Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. A Team Approach for Parents and Teachers
  2. 2. <ul><li>Cyber-bullying is &quot;the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others&quot;. ( </li></ul><ul><li>Cyber-bullying has been defined as &quot;when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person&quot;. (National Crime Prevention Council) </li></ul>
  3. 3. <ul><li>Flaming . Angry, rude arguments. </li></ul><ul><li>Harassment . Repeatedly sending offensive messages. </li></ul><ul><li>Denigration. “Dissing” someone online by spreading rumors or posting false information. </li></ul><ul><li>Outing and trickery. Disseminating intimate private information or tricking someone into disclosing private information, which is then disseminated.• Impersonation. </li></ul><ul><li>Posing. Pretending to be someone else and posting material to damage that person’s reputation. </li></ul><ul><li>Exclusion. Intentionally excluding someone from an online group.• </li></ul><ul><li>Cyberstalking. Creating fear by sending offensive messages and engaging in threatening activity. </li></ul><ul><li>(from </li></ul>
  4. 4. <ul><li>Instant Messaging/Text Messaging Harassment - just joking or ganging up? </li></ul><ul><li>Stealing passwords - changing profiles or settings, using/abusing accounts </li></ul><ul><li>Blogs- posting mean, private or false information </li></ul><ul><li>Web sites- creating sites to specifically attack others </li></ul><ul><li>Sending Pictures through E-mail and Cell Phones - privacy issues and viral forwarding </li></ul><ul><li>Internet Polling- who’s hot, who’s not? </li></ul><ul><li>Interactive Gaming- abuse of chat features </li></ul><ul><li>Sending Porn and Other Junk E-Mail and Ims- false sign-ups </li></ul><ul><li>Sending Malicious Code- viruses, spyware, hacking programs </li></ul><ul><li>Impersonation/Posing- malicious intent to shame or hurt (from </li></ul>
  5. 5. <ul><li>Students have a limited expectation for privacy when using a school or district’s Internet system. </li></ul><ul><li>Parents of students who have been cyberbullying targets can turn to civil law for assistance with recovering financial damages for injuries or required actions. Extremely harmful online speech can violate criminal laws. </li></ul>
  6. 6. <ul><li>Schools have limited ability to discipline students for cyberbullying behaviors initiated off-campus </li></ul><ul><ul><li>Tinker Standard : A student’s First Amendment right to free speech can be overruled when the off-campus, online harmful speech causes or threatens to cause a significant disruption in school activities or with the rights of all students to be provided with a safe and secure environment. </li></ul></ul>
  7. 7. <ul><li>Children’s Internet Protection Act (CIPA): any school district receiving E-Rate funding must filter Internet access and have a policy addressing Internet safety (adopted 2000- pre Web 2.0) </li></ul><ul><li>Protecting Children in the 21 st Century (Title II of the Broadband Data Improvement Act- 2008) Requires schools as part of Internet safety policies to educate minors about appropriate online behavior (includes social networking sites, chat rooms and cyberbullying awareness) </li></ul>
  8. 8. <ul><li>At what point does student off-campus, online activity in the form of cyberbullying rest under the right to free speech or when does it become an issue requiring school intervention and punishable under school disciplinary procedures? </li></ul><ul><ul><li>The Tinker Standard requires that a “substantial disruption” be present or threatened </li></ul></ul><ul><ul><li>When schools attempt to punish students for off-campus conduct this is an area often seen as outside of their jurisdiction. </li></ul></ul>
  9. 9. <ul><li>Two cases both dealing with student off-campus, online creations of insulting parody profiles of school administrators (3 rd Circuit Court of Appeals, June 13, 2011); </li></ul><ul><li>The Tinker Standard was used to confirm that the school’s disciplining of students violated First Amendment rights to free speech; </li></ul><ul><li>A dissenting opinion in one of the above cases voiced that a substantial disruption could have been forecasted. </li></ul>
  10. 10. <ul><li>Parents can partner with schools to educate students about cyberbullying and appropriate online behaviors </li></ul><ul><li>Keep online socializing to a minimum- choose sites where chat is pre-scripted or pre-screened for younger students </li></ul><ul><li>Explain the basics of correct cyber behavior </li></ul><ul><li>Tell your children not to share passwords </li></ul><ul><li>Code of Conduct and establish consequences for bullying behaviors </li></ul>
  11. 11. <ul><li>Know and understand school and district policies, including state legislation </li></ul><ul><li>Educate about cyberbullying </li></ul><ul><li>Provide clear guidelines for use of online resources for educational purposes </li></ul><ul><li>Partner with families to discuss concerns about potential cyberbullying situations and when to contact law enforcement if necessary </li></ul><ul><li>Recognize and teach that cyberbullying is a form of bullying </li></ul>
  12. 12. <ul><li>Make sure children know not to retaliate and to tell an adult </li></ul><ul><li>Save evidence as possible </li></ul><ul><li>Seek to identify the cyberbully or bully group and ask your ISP for help </li></ul><ul><li>Choose your level of response: </li></ul><ul><ul><li>Speak up and tell the cyberbully to stop </li></ul></ul><ul><ul><li>Ignore and block communications or leave a site </li></ul></ul><ul><ul><li>Make contact with parents of the cyberbully </li></ul></ul><ul><ul><li>Work with the school for assistance </li></ul></ul><ul><ul><li>Contact an attorney </li></ul></ul><ul><ul><li>Contact the police for extreme threats </li></ul></ul><ul><ul><li> </li></ul></ul>
  13. 13. <ul><li>Know where students go online and visit online communities to discuss the values shown by members </li></ul><ul><li>Teach children Internet safety and etiquette </li></ul><ul><li>Look for warning signs (withrawal, sadness, anger, grades) </li></ul><ul><li>Discuss the school’s comprehensive AUP with students in school and at home </li></ul><ul><li>Help students to be “upstanders’ not bystanders and to speak out when they observe cyberbullying. </li></ul>
  14. 14. <ul><li>Before the middle school grades, the most common forms of cyberbullying include: </li></ul><ul><ul><li>Unauthorized use of passwords </li></ul></ul><ul><ul><li>Use of hacking codes to enter private accounts at online game or community sites </li></ul></ul><ul><ul><li>Exclusion- not “friending” in online communities </li></ul></ul><ul><li>Before the middle school grades, bullying is an issue that is discussed extensively and provides a context within which to discuss the above aspects, and broader concerns, of cyberbullying. </li></ul>
  15. 15. <ul><li>The Cyberbullying Research Center also did a series of surveys that found these cyber bullying statistics: </li></ul><ul><li>Over 80 percent of teens use a cell phone regularly, making it the most popular form of technology and a common medium for cyber bullying </li></ul><ul><li>About half of young people have experienced some form of cyber bullying, and 10 to 20 percent experience it regularly </li></ul><ul><li>Mean, hurtful comments and spreading rumors are the most common type of cyber bullying </li></ul><ul><li>Girls are at least as likely as boys to be cyber bullies or their victims </li></ul><ul><li>Boys are more likely to be threatened by cyber bullies than girls </li></ul><ul><li>Cyber bullying affects all races </li></ul><ul><li>Cyber bullying victims are more likely to have low self esteem and to consider suicide </li></ul><ul><li>From: </li></ul>
  16. 16. <ul><li>Please visit: </li></ul><ul><li> / </li></ul><ul><li>for web resources to support your conversations with children about cyberbullying, and for additional information about state legislation, legal and policy issues, tips for parents and teachers, as well as recommended online sites for students in Grades 2-5. </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.