SlideShare a Scribd company logo
1 of 2
Download to read offline
© 2013. Gagnier Margossian LLP. All rights reserved.
Understanding “Cyber” Bullying:
California Law &
Proactive Steps for School Districts
Bullying has long been present in schools, but the tactics used today, primarily
through the use of technology and social networks, exacerbate the impact of this
behavior. “Cyber” bullying, as it is referred to and reported on by the media, refers to
the bullying online of juveniles and students.
It is important to understand that while this behavior may or may not have its
genesis in the classroom, its results are permanent and pervasive: negative
comments, teasing and other hurtful communication is archived permanently online
and can be easily shared and replicated at the click of a button.
What	
  is	
  “Cyber”	
  Bullying?
“Cyber” bullying typically refers to online
bullying involving juveniles or students.
“Cyber” bullying can include:
➡ Knowingly or recklessly posting or
sharing false or defamatory
information about a person;
➡ Taunting a person using online or
otherwise digital means;
➡ Posting or sharing information
about another person that is
private;
➡ Breaking into another person’s
electronic account and/or
assuming a person’s identity; or
➡ Posting or sharing photos of other
people without their permission.
“Cyber”	
  Bullying	
  Facts	
  &	
  Figures
➡ 1	
  in	
  5 middle school students
reportedly feels the effects of
“cyber” bullying.
➡ Approximately 75% of teens ages	
  
12	
  to	
  17	
  experience “cyber”
bullying in the U.S.
➡ “Cyber” bullying begins	
  as	
  early	
  
as	
  4th	
  grade, when self-
perception begins to shape a
child’s view of their self worth.
➡ Online abuse - cyber bullying,
cyber stalking and cyber
harassment - disproporBonately	
  
affects	
  children,	
  minoriBes	
  and	
  
women.
Ten	
  Ways	
  “Cyber”	
  Bullying	
  Can	
  Be	
  More	
  Damaging	
  Than	
  Face-­‐to-­‐Face	
  Bullying
1) “Cyber” bullying can be done	
  in	
  an	
  instant.
2) Harassing posts can be accessed	
  repeatedly	
  by	
  a	
  limitless	
  audience.
3) Harassing posts can be archived,	
  cached	
  and	
  spread to different forums.
4) Bullies are able to “bully” 24/7 from anywhere	
  at	
  anyBme.
5) Bullies become less	
  inhibited since they are physically removed from the victim of
the bullying.
6) The harassing posts and behavior are archived on the Internet permanently,
affecBng	
  the	
  online	
  reputaBon of all parties involved.
7) A victim’s idenBty	
  can	
  be	
  manipulated	
  online, with bullies pretending	
  to	
  be	
  the	
  
vicBm in different forums.
8) Victims have a harder	
  Bme	
  “fighBng”	
  back: posts and comments can	
  mulBply	
  in	
  
seconds.
9) Bullies can post harassing content anonymously, making it harder for parents,
teachers and administrators to step in and take action.
10) Schools shy	
  away	
  from	
  interfering	
  with	
  online	
  bullying	
  since it takes place on
the Internet and often times outside of school hours.
T: 415.766.4591
F: 909.972.1639
E: consult@gamallp.com
gamallp.com
@gamallp
Los Angeles
Internet
Intellectual Property
Privacy
Social Media
Technology
The Good Stuff
Sacramento San Francisco
Bullying	
  AcBon	
  Plan
1) Develop a Bullying Policy and make
sure it is distributed amongst parents
and students.
2) Provide accessible resources about
bullying and support for students who
may be victims.
3) Make “cyber” bullying a focus - ensure
that parents understand the
technology and how it is being used.
4) Deal with reports, rumors and other
evidence of bullying immediately.
5) Provide immediate support to victims
rather than just focusing on remedial
action for those who were the
perpetrators of the bullying behavior.
Seth’s	
  Law
The California Legislature has taken steps to protect a certain class of students.
Assembly Bill 9 (AB 9), known as “Seth’s Law,” was enacted to focus on the
most common targets of bullying: lesbian, gay,, bisexual and transgender (LGBT)
students.
AB 9 had predecessors, but differs since it includes specific requirements that
must be met by school districts.These requirements include:
➡ Education Code Section 234 now protects student victims from not
only discrimination and harassment, but also “intimidation and bullying
based on actual or perceived characteristics” including a student’s
disability, gender, nationality, race or ethnicity, religion or sexual
orientation.
➡ Any school personnel who witness acts of discrimination, harassment,
intimidation or bullying “must take immediate steps to intervene when
safe to do so.”
➡ Schools must “set up a timeline to investigate and resolve” complaints,
as well as implement an appeals process.
➡ AB 9 does not prohibit teachers and school officials from taking some
sort of action to intervene for activity that may take place off-campus.
➡ School districts must post and annually update support resources for
pupils who have been subject to school-based discrimination,
harassment, intimidation or bullying on their website.
It’s	
  Not	
  Just	
  AB	
  9	
  -­‐	
  Other	
  Applicable	
  Law	
  in	
  California
	

➡ Assembly Bill 746 (2011) - Language includes student behaviors on
social networking sites.
➡ Assembly Bill 1732 adds punishments for creators of offensive burn
pages, Internet impersonations and false profiles.
➡ Assembly Bill 86, codified in Education Code Section 32261(g), gives
school officials grounds to suspend a pupil or recommend a pupil for
expulsion for bullying, including, but not limited to, bullying by electronic
act.
➡ Education Code Section 48900(a) - addressing activity of threatening to
cause physical injury.
➡ Education Code Section 48900(i) - addressing activity of committing an
obscene act or engaged in habitual profanity or vulgarity.
Resource Website
TheTrevor Project thetrevorproject.org
StopBullying.gov stopbullying.gov
Wired Safety wiredsafety.org
BornThis Way
Foundation
bornthiswayfoundation.org
Common Sense
Media
commonsensemedia.org
AThin Line athinline.org
That’s Not Cool that’snotcool.org
Find some helpful resources below to educate
your school, parents and students alike.
#nerdlawyers


More Related Content

What's hot

Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetinganniebee3509
 
Cyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And SaadCyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And Saadsbaluch1
 
Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Yearselketeaches
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet useBurkeV
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?AJ Tivol
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012kschermerhorn
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullyingkschermerhorn
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parentsdamarissepulveda
 
McAnally current legal issue
McAnally current legal issueMcAnally current legal issue
McAnally current legal issueSabrinaMcAnally
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingringw1sl
 
Cyberstalking
CyberstalkingCyberstalking
CyberstalkingTrevschic
 

What's hot (20)

Cyber bullying awareness professional development meeting
Cyber bullying awareness professional development meetingCyber bullying awareness professional development meeting
Cyber bullying awareness professional development meeting
 
Cyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And SaadCyberbullying No27 2009 Laurence And Saad
Cyberbullying No27 2009 Laurence And Saad
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Years
 
Introduction to Cybersafety
Introduction to CybersafetyIntroduction to Cybersafety
Introduction to Cybersafety
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet use
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?Cyber-bullying: Is Your Career at Risk?
Cyber-bullying: Is Your Career at Risk?
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 
McAnally current legal issue
McAnally current legal issueMcAnally current legal issue
McAnally current legal issue
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Life in the_digital_world
Life in the_digital_worldLife in the_digital_world
Life in the_digital_world
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 

Similar to Understanding "Cyber" Bullying: California Law & Proactive Steps for School Districts

Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...HDCH
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGJaveriaZain1
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingcschoeneman
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullyingBullyvention
 
Seth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingSeth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingChristina Gagnier
 
Dwe m4 cyber bullying and conflict resolution
Dwe m4   cyber bullying and conflict resolutionDwe m4   cyber bullying and conflict resolution
Dwe m4 cyber bullying and conflict resolutionData-Set
 
Benefits Of On Line Social Networks (Tin180.com)
Benefits Of On Line Social Networks (Tin180.com)Benefits Of On Line Social Networks (Tin180.com)
Benefits Of On Line Social Networks (Tin180.com)Tin180 VietNam
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingDr. Conrath
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)amalgarn
 
Cyber bullying.pdf
Cyber bullying.pdfCyber bullying.pdf
Cyber bullying.pdfDobby12
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingpscl
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianKate Gukeisen
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfMi Ra Lavandelo
 
Student Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the ClassroomStudent Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the ClassroomChristina Gagnier
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write upvictoriahoo
 

Similar to Understanding "Cyber" Bullying: California Law & Proactive Steps for School Districts (20)

Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
Facebook
FacebookFacebook
Facebook
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullying
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
How to stop cyber bullying
How to stop cyber bullyingHow to stop cyber bullying
How to stop cyber bullying
 
Seth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" BullyingSeth's Law (AB 9) - Understanding "Cyber" Bullying
Seth's Law (AB 9) - Understanding "Cyber" Bullying
 
Dwe m4 cyber bullying and conflict resolution
Dwe m4   cyber bullying and conflict resolutionDwe m4   cyber bullying and conflict resolution
Dwe m4 cyber bullying and conflict resolution
 
Benefits Of On Line Social Networks (Tin180.com)
Benefits Of On Line Social Networks (Tin180.com)Benefits Of On Line Social Networks (Tin180.com)
Benefits Of On Line Social Networks (Tin180.com)
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullying
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
 
Cyber bullying.pdf
Cyber bullying.pdfCyber bullying.pdf
Cyber bullying.pdf
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School LibrarianInternet Filtering, Intellectual Freedom, & Your School Librarian
Internet Filtering, Intellectual Freedom, & Your School Librarian
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdfCyber_Safety_K-12_Fact_Sheet_508C.pdf
Cyber_Safety_K-12_Fact_Sheet_508C.pdf
 
Student Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the ClassroomStudent Privacy Rights: In and Out of the Classroom
Student Privacy Rights: In and Out of the Classroom
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
 

More from Christina Gagnier

European Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistChristina Gagnier
 
EU Privacy Shield Self Certification
EU Privacy Shield Self Certification EU Privacy Shield Self Certification
EU Privacy Shield Self Certification Christina Gagnier
 
The United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsThe United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsChristina Gagnier
 
Regulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarRegulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarChristina Gagnier
 
China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"Christina Gagnier
 
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaInitial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaChristina Gagnier
 
Conducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsConducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsChristina Gagnier
 
SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017Christina Gagnier
 
Guide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramGuide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramChristina Gagnier
 
European Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistEuropean Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistChristina Gagnier
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Christina Gagnier
 
Gender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsGender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsChristina Gagnier
 
ABC's of Privacy and Security
ABC's of Privacy and SecurityABC's of Privacy and Security
ABC's of Privacy and SecurityChristina Gagnier
 
Starting a Business: The Legal Details
Starting a Business: The Legal DetailsStarting a Business: The Legal Details
Starting a Business: The Legal DetailsChristina Gagnier
 
GAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big DataGAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big DataChristina Gagnier
 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawChristina Gagnier
 
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)Christina Gagnier
 
GAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeGAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeChristina Gagnier
 
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Christina Gagnier
 
Revenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentRevenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentChristina Gagnier
 

More from Christina Gagnier (20)

European Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) ChecklistEuropean Union General Data Protection Regulation (GDPR) Checklist
European Union General Data Protection Regulation (GDPR) Checklist
 
EU Privacy Shield Self Certification
EU Privacy Shield Self Certification EU Privacy Shield Self Certification
EU Privacy Shield Self Certification
 
The United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin OfferingsThe United Kingdom Raises Red Flag on Initial Coin Offerings
The United Kingdom Raises Red Flag on Initial Coin Offerings
 
Regulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in GibraltarRegulatory Regime for Cryptocurrencies in Gibraltar
Regulatory Regime for Cryptocurrencies in Gibraltar
 
China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"China Bans Initial Coin Offerings, "Illegal Public Financing"
China Bans Initial Coin Offerings, "Illegal Public Financing"
 
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in CanadaInitial Coin Offerings (ICOs) and Cryptocurrencies in Canada
Initial Coin Offerings (ICOs) and Cryptocurrencies in Canada
 
Conducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and ConsiderationsConducting an Initial Coin Offering: Costs and Considerations
Conducting an Initial Coin Offering: Costs and Considerations
 
SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017SEC Update: Virtual Organizations and the SEC - July 2017
SEC Update: Virtual Organizations and the SEC - July 2017
 
Guide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield ProgramGuide to Prospective European Union - United States Privacy Shield Program
Guide to Prospective European Union - United States Privacy Shield Program
 
European Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistEuropean Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation Checklist
 
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
Revenge Pornography: Legal and Policy Issues - Computers, Data & Privacy Prot...
 
Gender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All StudentsGender Issues: Creating a Safe Environment for All Students
Gender Issues: Creating a Safe Environment for All Students
 
ABC's of Privacy and Security
ABC's of Privacy and SecurityABC's of Privacy and Security
ABC's of Privacy and Security
 
Starting a Business: The Legal Details
Starting a Business: The Legal DetailsStarting a Business: The Legal Details
Starting a Business: The Legal Details
 
GAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big DataGAMABrief: When Education Meets Big Data
GAMABrief: When Education Meets Big Data
 
GAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright LawGAMABrief: What Every School Needs to Know About Copyright Law
GAMABrief: What Every School Needs to Know About Copyright Law
 
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
GAMAByte: The Legal Ramifications of Going 3D (Printing, That is)
 
GAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax HikeGAMABrief: Preparing for the Capital Gains Tax Hike
GAMABrief: Preparing for the Capital Gains Tax Hike
 
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
Privacy Identity Innovation 2013: Ignite Talk Slides - Content. Conduct. Cont...
 
Revenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without ConsentRevenge Porn: Posting Images Without Consent
Revenge Porn: Posting Images Without Consent
 

Understanding "Cyber" Bullying: California Law & Proactive Steps for School Districts

  • 1. © 2013. Gagnier Margossian LLP. All rights reserved. Understanding “Cyber” Bullying: California Law & Proactive Steps for School Districts Bullying has long been present in schools, but the tactics used today, primarily through the use of technology and social networks, exacerbate the impact of this behavior. “Cyber” bullying, as it is referred to and reported on by the media, refers to the bullying online of juveniles and students. It is important to understand that while this behavior may or may not have its genesis in the classroom, its results are permanent and pervasive: negative comments, teasing and other hurtful communication is archived permanently online and can be easily shared and replicated at the click of a button. What  is  “Cyber”  Bullying? “Cyber” bullying typically refers to online bullying involving juveniles or students. “Cyber” bullying can include: ➡ Knowingly or recklessly posting or sharing false or defamatory information about a person; ➡ Taunting a person using online or otherwise digital means; ➡ Posting or sharing information about another person that is private; ➡ Breaking into another person’s electronic account and/or assuming a person’s identity; or ➡ Posting or sharing photos of other people without their permission. “Cyber”  Bullying  Facts  &  Figures ➡ 1  in  5 middle school students reportedly feels the effects of “cyber” bullying. ➡ Approximately 75% of teens ages   12  to  17  experience “cyber” bullying in the U.S. ➡ “Cyber” bullying begins  as  early   as  4th  grade, when self- perception begins to shape a child’s view of their self worth. ➡ Online abuse - cyber bullying, cyber stalking and cyber harassment - disproporBonately   affects  children,  minoriBes  and   women. Ten  Ways  “Cyber”  Bullying  Can  Be  More  Damaging  Than  Face-­‐to-­‐Face  Bullying 1) “Cyber” bullying can be done  in  an  instant. 2) Harassing posts can be accessed  repeatedly  by  a  limitless  audience. 3) Harassing posts can be archived,  cached  and  spread to different forums. 4) Bullies are able to “bully” 24/7 from anywhere  at  anyBme. 5) Bullies become less  inhibited since they are physically removed from the victim of the bullying. 6) The harassing posts and behavior are archived on the Internet permanently, affecBng  the  online  reputaBon of all parties involved. 7) A victim’s idenBty  can  be  manipulated  online, with bullies pretending  to  be  the   vicBm in different forums. 8) Victims have a harder  Bme  “fighBng”  back: posts and comments can  mulBply  in   seconds. 9) Bullies can post harassing content anonymously, making it harder for parents, teachers and administrators to step in and take action. 10) Schools shy  away  from  interfering  with  online  bullying  since it takes place on the Internet and often times outside of school hours.
  • 2. T: 415.766.4591 F: 909.972.1639 E: consult@gamallp.com gamallp.com @gamallp Los Angeles Internet Intellectual Property Privacy Social Media Technology The Good Stuff Sacramento San Francisco Bullying  AcBon  Plan 1) Develop a Bullying Policy and make sure it is distributed amongst parents and students. 2) Provide accessible resources about bullying and support for students who may be victims. 3) Make “cyber” bullying a focus - ensure that parents understand the technology and how it is being used. 4) Deal with reports, rumors and other evidence of bullying immediately. 5) Provide immediate support to victims rather than just focusing on remedial action for those who were the perpetrators of the bullying behavior. Seth’s  Law The California Legislature has taken steps to protect a certain class of students. Assembly Bill 9 (AB 9), known as “Seth’s Law,” was enacted to focus on the most common targets of bullying: lesbian, gay,, bisexual and transgender (LGBT) students. AB 9 had predecessors, but differs since it includes specific requirements that must be met by school districts.These requirements include: ➡ Education Code Section 234 now protects student victims from not only discrimination and harassment, but also “intimidation and bullying based on actual or perceived characteristics” including a student’s disability, gender, nationality, race or ethnicity, religion or sexual orientation. ➡ Any school personnel who witness acts of discrimination, harassment, intimidation or bullying “must take immediate steps to intervene when safe to do so.” ➡ Schools must “set up a timeline to investigate and resolve” complaints, as well as implement an appeals process. ➡ AB 9 does not prohibit teachers and school officials from taking some sort of action to intervene for activity that may take place off-campus. ➡ School districts must post and annually update support resources for pupils who have been subject to school-based discrimination, harassment, intimidation or bullying on their website. It’s  Not  Just  AB  9  -­‐  Other  Applicable  Law  in  California ➡ Assembly Bill 746 (2011) - Language includes student behaviors on social networking sites. ➡ Assembly Bill 1732 adds punishments for creators of offensive burn pages, Internet impersonations and false profiles. ➡ Assembly Bill 86, codified in Education Code Section 32261(g), gives school officials grounds to suspend a pupil or recommend a pupil for expulsion for bullying, including, but not limited to, bullying by electronic act. ➡ Education Code Section 48900(a) - addressing activity of threatening to cause physical injury. ➡ Education Code Section 48900(i) - addressing activity of committing an obscene act or engaged in habitual profanity or vulgarity. Resource Website TheTrevor Project thetrevorproject.org StopBullying.gov stopbullying.gov Wired Safety wiredsafety.org BornThis Way Foundation bornthiswayfoundation.org Common Sense Media commonsensemedia.org AThin Line athinline.org That’s Not Cool that’snotcool.org Find some helpful resources below to educate your school, parents and students alike. #nerdlawyers 