Presentation is loading. Please wait.

Presentation is loading. Please wait.

Intentional and repeated use of technology to harass, threaten, embarrass, or target another person.

Similar presentations

Presentation on theme: "Intentional and repeated use of technology to harass, threaten, embarrass, or target another person."— Presentation transcript:


2 Intentional and repeated use of technology to harass, threaten, embarrass, or target another person.

3 Includes the use of:  Email  Cell phones  Text messages  Internet sites to:  threaten  harass  embarrass  socially exclude  damage reputations  damage friendships

4 If you are targeted by a cyberbully:  STOP! Don't do anything. Take 5! to calm down.  Block! Block the cyberbully or limit all communications to those on your buddy list.  Tell! Tell a trusted adult, you don't have to face this alone.  Report cyberbullying to Report cyberbullying to

5  Stop, Block and Tell! (don’t respond to any cyberbullying message, block the person sending it to you and tell a trusted adult)  ThinkB4UClick (check what you are sending before you send it… think about it form the recipient’s point of view)  R-E-S-P-E-C-T! (use good netiquette and respect the feelings of others)  Keep personal information private (the more information someone has about you, the more easily they can bully you)  Google yourself! (conduct frequent searches for your own personal information online and set alerts… to spot cyberbullying early)  Take 5! (walk away from the computer for 5 minutes when something upsets you, so you don’t do something you will later regret)

6  Put down the mouse and step away from the computer.  By not reacting and taking the time to calm down, we can avoid becoming a cyberbully ourselves.  What can YOU do for 5 minutes to help yourself calm down?

7 Think twice before forwarding a :  hurtful e-mail  allowing others to take: videos or cell phone pictures of personal moments or compromising poses of others.

8  All actions have consequences!  Today’s action becomes tomorrow’s habit  Care about others and stand up for what’s right.  If you witness cyberbullying, you can help by supporting the target and letting the bullies know that their behavior is not acceptable.

9  Don't respond. If someone bullies you, remember that your reaction is usually exactly what the bully wants. It gives him or her power over you. Who wants to empower a bully?  Don't retaliate. Getting back at the bully turns you into one and reinforces the bully's behavior. Help avoid a whole cycle of aggression.  Save the evidence. The only good news about digital bullying is that the harassing messages can usually be captured, saved, and shown to someone who can help. You need to do this even if it's minor stuff, in case things escalate.  Talk to a trusted adult. You deserve backup. It's always good to involve a parent but - if you can't - a school counselor usually knows how to help. Sometimes both are needed. If you're really nervous about saying something, see if there's a way to report the incident anonymously at school.  Block the bully. If the harassment's coming in the form of instant messages, texts, or profile comments, do yourself a favor: Use preferences or privacy tools to block the person. If it's in chat, leave the “room.”  Be civil. Even if you don't like someone, it's a good idea to be decent and not sink to the other person's level. Treat people the way you want to be treated.  Don't be a bully. How would you feel if someone harassed you? You know the old saying about walking a mile in someone's shoes; even a few seconds of thinking about how another person might feel can put a big damper on aggression.  Be a friend, not a bystander. Watching or forwarding mean messages empowers bullies and hurts victims even more. If you can, tell bullies to stop or let them know harassment makes people look stupid and mean. It's time to let bullies know their behavior is unacceptable - cruel abuse of fellow human beings. If you can't stop the bully, at least try to help the victim and report the behavior.

10  Always respect others  Think before you send  Block the Bully.  Don’t retaliate or reply  Save the evidence  Make sure you tell  Treat your password like your toothbrush From DCSF guidance on Cyberbullying

11  Never share passwords or log-in information except with a teacher or parent  If harassed you should  tell a trusted adult  leave the harassment location  never respond to harassing messages  save the harassing messages for the ISP or school  report it to the police if necessary  Take a stand against bullying of all kinds! 

12 Bullying should not be tolerated, whether in school or in cyberspace. Trust your uncomfortable feelings—they mean something is wrong. Here is what to do about it.  Sign off the computer.  Leave the chat room or Web site.  Block the bully’s messages.  Save and print the bully’s e-mails or your message logs.  Never reply to a bully.  Talk over how to handle the situation with a friend.  Report your experience to a parent, teacher, or other trusted adult.


14  Students who bully a classmate online can be charged with violating the state’s harassment law and federal telecommunications statute.  Student could be charged with identity theft if they use a classmate’s name to harass the youth or somebody else.  “You can be charged even if your fingers don’t touch the keyboard,”  Students who encourage a friend to send a derogatory e-mail to a youth or post malicious information online about a classmate can be charged as criminal accomplices to the act.

15 Criminal Law Limits The following kinds of speech can lead to arrest & prosecution:  Making threats of violence to people or their property  Engaging in coercion  Making obscene or harassing phone calls  Harassment or stalking  Hate or bias crimes  Creating or sending sexually explicit images of teens  Sexual exploitation  Taking a photo of someone in place where privacy expected


Download ppt "Intentional and repeated use of technology to harass, threaten, embarrass, or target another person."

Similar presentations

Ads by Google