SlideShare a Scribd company logo
An Analysis
on CYBERBULLYING
& DIGITAL ABUSE
in Bangladesh
Cyberbullying & Digital Abuse is a type of bullying that occurs through technology such as texting
and social networking to bully, harass, stalk or intimidate a partner. Often this behavior is a form
of verbal or emotional abuse perpetrated online.
Cyberbullying & Digital Abuse
 Cyberbullying is often anonymous, and aims to destroy
and psychologically humiliate the victim.
 Cyberbullying can affect the victim’s academic
performance.
 Being bullied can increase a person’s risk of
depression, drug or alcohol abuse, risky sexual
behavior, and suicidal thoughts. The risk is even higher
in young people.
Cyberbullying Law in Bangladesh
Though at first cyberbullying was officially not considered as a crime, at present cyber bullying is not just an act to
be scorned upon but is an offence punishable under the Information and Communication Technology (ICT) Act 2006
in Bangladesh. The Act inter alia provides that a person who deliberately publishes, in a website or in electronic
form, any material which is fake and obscene or has the effect of corrupting persons who are likely to read, see or
hear the material or causes to prejudice the image of a person or may hurt religious belief or instigate against any
person, then the person publishing the material will be guilty of an offence under the Act. The punishment for such
an offence is imprisonment and fine.
The laws which can be availed by victims of cyber harassment in Bangladesh include
 the Information and Communication Technology Act, 2006 (ICT Act)
 the Pornography Control Act, 2012 (PC Act)
 and the Digital Security Act, 2018 (DS Act)
 Section 63 of the ICT Act ensures punishment for disclosure of confidentiality and privacy with imprisonment or
with a fine or both.
 Section 24 of the DS Act penalizes identity fraud and provides sanctions for it whereas section 25 protects a
person from the transmission or publication of offensive, false or threatening information regarding them
through any digital medium.
 Section 29 of the DS Act protects a victim against defamation. Finally, section 8 of the PC Act has made the
possession, distribution or use of any sort of pornographic material illegal.
Present Scenario of Cyberbullying in Bangladesh
 Almost 49% of students have reported being victims of cyberbullying.
 A study has concluded that 49.5% of Bangladeshi teenagers had been victims of cyberbullying
until 2016.
 The study indicates that 61% of students in Bangladesh send explicit
messages online, which is known as “sexting.”
 Around 38% of students expressed positive opinions about consulting
with their parents.
 32% kids at risk of cyberbullying in Bangladesh: UNICEF
 80% of cyberbullying victims are women.
8.3
8.3
37.5
41.7
4.2
Most devices used by Students
Computer
Ipad or Tablet
Cellphone
Cellphone with camera
Digital Camera
19
9.5
0
33.3
4.8
33.3
If Cyberbullied, who tried to help?
Parents
Siblings
Teachers
Friends
Nobody
Never Cyberbullyed
Present Scenario of Cyberbullying in Bangladesh
Effect of Cyberbullying & digital abuse
The changes might not be readily apparent at first, but as time goes on, you may notice one or
more of the following behavioral changes that can be strong indicators of cyberbullying.
 A drop in social behavior — avoiding friends or social events
 Isolating his or herself in their room more than usual
 Finding it hard to concentrate on schoolwork
 Grades dropping
 Losing interest in activities that they normally enjoy
 Skipping school or expressing a desire to skip school
 Appearing angry when looking at their phone, tablet, or computer
 Hiding their phone or computer screen from view
 Using drugs or alcohol
 Expressing dark thoughts or emotions
 Talking about suicide
Steps taken to prevent Cyberbullying in Bangladesh
 The Bangladeshi government has taken some actions to stop cyberbullying. Firstly, the
government passed a new ICT act in 2006; now, victims can take legal steps against assailants
under these acts.
 Additionally, the government and non-government organizations hold awareness seminars,
programs, and dramas to create social awareness regarding cyberbullying.
 Bangladesh tries to control and guide the network media, formulate relevant laws and
regulations, and strengthen the legal system.
 However, the Bangladeshi government should establish the principle of network access and
control the advertising and information issued by the company to prevent the harm of false
information to the people.
What can parents do about cyberbullying?
Unfortunately, there is no quick, one-size-fits-all solution to the cyberbullying problem. But, at the
very least, as parents, you can be there for your children. It is highly probable that your child will
not be forthcoming about any incidences of cyberbullying they may be experiencing.
However, if you recognize any of the signs described
above, take the time to sit with your child and attempt
to coax them to open up about any problems they are
having in or out of school. By being supportive and
understanding, you may aid your child in feeling as
though they are not wholly alone.
What to do if you are being cyberbullied
You have the right to be safe and respected. You don’t deserve to be bullied or harassed, whether
in-person or online. If you’re being cyberbullied:
 Don’t respond to the messages.
 Talk to a trusted adult, such as a parent, grandparent, teacher,
coach, principal or guidance counselor.
 Block the number on your phone. Block or unfriend the user
on the website or social media platform.
 Document the bullying with a screenshot and share it with the
site’s administrators, a trusted adult and, if necessary, the authorities.
 Call 999 if you or someone you know is in immediate danger.
Thank
You
#together_for_a_better_internet

More Related Content

What's hot

Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
griehl
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
CoachElrod
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
Christine Hui Jun Zhong
 
Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh
Bangladesh Network Operators Group
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Surakshya Poudel
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
nikunjandy
 
CYBER CRIME [ HINDI ]
CYBER CRIME [ HINDI ]CYBER CRIME [ HINDI ]
CYBER CRIME [ HINDI ]
DrNishma Singh
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
Areeb Khan
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Avinash Rajput
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
Apostolos Syropoulos
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
J A Bhavsar
 
Scenario of social network crime in bangladesh
Scenario of social network crime in bangladeshScenario of social network crime in bangladesh
Scenario of social network crime in bangladesh
Bank Alfalah Limited
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
Karissa Joy Daculap
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
Amber Dee
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
sugandhaaggarwal
 
Child Abuse Presentation
Child Abuse Presentation Child Abuse Presentation
Child Abuse Presentation
Paige Coyle
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
Thomas Müller
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
Poonam Bhasin
 

What's hot (20)

Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
CYBER CRIME [ HINDI ]
CYBER CRIME [ HINDI ]CYBER CRIME [ HINDI ]
CYBER CRIME [ HINDI ]
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
 
Scenario of social network crime in bangladesh
Scenario of social network crime in bangladeshScenario of social network crime in bangladesh
Scenario of social network crime in bangladesh
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Child Abuse Presentation
Child Abuse Presentation Child Abuse Presentation
Child Abuse Presentation
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 

Similar to Cyberbullying.pptx

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
pardolopez
 
Robs Power Point
Robs Power PointRobs Power Point
Robs Power Point
yusko1rj
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
Karen Brooks
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
21rahul1999
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
alanrgibson41217
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
HomeGuides
 
Social justice
Social justiceSocial justice
Social justice
km03john
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
lippertnicole
 
Cyberbulling and social networks for children under 13
Cyberbulling and social networks for children under 13Cyberbulling and social networks for children under 13
Cyberbulling and social networks for children under 13
Pato Riveroll
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
mehreenfathima2
 
Define cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdfDefine cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdf
alshaikhkhanzariarts
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
victoriahoo
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
HDCH
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
JaveriaZain1
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
hmorrell1
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
Chris483410
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
seswear9388
 
McAnally current legal issue
McAnally current legal issueMcAnally current legal issue
McAnally current legal issue
SabrinaMcAnally
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
miliarguelles1
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
miliarguelles
 

Similar to Cyberbullying.pptx (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Robs Power Point
Robs Power PointRobs Power Point
Robs Power Point
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docxCyberbullying-Identification-Prevention-Response.pdf1 .docx
Cyberbullying-Identification-Prevention-Response.pdf1 .docx
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Social justice
Social justiceSocial justice
Social justice
 
cyberbullying/social networks conversation
cyberbullying/social networks conversationcyberbullying/social networks conversation
cyberbullying/social networks conversation
 
Cyberbulling and social networks for children under 13
Cyberbulling and social networks for children under 13Cyberbulling and social networks for children under 13
Cyberbulling and social networks for children under 13
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Define cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdfDefine cyberbullying and use two workable ethical theories to analyz.pdf
Define cyberbullying and use two workable ethical theories to analyz.pdf
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Tie digital citizenship project cyberbullying
Tie  digital citizenship project cyberbullyingTie  digital citizenship project cyberbullying
Tie digital citizenship project cyberbullying
 
McAnally current legal issue
McAnally current legal issueMcAnally current legal issue
McAnally current legal issue
 
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyngGiuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
Giuli miliiiiiiiiiiiiiiiiiiii cyberbulliyng
 
Mili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaaMili giuly cyberbullying este a a a a a a a aaaa
Mili giuly cyberbullying este a a a a a a a aaaa
 

Recently uploaded

Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
USDAReapgrants.com
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
20jcoello
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
ssusera97a2f
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
azizurrahaman17
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
lawyersonia
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 

Recently uploaded (20)

Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 

Cyberbullying.pptx

  • 1. An Analysis on CYBERBULLYING & DIGITAL ABUSE in Bangladesh
  • 2. Cyberbullying & Digital Abuse is a type of bullying that occurs through technology such as texting and social networking to bully, harass, stalk or intimidate a partner. Often this behavior is a form of verbal or emotional abuse perpetrated online. Cyberbullying & Digital Abuse  Cyberbullying is often anonymous, and aims to destroy and psychologically humiliate the victim.  Cyberbullying can affect the victim’s academic performance.  Being bullied can increase a person’s risk of depression, drug or alcohol abuse, risky sexual behavior, and suicidal thoughts. The risk is even higher in young people.
  • 3. Cyberbullying Law in Bangladesh Though at first cyberbullying was officially not considered as a crime, at present cyber bullying is not just an act to be scorned upon but is an offence punishable under the Information and Communication Technology (ICT) Act 2006 in Bangladesh. The Act inter alia provides that a person who deliberately publishes, in a website or in electronic form, any material which is fake and obscene or has the effect of corrupting persons who are likely to read, see or hear the material or causes to prejudice the image of a person or may hurt religious belief or instigate against any person, then the person publishing the material will be guilty of an offence under the Act. The punishment for such an offence is imprisonment and fine. The laws which can be availed by victims of cyber harassment in Bangladesh include  the Information and Communication Technology Act, 2006 (ICT Act)  the Pornography Control Act, 2012 (PC Act)  and the Digital Security Act, 2018 (DS Act)  Section 63 of the ICT Act ensures punishment for disclosure of confidentiality and privacy with imprisonment or with a fine or both.  Section 24 of the DS Act penalizes identity fraud and provides sanctions for it whereas section 25 protects a person from the transmission or publication of offensive, false or threatening information regarding them through any digital medium.  Section 29 of the DS Act protects a victim against defamation. Finally, section 8 of the PC Act has made the possession, distribution or use of any sort of pornographic material illegal.
  • 4. Present Scenario of Cyberbullying in Bangladesh  Almost 49% of students have reported being victims of cyberbullying.  A study has concluded that 49.5% of Bangladeshi teenagers had been victims of cyberbullying until 2016.  The study indicates that 61% of students in Bangladesh send explicit messages online, which is known as “sexting.”  Around 38% of students expressed positive opinions about consulting with their parents.  32% kids at risk of cyberbullying in Bangladesh: UNICEF  80% of cyberbullying victims are women.
  • 5. 8.3 8.3 37.5 41.7 4.2 Most devices used by Students Computer Ipad or Tablet Cellphone Cellphone with camera Digital Camera 19 9.5 0 33.3 4.8 33.3 If Cyberbullied, who tried to help? Parents Siblings Teachers Friends Nobody Never Cyberbullyed Present Scenario of Cyberbullying in Bangladesh
  • 6. Effect of Cyberbullying & digital abuse The changes might not be readily apparent at first, but as time goes on, you may notice one or more of the following behavioral changes that can be strong indicators of cyberbullying.  A drop in social behavior — avoiding friends or social events  Isolating his or herself in their room more than usual  Finding it hard to concentrate on schoolwork  Grades dropping  Losing interest in activities that they normally enjoy  Skipping school or expressing a desire to skip school  Appearing angry when looking at their phone, tablet, or computer  Hiding their phone or computer screen from view  Using drugs or alcohol  Expressing dark thoughts or emotions  Talking about suicide
  • 7. Steps taken to prevent Cyberbullying in Bangladesh  The Bangladeshi government has taken some actions to stop cyberbullying. Firstly, the government passed a new ICT act in 2006; now, victims can take legal steps against assailants under these acts.  Additionally, the government and non-government organizations hold awareness seminars, programs, and dramas to create social awareness regarding cyberbullying.  Bangladesh tries to control and guide the network media, formulate relevant laws and regulations, and strengthen the legal system.  However, the Bangladeshi government should establish the principle of network access and control the advertising and information issued by the company to prevent the harm of false information to the people.
  • 8. What can parents do about cyberbullying? Unfortunately, there is no quick, one-size-fits-all solution to the cyberbullying problem. But, at the very least, as parents, you can be there for your children. It is highly probable that your child will not be forthcoming about any incidences of cyberbullying they may be experiencing. However, if you recognize any of the signs described above, take the time to sit with your child and attempt to coax them to open up about any problems they are having in or out of school. By being supportive and understanding, you may aid your child in feeling as though they are not wholly alone.
  • 9. What to do if you are being cyberbullied You have the right to be safe and respected. You don’t deserve to be bullied or harassed, whether in-person or online. If you’re being cyberbullied:  Don’t respond to the messages.  Talk to a trusted adult, such as a parent, grandparent, teacher, coach, principal or guidance counselor.  Block the number on your phone. Block or unfriend the user on the website or social media platform.  Document the bullying with a screenshot and share it with the site’s administrators, a trusted adult and, if necessary, the authorities.  Call 999 if you or someone you know is in immediate danger.