SlideShare a Scribd company logo
CYBER-BULLYING
CYBER-BULLYING

Cyber-bullying means using computers, cell
phones, and other technology to hurt, scare,
        or embarrass other people.


          It is illegal!
CYBER-BULLYING


Being mean is being mean, no matter how
you do it. Don’t ask if it’s funny. Ask if it will
         make someone unhappy.
CYBER-BULLYING



Never post anything on the Internet
or send something electronically
that you don’t want the world to
see.
CYBER-BULLYING

 Never send an e-mail, IM, text message in
  anger

 Remember that you are not anonymous

 You never know what is going on in
  someone else’s life. Try to put yourself in
  their shoes before you answer inappropriate
  messages. Think first, type second.
YOU ARE NOT ANONYMOUS
                   67.128.54.206
 Internet Protocol Address. Like a telephone
  number. You cannot access the Internet
  without one. 67.128.54.206
 The ISP that owns an IP address is located
  through Internet directories.
 To find out the user, the date and time of the
  Internet message is needed; then legal process
  is sent to the ISP.
CYBER-BULLYING


Have the courage to speak up if you notice
anyone cyber-bullying. Say that this is
wrong and that you are not going to keep it
a secret.
CYBER-BULLYING
If you get an upsetting message or see
something that is attacking you: Do not
reply. Do not delete. Save the message,
print it if you can and get help from an adult
you trust. If one adult does not help you,
keep asking until you get the help you need.
Responsive Action
Try not to “flip out.”

Determining the scope of the problem.
  Life threatening, immediate risk, someone else in immediate
  risk

If there is a crime call the police:
   Save all printouts. They’re admissible in court and
   corroborate the victim. They also lend some helpful
   clues to identifying the perpetrator.

Time is of the essence.
IT IS ILLEGAL TO:
 Threaten people over the Internet
 Harass or bully anyone
 Use someone else’s ID without
  permission
 Access other people’s computer
  systems without permission
 Send inappropriate photos to other
  kids
Criminal Harassment
•This crime applies to most cyber-bullying
 incidents.
•The conduct must be serious enough that a
 reasonable person would suffer substantial
 emotional distress.
•There must be three events over a period of
 time. In person, over the phone or Internet.
§ 43A. Criminal Harassment.
   (a) Whoever willfully and maliciously engages in a knowing
    pattern of conduct or series of acts over a period of time
    directed at a specific person, which seriously alarms that
    person and would cause a reasonable person to suffer
    substantial emotional distress, shall be guilty of the crime
    of criminal harassment and shall be punished by
    imprisonment in a house of correction for not more than
    two and one–half years or by a fine of not more than
    $1,000, or by both such fine and imprisonment. Such
    conduct or acts described in this paragraph shall include,
    but not be limited to, conduct or acts conducted by mail or
    by use of a telephonic or telecommunication device
    including, but not limited to, electronic mail, internet
    communications or facsimile communications.
§ 43A. Criminal Harassment.
                (cont.)
 (b) Whoever, after having been convicted of the
  crime of criminal harassment, commits a second
  or subsequent crime, or whoever commits the
  crime of criminal harassment having previously
  been convicted of a violation of section 43, shall
  be punished by imprisonment in a house of such
  correction for not more than two and one–half
  years or by imprisonment in the state prison for
  not more than ten years.
 History
 History— 2000, 164, approved Aug 1, 2000,
  effective Oct 30, 2000.
IN CONCLUSION
 DO NOT PARTICIPATE IN CYBER-BULLYING

 REPORT ANY INCIDENTS OF CYBER-
  BULLYING TO A TRUSTED ADULT OR THE
  POLICE
            PLYMOUTH POLICE
             20 Long Pond Road
                 Plymouth, MA
                 Business Line
                (508) 840-4218

More Related Content

Similar to Cyber bullying presentation

Cyber Laws -Nudrat Mufti
Cyber Laws -Nudrat MuftiCyber Laws -Nudrat Mufti
Cyber Laws -Nudrat Mufti
NUDRAT MUFTI
 
Cyber ethics pp power point presentation
Cyber ethics pp power point presentationCyber ethics pp power point presentation
Cyber ethics pp power point presentation
ssuserd2cbf7
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Scott Mills
 
Va laws internet safety
Va laws internet safetyVa laws internet safety
Va laws internet safetyheidirobison
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shivu1234
 
E-Tech_Lesson2.pptx
E-Tech_Lesson2.pptxE-Tech_Lesson2.pptx
E-Tech_Lesson2.pptx
ReyLouieSedigo1
 
Cyber Sexual Violence and Understanding
Cyber Sexual Violence and UnderstandingCyber Sexual Violence and Understanding
Cyber Sexual Violence and Understanding
ssusere22fb9
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
Chris483410
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
Adv Prashant Mali
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
Adv Prashant Mali
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Adv Prashant Mali
 
Cyber crime law in pakistan
Cyber crime law in pakistanCyber crime law in pakistan
Cyber crime law in pakistan
Rozi khan
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
DINESH KAMBLE
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
Aman Bhargava
 
Cyber harassment ppt umt
Cyber harassment ppt umtCyber harassment ppt umt
Cyber harassment ppt umt
Muhammad Ahmad
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
TheMuslimLady
 
IT ACT Sec 66.ppt
IT ACT Sec 66.pptIT ACT Sec 66.ppt
IT ACT Sec 66.ppt
ShantanuBhushanMishr
 

Similar to Cyber bullying presentation (20)

Cyber Laws -Nudrat Mufti
Cyber Laws -Nudrat MuftiCyber Laws -Nudrat Mufti
Cyber Laws -Nudrat Mufti
 
Cyber ethics pp power point presentation
Cyber ethics pp power point presentationCyber ethics pp power point presentation
Cyber ethics pp power point presentation
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
 
Va laws internet safety
Va laws internet safetyVa laws internet safety
Va laws internet safety
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
E-Tech_Lesson2.pptx
E-Tech_Lesson2.pptxE-Tech_Lesson2.pptx
E-Tech_Lesson2.pptx
 
Cyber Sexual Violence and Understanding
Cyber Sexual Violence and UnderstandingCyber Sexual Violence and Understanding
Cyber Sexual Violence and Understanding
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Cyber crime law in pakistan
Cyber crime law in pakistanCyber crime law in pakistan
Cyber crime law in pakistan
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber harassment ppt umt
Cyber harassment ppt umtCyber harassment ppt umt
Cyber harassment ppt umt
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
IT ACT Sec 66.ppt
IT ACT Sec 66.pptIT ACT Sec 66.ppt
IT ACT Sec 66.ppt
 

Recently uploaded

Exploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical CommunicatorsExploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical Communicators
Ben Woelk, CISSP, CPTC
 
Digital Marketing Training In Bangalore
Digital  Marketing Training In BangaloreDigital  Marketing Training In Bangalore
Digital Marketing Training In Bangalore
nidm599
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
andreakaterasco
 
han han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi samahan han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi sama
IrlanMalik
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
pxyhy
 
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
yuhofha
 
一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理
yuhofha
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
larisashrestha558
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
mmorales2173
 
Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptx
Sheldon Byron
 
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
atwvhyhm
 
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaaInteractive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
23211a7274
 
135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering
Manu Mitra
 
New Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdfNew Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdf
Dr. Mary Askew
 
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Dirk Spencer Corporate Recruiter LION
 
134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science
Manu Mitra
 
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
foismail170
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
alexthomas971
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
Pushpendra Kumar
 
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
foismail170
 

Recently uploaded (20)

Exploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical CommunicatorsExploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical Communicators
 
Digital Marketing Training In Bangalore
Digital  Marketing Training In BangaloreDigital  Marketing Training In Bangalore
Digital Marketing Training In Bangalore
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
 
han han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi samahan han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi sama
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
 
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
 
一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
 
Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptx
 
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
 
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaaInteractive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
 
135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering
 
New Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdfNew Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdf
 
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
 
134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science134. Reviewer Certificate in Computer Science
134. Reviewer Certificate in Computer Science
 
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
 
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
 

Cyber bullying presentation

  • 2. CYBER-BULLYING Cyber-bullying means using computers, cell phones, and other technology to hurt, scare, or embarrass other people. It is illegal!
  • 3. CYBER-BULLYING Being mean is being mean, no matter how you do it. Don’t ask if it’s funny. Ask if it will make someone unhappy.
  • 4. CYBER-BULLYING Never post anything on the Internet or send something electronically that you don’t want the world to see.
  • 5. CYBER-BULLYING  Never send an e-mail, IM, text message in anger  Remember that you are not anonymous  You never know what is going on in someone else’s life. Try to put yourself in their shoes before you answer inappropriate messages. Think first, type second.
  • 6. YOU ARE NOT ANONYMOUS 67.128.54.206  Internet Protocol Address. Like a telephone number. You cannot access the Internet without one. 67.128.54.206  The ISP that owns an IP address is located through Internet directories.  To find out the user, the date and time of the Internet message is needed; then legal process is sent to the ISP.
  • 7. CYBER-BULLYING Have the courage to speak up if you notice anyone cyber-bullying. Say that this is wrong and that you are not going to keep it a secret.
  • 8. CYBER-BULLYING If you get an upsetting message or see something that is attacking you: Do not reply. Do not delete. Save the message, print it if you can and get help from an adult you trust. If one adult does not help you, keep asking until you get the help you need.
  • 9. Responsive Action Try not to “flip out.” Determining the scope of the problem. Life threatening, immediate risk, someone else in immediate risk If there is a crime call the police: Save all printouts. They’re admissible in court and corroborate the victim. They also lend some helpful clues to identifying the perpetrator. Time is of the essence.
  • 10. IT IS ILLEGAL TO:  Threaten people over the Internet  Harass or bully anyone  Use someone else’s ID without permission  Access other people’s computer systems without permission  Send inappropriate photos to other kids
  • 11. Criminal Harassment •This crime applies to most cyber-bullying incidents. •The conduct must be serious enough that a reasonable person would suffer substantial emotional distress. •There must be three events over a period of time. In person, over the phone or Internet.
  • 12. § 43A. Criminal Harassment.  (a) Whoever willfully and maliciously engages in a knowing pattern of conduct or series of acts over a period of time directed at a specific person, which seriously alarms that person and would cause a reasonable person to suffer substantial emotional distress, shall be guilty of the crime of criminal harassment and shall be punished by imprisonment in a house of correction for not more than two and one–half years or by a fine of not more than $1,000, or by both such fine and imprisonment. Such conduct or acts described in this paragraph shall include, but not be limited to, conduct or acts conducted by mail or by use of a telephonic or telecommunication device including, but not limited to, electronic mail, internet communications or facsimile communications.
  • 13. § 43A. Criminal Harassment. (cont.)  (b) Whoever, after having been convicted of the crime of criminal harassment, commits a second or subsequent crime, or whoever commits the crime of criminal harassment having previously been convicted of a violation of section 43, shall be punished by imprisonment in a house of such correction for not more than two and one–half years or by imprisonment in the state prison for not more than ten years.  History  History— 2000, 164, approved Aug 1, 2000, effective Oct 30, 2000.
  • 14. IN CONCLUSION  DO NOT PARTICIPATE IN CYBER-BULLYING  REPORT ANY INCIDENTS OF CYBER- BULLYING TO A TRUSTED ADULT OR THE POLICE PLYMOUTH POLICE 20 Long Pond Road Plymouth, MA Business Line (508) 840-4218