SlideShare a Scribd company logo
Cyber Bullying
                          By
              Abhishek Desai
DIGICorp Information Systems
What is it?
   "Cyberbullying involves the use of information
    and communication technologies such as e-
    mail, cell phone and pager text messages,
    instant messaging, defamatory personal Web
    sites, and defamatory online personal polling
    Web sites, to support deliberate, repeated,
    and hostile behaviour by an individual or
    group, that is intended to harm others." - Bill
    Belsey
What forms does cyber
bullying take?
   Email
   SMS
   MMS
   IM (Instant Messaging)
   Blogs
   Personal websites
   Personal polling sites
Cyber bullying and Law
   Cyber bullying is a CRIMINAL ACT
   It is a CRIME to communicate repeatedly with
    someone if it causes them to fear for their own
    safety or safety of others
   It is also a crime to publish “defamatory libel” –
    writing something which is intended to insult
    someone
   It violates the human rights act.
   Personally I believe it is an act of “COWARDICE”
What can be done?
   Awareness and education
       www.cyberbullying.ca

   You should never send message to others
    when you are angry

   You should never open a message from
    someone you don’t know
What can be done? Contd          ..



   If you encounter something on internet which
    doesn’t feel right don’t open it

   You don’t have to be always on the internet

   Schools should update the Internet and
    computer access policies as soon as possible
If you are a victim…
   DO NOT keep it to yourself, You are not
    ALONE.
   Inform an ADULT you know and trust.
   Inform you Internet Service Provider or
    Mobile service provider
   Inform your LOCAL POLICE
   Do not reply to message from cyber bullies
   Do not erase or delete the message from
    cyber bullies
What kind of information can
be saved?
   Save following from the email
       E-mail address
       Date and time received
       Copies of relevant emails with full email headers

   Save following from chat room
       Date and time of chat
       Name and URL of the chat room
       Nickname of the offending person
       Email address if available
       Screenshot of chat room
Report Cyber bullying Email
   Report cyber bullying email to your ISPs.

   Emails can be traced easily using different
    available software

   If somebody has stolen your account contact
    support team of that mail site.
Report chat room cyber
bullying
   Highlight the chatter’s name
   Use the ignore button to stop all
    conversations
   Take a screen shot of the abuse
   Note the time and date of the chat
   Report to chat room operator or service
    operator
   Speak to parent or a teacher
Its not your fault
   You should know that it is not your fault if bad
    people are there in the world
   You should not be ashamed of telling it to
    adults or teachers
   People are not anonymous on the internet.
    With the right information they can be easily
    traced and punished by local police or
    authorities.
Protect yourself
   Never arrange a meeting with someone you
    don’t know

   If you have to, go with your parents.

   You may need to delete your current email
    accounts, cell phone etc and setup a news
    ones.
Examples of cyber-bullying
   One example of cyber-bullying was the Star Wars kid whose
    classmates uploaded video footage of him posing as the Star
    Wars character Darth Maul onto Kazaa in 2003. The footage was
    downloaded extensively and modified causing the subject
    extensive embarrassment resulting in psychiatric treatment.

   13 year old Vermont boy Ryan Halligan committed suicide, as a
    result of cyber-bullying:
     "Ryan Halligan hanged himself after prolonged bullying at school
       and at home through the Internet. He was repeatedly taunted
       online. Due to the continued bullying, Ryan latched on to the idea
       of killing himself as vengeance against those who had hurt him."
       [6]
Questions?
Thank You

More Related Content

What's hot

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingCoachElrod
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parentsdamarissepulveda
 
My protection plan
My protection planMy protection plan
My protection planShakena12
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaAlexander Berta
 
Cyberstalking
CyberstalkingCyberstalking
CyberstalkingTrevschic
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1sabrinacotta
 
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...Kim Wesson
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingNuraySmat
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
The Hazards Of Cyberbullying
The Hazards Of CyberbullyingThe Hazards Of Cyberbullying
The Hazards Of CyberbullyingIC
 

What's hot (19)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 
My protection plan
My protection planMy protection plan
My protection plan
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Internet safety
Internet safety Internet safety
Internet safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
The Hazards Of Cyberbullying
The Hazards Of CyberbullyingThe Hazards Of Cyberbullying
The Hazards Of Cyberbullying
 

Similar to Abhishek cyber bullying

Similar to Abhishek cyber bullying (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying!!!
Cyberbullying!!! Cyberbullying!!!
Cyberbullying!!!
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Cyberbullying power pot student copy
Cyberbullying  power pot student copyCyberbullying  power pot student copy
Cyberbullying power pot student copy
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying power ppt student copy
Cyberbullying  power ppt  student copyCyberbullying  power ppt  student copy
Cyberbullying power ppt student copy
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 

More from parulata

The philosophy of timetabling
The philosophy of timetablingThe philosophy of timetabling
The philosophy of timetablingparulata
 
School leadership
School leadershipSchool leadership
School leadershipparulata
 
Riverside Eduretreat
Riverside Eduretreat Riverside Eduretreat
Riverside Eduretreat parulata
 
Riverside training program ppt
Riverside training program pptRiverside training program ppt
Riverside training program pptparulata
 
Riverside framework
Riverside frameworkRiverside framework
Riverside frameworkparulata
 
Phonics ( New)
Phonics ( New)Phonics ( New)
Phonics ( New)parulata
 
Multiple Intelligence theory
Multiple Intelligence theory Multiple Intelligence theory
Multiple Intelligence theory parulata
 
Differentiated Instruction
Differentiated InstructionDifferentiated Instruction
Differentiated Instructionparulata
 
Creative classroom workshop
Creative classroom workshopCreative classroom workshop
Creative classroom workshopparulata
 
Classroom mgmt (mod)
Classroom mgmt (mod)Classroom mgmt (mod)
Classroom mgmt (mod)parulata
 
Adult learning model
Adult learning modelAdult learning model
Adult learning modelparulata
 
Interest center final
Interest center finalInterest center final
Interest center finalparulata
 
Funderstanding
FunderstandingFunderstanding
Funderstandingparulata
 
Assembly performances
Assembly performancesAssembly performances
Assembly performancesparulata
 
Adolescence
AdolescenceAdolescence
Adolescenceparulata
 
Teachers poem
Teachers poemTeachers poem
Teachers poemparulata
 
Sciencequiz08ppt
Sciencequiz08pptSciencequiz08ppt
Sciencequiz08pptparulata
 
Yadu computer internals final-2
Yadu  computer internals final-2Yadu  computer internals final-2
Yadu computer internals final-2parulata
 
Yadu computer internals final 1
Yadu  computer internals final 1Yadu  computer internals final 1
Yadu computer internals final 1parulata
 

More from parulata (20)

The philosophy of timetabling
The philosophy of timetablingThe philosophy of timetabling
The philosophy of timetabling
 
School leadership
School leadershipSchool leadership
School leadership
 
Riverside Eduretreat
Riverside Eduretreat Riverside Eduretreat
Riverside Eduretreat
 
Riverside training program ppt
Riverside training program pptRiverside training program ppt
Riverside training program ppt
 
Riverside framework
Riverside frameworkRiverside framework
Riverside framework
 
Planner
PlannerPlanner
Planner
 
Phonics ( New)
Phonics ( New)Phonics ( New)
Phonics ( New)
 
Multiple Intelligence theory
Multiple Intelligence theory Multiple Intelligence theory
Multiple Intelligence theory
 
Differentiated Instruction
Differentiated InstructionDifferentiated Instruction
Differentiated Instruction
 
Creative classroom workshop
Creative classroom workshopCreative classroom workshop
Creative classroom workshop
 
Classroom mgmt (mod)
Classroom mgmt (mod)Classroom mgmt (mod)
Classroom mgmt (mod)
 
Adult learning model
Adult learning modelAdult learning model
Adult learning model
 
Interest center final
Interest center finalInterest center final
Interest center final
 
Funderstanding
FunderstandingFunderstanding
Funderstanding
 
Assembly performances
Assembly performancesAssembly performances
Assembly performances
 
Adolescence
AdolescenceAdolescence
Adolescence
 
Teachers poem
Teachers poemTeachers poem
Teachers poem
 
Sciencequiz08ppt
Sciencequiz08pptSciencequiz08ppt
Sciencequiz08ppt
 
Yadu computer internals final-2
Yadu  computer internals final-2Yadu  computer internals final-2
Yadu computer internals final-2
 
Yadu computer internals final 1
Yadu  computer internals final 1Yadu  computer internals final 1
Yadu computer internals final 1
 

Recently uploaded

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...Sri Ambati
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 

Recently uploaded (20)

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

Abhishek cyber bullying

  • 1. Cyber Bullying By Abhishek Desai DIGICorp Information Systems
  • 2. What is it?  "Cyberbullying involves the use of information and communication technologies such as e- mail, cell phone and pager text messages, instant messaging, defamatory personal Web sites, and defamatory online personal polling Web sites, to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others." - Bill Belsey
  • 3. What forms does cyber bullying take?  Email  SMS  MMS  IM (Instant Messaging)  Blogs  Personal websites  Personal polling sites
  • 4. Cyber bullying and Law  Cyber bullying is a CRIMINAL ACT  It is a CRIME to communicate repeatedly with someone if it causes them to fear for their own safety or safety of others  It is also a crime to publish “defamatory libel” – writing something which is intended to insult someone  It violates the human rights act.  Personally I believe it is an act of “COWARDICE”
  • 5. What can be done?  Awareness and education  www.cyberbullying.ca  You should never send message to others when you are angry  You should never open a message from someone you don’t know
  • 6. What can be done? Contd ..  If you encounter something on internet which doesn’t feel right don’t open it  You don’t have to be always on the internet  Schools should update the Internet and computer access policies as soon as possible
  • 7. If you are a victim…  DO NOT keep it to yourself, You are not ALONE.  Inform an ADULT you know and trust.  Inform you Internet Service Provider or Mobile service provider  Inform your LOCAL POLICE  Do not reply to message from cyber bullies  Do not erase or delete the message from cyber bullies
  • 8. What kind of information can be saved?  Save following from the email  E-mail address  Date and time received  Copies of relevant emails with full email headers  Save following from chat room  Date and time of chat  Name and URL of the chat room  Nickname of the offending person  Email address if available  Screenshot of chat room
  • 9. Report Cyber bullying Email  Report cyber bullying email to your ISPs.  Emails can be traced easily using different available software  If somebody has stolen your account contact support team of that mail site.
  • 10. Report chat room cyber bullying  Highlight the chatter’s name  Use the ignore button to stop all conversations  Take a screen shot of the abuse  Note the time and date of the chat  Report to chat room operator or service operator  Speak to parent or a teacher
  • 11. Its not your fault  You should know that it is not your fault if bad people are there in the world  You should not be ashamed of telling it to adults or teachers  People are not anonymous on the internet. With the right information they can be easily traced and punished by local police or authorities.
  • 12. Protect yourself  Never arrange a meeting with someone you don’t know  If you have to, go with your parents.  You may need to delete your current email accounts, cell phone etc and setup a news ones.
  • 13. Examples of cyber-bullying  One example of cyber-bullying was the Star Wars kid whose classmates uploaded video footage of him posing as the Star Wars character Darth Maul onto Kazaa in 2003. The footage was downloaded extensively and modified causing the subject extensive embarrassment resulting in psychiatric treatment.  13 year old Vermont boy Ryan Halligan committed suicide, as a result of cyber-bullying:  "Ryan Halligan hanged himself after prolonged bullying at school and at home through the Internet. He was repeatedly taunted online. Due to the continued bullying, Ryan latched on to the idea of killing himself as vengeance against those who had hurt him." [6]