21st Century Bullying: Cyber-Bullying A Guide and Tutorial for Parents andEducators on How to Recognize, Prevent, and Address Cyber-Bullying
Cyber Bullying A Statement of Goals Tutorial Goals1.Identify what constitutes cyber-bullying and review some examples.2.Learn Preventative Cyber-Bullying Steps to Take.3.Learn How to Address Cyber-Bullying.
Legal Definition of Cyber-BullyingCalifornia Education Code 48900r: Engaged in an act of bullying. For purposes of this subdivision, the following terms have the following meanings: (1) "Bullying" means any severe or pervasive physical or verbal act or conduct, including communications made in writing or by means of an electronic act, and including one or more acts committed by a pupil or group of pupils as defined in Section 48900.2, 48900.3, or 48900.4, directed toward one or more pupils that has or can be reasonably predicted to have the effect of one or more of the following: (A) Placing a reasonable pupil or pupils in fear of harm to that pupils or those pupils person or property. (B) Causing a reasonable pupil to experience a substantially detrimental effect on his or her physical or mental health. (C) Causing a reasonable pupil to experience substantial interference with his or her academic performance. (D) Causing a reasonable pupil to experience substantial interference with his or her ability to participate in or benefit from the services, activities, or privileges provided by a school. (2) "Electronic act" means the transmission of a communication, including, but not limited to, a message, text, sound, or image, or a post on a social network Internet Web site, by means of an electronic device, including, but not limited to, a telephone, wireless telephone or other wireless communication device, computer, or pager. (3) "Reasonable pupil" means a pupil, including, but not limited to, an exceptional needs pupil, who exercises average care, skill, and judgment in conduct for a person of his or her age, or for a person of his or her age with his or her exceptional needs.
What is Bullying? Physical Bullying is when one person uses threatening physical action or force in order to make another person comply with them, scare them, intimidate them, or harm them.Verbal Bullying is when one person uses verbal communication tointimidate, harm, or threaten another into doing or acting how thebully wants . This would also include verbal retaliation threats withterms such as “snitch, narc, tattle, etc.” that are intended to keep thevictim from speaking out. Gossiping or spreading rumors about another person is also a form of bullying meant to hurt someone else’s feelings, intimidate them, and /or harm them.
Adding Cyber to the BullyingWhen the bullying is communicated or committed through an electronic device or an electronic transmission, it becomes cyber bullying. This would include threats, intimidation, gossip, rumors, or any other verbal or visual actions that are meant to harm another person. Cyber bullying can take place on cell phones, tablets, computers, laptops, etc. Cyber bullying messages can be transmitted via text messages, social media posts, images, pictures, and video.
How do parents and educators prevent Cyber Bullying?Be Active… Be VigilantFor parents, monitor, monitor, and monitoryour child’s use on the internet. Let themknow that you expect computer use to bedone in an open area of the house.For educators, circulate, circulate, and keepcirculating around when students are onthe computer in your classroom or in the computer lab. Give Expectations Both parents and educators need to let kids know that if you would not say something in person to someone, you would not say it to them online in a post or text.
How do parents and educators prevent Cyber Bullying?Utilize computer monitoring softwareParents can purchase or download software that canmonitor what sites children go to, block certain sites asneeded, and provide a way to see what kids are posting.Educators should check with their local IT person to learnwhat is software available at the school site, what is inplace, what its limitations are and how to use it. Set up guidelines at home for social media use Parents should talk to their child about rules for using social media sites. One of the rules should be that parents have the passwords for the child’s site in order to be able to check or access their account. Educators should already have usernames and password lists set up from their IT person for student use at school
How do parents and educators prevent Cyber Bullying?Don’t be afraid toterminate or block access.Parents can always end their child’saccess to a computer, website, orcell phone if the child is notfollowing the expectations laid outor agreed upon. This can be atemporary restraint or a permanentone depending on the situation.Educators can follow suit by makingsure that they informthe parent, administration, and theIT person if a studentviolates the school computer useagreement.
Cyber Bullying has occurred. What do I do now?
Cyber Bullying has occurred. What do I do now?
Cyber Bullying has occurred. First step is determine and identify…In the video we saw, it was a clear case of cyber-bullying and fulfills the legal requirements of Ed Code 48900r.The steps to be taken are as follows:1. An adult is informed by the student/child of the situation/event.2. The adult confirms the good choice of the student in letting him/her know.3. The adult reviews the electronic evidence of the cyber-bullying attack and if possible generates a hard copy.4. The adult meets with the school administrator to review what has happened, who is involved, and what has been done.5. School administrator can help determine if local law enforcement also needs to be contacted.Now what?
Cyber Bullying has occurred. Second step is contact the school…1. The administrator will take the cyber-bullying information and evidence and meet first with the alleged bully.2. The administrator will determine the level of responsibility for the cyber-bullying by the bully and if any other participants are involved.3. The administrator will then contact the parents of the bully and inform them of the situation and schedule a meeting. This is a meeting only between the parent’s of the bully and the administrator. The victim and victim’s parents are not there.
Cyber Bullying has occurred. Third step is resolution…1. Consequences are determined and explained. In this situation a violation of CA EC 48900r carries a consequence of suspension. The amount of days the student is suspended will be determined based on the event and past discipline history, but will be between 1 and 5 days. This is solely a school administration decision.2. Depending on the severity or the frequency of the cyber-bullying, law enforcement may be contacted.3. Any further participants related to this incident will be dealt with. Any record of the cyber- bullying will be removed and/or deleted.4. Counseling and other follow-up services will be suggested/required for the victim and/or the bully.
Cyber Bullying has occurred. Final step is outcome…Reviewing the cycle of bullying, we can see that with our outcome, the victim has stood upfor herself; the bully has been identified and consequenced as well as any other participantsand/or supporters; parents have been informed, made aware, and been involved; the cyber-bullying has been removed or deleted; and follow-up services have been establishedincluding counseling. In this manner the cycle has been broken successfully.This was all accomplished by the adults knowing how to identify cyber-bullying, how toprevent it when possible, and how to address it successfully for both the victim and bully.
Cyber Bullying Assessment (write down answers and turn in to proctor)1) True or False - Bullying is any severe or pervasive physical or verbal act or conduct that is intentionally harmful to another person?2) Which device could be used in a cyber-bullying situation? A) Cell Phone B) Computer C) Laptop D) All of the above3) Which law is cyber-bullying prohibited by? A) EC 48900r B) EC 5519x C) PC 1229 D) PC 3451k4) Where should a parent allow their child to work on a laptop computer? A) At their desk in their room B) At a friend’s house C) In the dining room supervised D) All of the above5) What information should a parent have about their child’s social media site? A) The child’s friend list B) The child’s username and password C) The child’s avatar D) The child’s permission6) Who has the final say on control of a cell phone or computer at home? A) The parent/guardian B) The school C) The Child D) The government7) Who should an educator contact if a student violates the school computer use agreement? A) Another teacher B) School administrator C) School secretary D) No one8) Who should the parent contact if cyber-bullying is suspected? A) Law enforcement B) School psychologist C) School nurse D) School administrator9) True or False - A hard copy of what was stated or posted is strong evidence for a cyber bullying crime?10) Who should the school administrator involve with a suspected bully? A) The suspected bully’s parents B) Law enforcement C) The suspected bully’s teacher D) The school counselor11) True or False – The victim should be praised for standing up for themselves verbally and telling a trusted adult.12) What follow-up should be required for the victim and bully? A) Jail time B) Apologies C) Counseling D) Expulsion