Preventing Cyberbullying & Safety from Online Predators
Bullying vs. Cyberbullying
At school or in public only
You know the bully
Small group of participants
Continues at home
From a distance
Can be anonymous
What is Cyberbullying?
The use of electronic communication to harass, threaten
Difficult to track and difficult to stop.
Can include threats, insults, racial slurs, LGBTQ shaming,
unauthorized access (hacking), disruption or denial of
Why do you think
cyberbullying might be worse
What are some examples of
that you use?
Types of Cyberbullying
Flaming & Harassment
Flaming online fights with angry and
HARASSMENT repeated offensive, rude or
Denigration & Impersonation
Denigrationspreading cruel gossip or
rumors, turning real people into memes
Impersonation “catfishing” or hacking
to pretend to be someone else
Outing/Trickery & Exclusion
Outing/Trickerysharing a secret or
tricking someone into sharing a secret
Exclusion intentionally excluding
someone from an online group
Any repeated online activity that makes
someone feel unsafe. Such as crossing
platforms, contacting from multiple accounts,
circumventing blocks, ignoring requests to
cease communication, etc.
Can you give some examples
of the different types of
Why do we cyberbully?
If you have participated in the
past, what are the reasons you
may have cyberbullied?
Impact of Cyberbullying
Lower quality of life
How has cyberbullying
impacted your life or the lives
of your friends?
What can YOU do?
Teachers and parents aren’t enough.
You are the only one that can make a
We need one another, we are part of a
Target of Cyberbullying
1. Tell them to stop.
2. Ignore, block or delete.
3. Save evidence.
4. Seek support from friends and family.
5. Contact parents, school or police.
Witness to Cyberbullying
1. Be courageous
2. Be supportive
3. Be a leader
“In the End, we will remember not the
words of our enemies, but the silence of
Martin Luther King, Jr.
Cyberbullying is a crime, you can go to jail for it.
Suicide is permanent.
School is temporary.
What kind of community do you want to create?
What kind of community do you deserve to live in?
Safety from Online Predators
Protect your information
Monitor your friends list
Assume every stranger is not who they claim to be
Confirm communication by voice
Protect Your Information
First name only public profiles
Region only public profiles
Avoid unique identifiers public posts
Understand privacy settings
No public posts tied to private information
Give some examples of public,
public and private, and private
Monitor Your Friends List
Never assume you know someone.
Mutual friends aren’t proof.
If you aren’t sure, don’t add.
You Can Be Anyone You Want Online
So can they.
Confirm Communication by Voice
Hackers can gain access to your friends accounts.
Don’t trust any purely online message for
meetings, appointments, personal information or