75% of men and 55% of women involved in acquaintance rape had been drinking or taking drugs prior to the incident.
Reporting Victimization:
- 50% of dating violence victims will report the violence to someone else: of these, 88% report the violence to a friend and 20% to law enforcement.
- 44% of victims raped by a steady boyfriend or spouse report the assault compared to 77% of victims raped by a stranger.
- The beliefs that dating violence is a private matter or not important enough and fear of reprisal are most reasons given for not reporting the violence.
Source: http://www.ncvc.org
Examples of verbal or emotional abuse: name-calling, threats, screaming, yelling, ridiculing, criticizing,emotional blackmailing, stalking
Examples of sexual abuse: verbal sexual abuse such as sexual slurs or attacks on the victim’s gender or sexual orientation, unwanted sexual touching and kissing, intimidation to force the victim to engage in any kind of sexual activity, rape
Examples of physical abuse: shoving, punching, slapping, pinching, hitting, kicking, hair pulling, choking, use of a weapon, any other acts causing physical harm
Sexual Assault
Sexual assault takes many forms including attacks such as rape or attempted rape, as well as any unwanted sexual contract or threats. Usually a sexual assault occurs when someone touches any part of another person’s body in a sexual way, even through clothes, without that person’s consent.
Types of sexual acts which fall under the category of sexual assault include: forced sexual intercourse (rape), sodomy (oral or anal sexual acts), child molestation, incest, fondling, attempted rape
Sexual assault in any form is often a devastating crime. Assailants can be strangers, acquaintances, friends, or family members. Assailants commit sexual assault by way of violence, threats, coercion, manipulation, pressure or tricks. Whatever the circumstances, no one asks or deserves to be sexually assaulted.
What to do if you are sexually assaulted:
- If you are sexually assaulted on any RSU Campuses contact the RSU Police Department at 918-343-7624.
- If the assault happens off campus contact the local law enforcement agencies.
- Reporting the crime as a victim is not required by law, but it is highly recommended to prevent future attacks by the perpetrator.
- Remember to seek medical attention as soon as possible. In Northeastern Oklahoma all rape exams are administrated at the Hillcrest Hospital in Tulsa. The medical treatment is free of charge. Do not shower, eat, or smoke as these actions can destroy evidence of the attack.
- Safeline is an organization which provides a 24 hour hotline to victims of domestic abuse, rape, or forcible sodomy. As a victim you have certain rights. There number is 800-522-7233. Their hotline is staffed with trained crisis counselors that can help.
Identity Crime
A growing global problem, identity crime is the illegal use of another’s personal information, such as credit card numbers, Social Security number, or driver’s license number, to commit fraud or other crimes. This crime can devastate the victim’s credit for years. Identity crime knows no boundaries; victims and criminals can be on opposite sides of the world, making it difficult for local law enforcement agencies to investigate the crime, catch the perpetrator, or help the victim.
- How Thieves Get Your Information
- Identity Crime Consumer IQ Test
- Protect Your Personal Information
- Share Your Personal Information Prudently
- Eliminate Paper
- Secure Your Computer
- Secure Your E-mail
- Review Your Financial Activities
It is quite easy for criminals to get the personal information they need. They do not need to be computer savvy or break into homes or offices. A criminal can simply "shoulder surf" - watching a victim enter a calling or credit card number into a phone keypad or eavesdropping while the victim slowly reads a credit card number aloud while making a hotel or car rental reservation. The simplest type of identity crime is the theft of a credit card or a credit card number. The perpetrator uses the card to purchase items.
If a criminal gathers enough personal information, he or she may apply for new loans and credit cards, sometimes even purchasing big-ticket items like cars and houses. Criminals get away with this by having bills and statements sent to an address that does not belong to the victim, keeping the victim in the dark.
Sometimes criminals scrounge through garbage cans or dumpsters to get copies of checks, credit card or bank statements, discarded applications for pre-approved credit cards, and other records. Criminals may steal outgoing mail from home mailboxes, hoping to find credit card payments and checks.
Criminals use the internet and e-mail to obtain personal data, including banking information and passwords. Victims unwittingly respond to phishing e-mails that ask for identifying data like account numbers and pass codes.
Test your knowledge of identity crime by answering the following questions. Answers are given below.
- True or False. Identity fraud is the fastest-growing white-collar crime in America today.
a. True
b. False
2. What is the average amount of money stolen from a victim of identity fraud?
a. More than $5,000
b. $1,000 to $5,000
c. $501 to $1,000
d. $1 to $500
e. $0
3. Which age group has the highest rate of identity fraud?
a. 25 to 34
b. 35 to 54
c. 55 to 64
d. 65 plus
4. True or False. Internet usage can increase your chances of being a victim of identity fraud.
a. True
b. False
5. If you are a victim of identity fraud, to whom should you report the incidence?
a. Your local law enforcement
b. The Federal Trade Commission
c. Credit reporting agencies
d. Your financial institution(s)
e. All of the Above
Answers: 1, b. False; 2, e. $0 (more than 2/3 ID theft victims don’t lose money); 3, a. 25-34; 4, b. False; 5, e. All of the Above.
Data compiled from the Better Business Bureau, Federal Trade Commission and Javelin Strategy & Research.
Protecting yourself from identity crime starts with controlling and protecting your personal information. Your personal information can be found on mail, credit cards, identification, and other documents. Identity thieves steal information a number ways. Keep anything with personal or account information in a safe, secure place. Do not leave personal information in your car.
Cards & IDs
- Carry only necessary identification with you.
- Do not carry your Social Security card.
- Treat your credit cards and check (debit) cards like cash.
- Do not carry any personal identification numbers (PINs). Memorize them.
Paper copies & mail
- Make copies of all of the financial information that you carry with you daily and store the copies in a safe place.
Electronic data
- Retrieve incoming mail from your mailbox quickly, and do not leave outgoing mail, like bill payments with checks, in an unsecured mailbox or any other location.
Be cautious
- If you can not verify the identity of the person or business asking for your personal information, be very cautious about the transaction.
- If you do not understand why a certain piece of information is needed, think twice about the transaction.
- Be cautious of telephone and door-to-door solicitations.
Be skeptical
- Never provide personal or financial information unless you initiated the contact and you have confirmed the business or person's identity.
- Be skeptical of offers that seem "too good to be true." They usually are.
Be suspicious
- Provide sensitive personal information like Social Security Number or account numbers only to people or businesses you trust, and who have legitimate reasons to ask for it.
- Be very suspicious of e-mails requesting your personal information for "account verification" or other reasons. Almost no legitimate companies do this. Never click on a link within such an e-mail; if you want to go to a site, type the Web address into your Web browser yourself.
Reduce the amount of mail you receive that displays personal information by:
- Not receiving account statements in the mail. Many financial institutions offer electronic delivery of statements and many companies will send your bill electronically as well. Check with your financial institution for details.
- Paying bills online also eliminates the security risk of mailing paper checks.
- Not having canceled checks mailed to you. Many financial institutions allow you to view canceled checks online.
- Signing up for direct deposit to have your paychecks, dividends, tax refunds, and other deposits sent directly to your account without the need for a paper check.
- Opting out of pre-approved credit card offers by calling 1-888-567-8688. This will communicate your preference to all three of the major credit bureaus.
Shred financial documents, including credit card and other financial solicitations, before recycling them or throwing them away.
Software & applications
- Install anti-spyware, anti-virus, and a personal firewall on your computer. Update them regularly, especially virus and spyware definitions. Either schedule regular anti-virus and anti-spyware scans or make it a habit to do it manually.
- Update your operating system and browser regularly. Their makers identify potential security problems and issue "patches" to fix them.
Passwords & logins
- Choose pass codes and personal identification numbers (PINs) that are difficult for others to guess. If possible, use lowercase and capital letters, numbers, and symbols and change them often.
- Use a different pass code for each of your online accounts.
- Always log off from online sessions with your banking or bill payment provider or other sites where you interact with personal information.
Consistent monitoring
- Monitor your online accounts regularly.
- Be vigilant and suspicious in your online activities. Remember that forging e-mail and creating fraudulent websites is easy to do. If you are at all suspicious, leave the site immediately.
Be careful and selective before providing your e-mail address to a questionable website. Sharing your e-mail address makes you more likely to receive fraudulent emails.
Know who before you click
- If you receive a suspicious e-mail, do not reply or click on any link it provides. Simply delete it.
- Do not click on links in e-mails, even if you think the e-mail request might be legitimate. Carefully type the Web address yourself directly into your browser.
- Open e-mail attachments only if you know the sender. If the e-mail has been forwarded from someone you know (it says "FW:" in the Subject), treat it as suspicious as you would something from a total stranger—your friend's computer might have been "hijacked" to send out fraudulent e-mails.
If you already clicked
- If you think you might have provided personal or account information in response to a fraudulent e-mail or Web site, report the fraud immediately to the institution. Log on by typing the Web address (URL) into your browser and change your pass codes immediately.
Suspicious files & viruses
- A lot of spyware or other dangerous programs are spread by e-mail as file attachments so pay special attention to e-mail file attachments.
- Scan e-mail attachments with your anti-virus software before opening them.
- Watch filename extensions. Never open e-mail attachments that have file endings of .exe, .pif, or .vbs. These are executable files and are dangerous.
- Any file that appears to have a double extension, like "heythere.doc.pif" is likely to be a dangerous file and should never be opened.
It seems simple, but an easy way to detect fraudulent activity is to check your account statements to be sure that all the transactions are legitimate.
Check any mail from credit card companies to see if they contain statements from cards in your name that you did not apply for yourself. Know when your credit card and bank statements arrive in the mail and be alert if one or more stop showing up in your mailbox - this could mean your account has been taken over and diverted elsewhere.
You should review your credit report at least annually to make sure there is no unauthorized activity. Federal law requires the major nationwide consumer reporting companies (Equifax, Experian, and TransUnion) to give you a free copy of your credit report once a year if you ask for it.
Order free credit report:
- Visit www.AnnualCreditReport.com or
- Call 1-877-322-8228
- Write to Annual Credit Report Request Service, P.O. Box 105281, Atlanta, GA 30348-5281
This information is sponsored by ID Safety.net in partnership with the International Association of Chiefs of Police and Bank of America.
Your Rights
As a victim of violent crime, you have certain rights:
- To be notified that a court proceeding to which a victim or witness has been subpoenaed will or will not go on as scheduled, in order to save the person an unnecessary trip to court.
- To receive protection from harm and threats of harm arising out of the cooperation of the person with law enforcement and prosecution efforts, and to be provided with information as to the level of protection available and how to access protection.
- To be informed of financial assistance and other social services available as a result of being a witness or a crime victim, including information on how to apply.
- To be informed of procedure to be followed in order to apply for and receive any witness fee to which the victim or witness is entitled.
- To be informed of the procedure to be followed in order to apply for and receive any restitution to which the victim is entitled.
- To be provided, whenever possible, a secure waiting area during court proceedings.
- To have any stolen or other personal property expeditiously returned by law enforcement agencies when no longer needed as evidence.
- To be provided with appropriate employer intercession services to ensure that employers of the victims and witnesses will cooperate with the criminal justice process in order to minimize the loss and other benefits of the employee resulting from court appearances.
- To have all family members of all homicide victims afforded the services under this section, whether or not the person is to be a witness to any criminal proceedings.
- To be informed of any plea bargaining negotiations.
- To have victim impact statements filed with the judgment and sentences.
- To be informed it a sentence is overturned, remanded for a new trial or otherwise modified by the Oklahoma Court of Criminal Appeals.
- To be informed in writing of all statutory rights.
- To be informed when any family member is required to be a witness by subpoena from the defense, there must be a showing that the witness can provided relevant testimony as to the guilt or innocence of the defendant before the witness may be excluded from the proceeding by invoking the rule to remove potential witnesses.
- To be notified by the Pardon and Parole Board of Pardon and Parole actions if you request notification.
- To be informed of felony cases involving violent crime or sex offenses when pre-trial proceedings may substantially delay prosecutions.
- To protect the identity of the victim in sexual assault cases.
- To request that the offender be tested for sexually transmitted diseases in sexually assault cases as ordered by the court.
- To be informed that any sentence, including Life Without Parole, may be commuted.
- To receive written notification of how to access victim rights information from the interviewing officer or investigating detective.
- To a speedy disposition of the charges free from unwarranted delay caused by or at the behest of the defendant or minor.
This includes rape, acquaintance rape, domestic abuse, and sexual harassment. Prompt reporting will ensure preservation of evidence and appropriate medical treatment. Please visit www.ok.gov/dac for more information about your rights or RSUPD has pamphlets available from the Oklahoma District Attorneys Council.
For additional information about sexual assaults, victims can contact Safeline for Toll-free information at 1-800-522-7233.
Rogers County District Attorney’s Office
219 S. Missouri
Claremore, OK 74017
918-341-3164