What is Cyberbullying? How is it Different from Traditional Bullying?

Size: px
Start display at page:

Download "What is Cyberbullying? How is it Different from Traditional Bullying?"

Transcription

1 Bullying occurs when a person or a group of people hurt, scare or are mean to another person or group on purpose. Bullying usually occurs more than once. In the past, these encounters generally happened during school on the playground or in the hallways between classes. But more and more, people are using computers, cell phones and other electronic devices to taunt and humiliate other people. This educational series was created to give students and readers a general understanding of what bullying and, more specifically, cyberbullying is and how it can affect those involved. It will also explore strategies for preventing it. For the next six days (weeks) this newspaper will run features covering the following topics: What is Cyberbullying? Cyber Terms You Should Know The Effects of Cyberbullying Who Participates in Cyberbullying? How to Respond to Cyberbullying How Can Cyberbullying be Prevented? The Cyberbullying Research Center was used as a source for much of the content in this series. All other sources are cited within the features containing their content.

2 What is Cyberbullying? How is it Different from Traditional Bullying? While similar to traditional bullying, cyberbullying has many differences that make it challenging to deal with. Victims often do not know who the bully is, or why they are being targeted. The cyberbully can hide his or her identity by using anonymous addresses or screen names. Hurtful actions of a cyberbully with a few keystrokes or clicks of a mouse can include an increasing number of people - at school, in the neighborhood or across the world! Everyone might not be directly involved but the incident can be witnessed by millions in a matter of days or even hours if the posting goes viral. This could give the victim the feeling that absolutely everyone knows about it. Cyberbullying, unlike physical bullying, does not provide an option Cyberbullying can be defined as the use of computers, cell phones and other electronic devices by people to deliberately and repeatedly taunt, harass, threaten, humiliate or otherwise hassle others. for its victims to walk away. It can be easier to be cruel using technology because a cyberbully doesn t have to face his/her target or see the immediate response. In fact, some teens might not realize the serious harm they are causing because they do not witness the victim s reaction. Finally, while parents and teachers are doing a better job supervising young people at school and at home, many adults don t have the technological know-how to keep track of what teens are up to online. As a result, a victim s experience may be missed and a bully s actions may be left unchecked. Even if bullies are identified, many adults don t know how to stop the cyberbullying from happening. Go viral used in reference to Internet content which can be passed through electronic mail and social networking sites (Facebook, Twitter, etc.). An image, video, or link that spreads rapidly through a large number of users by being frequently shared is said to have gone viral. Source: Urbandictionary.com Cyberbullying is a growing problem because increasing numbers of children are continuously using computers, cell phones or other electronic devices. Two-thirds of young people go online every day for school work, to communicate with friends, or just for fun. The fact that teens may be connected to technology 24/7, means they are open to cyberbullying around the clock. Next installment: Cyber Terms You Should Know Newspaper Activity: Appreciating Others Sometimes bullying happens because of misunderstandings among people of different backgrounds. Look through the newspaper for articles or pictures about customs and traditions of various cultures, religions, nationalities and ethnic groups. With your class and/or family, discuss the special qualities of these groups. Do you have similar traditions? What makes these groups unique and worth appreciating?

3 Cyber Terms You Should Know Anonymizer Software that hides or disguises the IP address of an Internet user. This allows a person to use the Internet without leaving a digital footprint that can be tracked. Bash Board An online bulletin board on which individuals can post what they want. Generally, posts are malicious and hateful statements directed against another person or group. Blocking The denial of access to particular parts of the Internet. Cyber Bullycide Suicide stemming directly or indirectly from being cyberbullied. Cyberspace The electronic universe created by computer networks in which individuals interact. Cyberstalking Harassment that includes threats of harm or is highly intimidating and intruding upon one s personal privacy. Cyber Threats Electronic material that either generally or specifically raises concerns that the creator may intend to inflict harm or violence to other or self. Digital Footprint Evidence of a person s use of the Internet. This includes anything that can be linked to his or her existence, presence, or identity. Filtering The applying of a set of criteria against which Internet content is judged acceptable or not. For example, a filter might check the text on a web page with a list of forbidden words. If a match is found, that web page may be blocked or reported through a monitoring process. Generally speaking, it lets data pass or not pass based on previously specified rules. Flaming Sending angry, rude, or obscene messages directed at a person privately or an online group. A flame war erupts when flames are sent back and forth. Happy Slapping An extreme form of bullying where physical assaults are recorded on mobile phones and distributed to others. IP Address Stands for Internet Protocol address. It is a unique address assigned to a computing device that allows it to send and receive data with other computing devices that have their own unique addresses. ISP Internet Service Provider or the company that provides an Internet connection to individuals or companies. Your ISP can help with identifying the individual who posts or sends harassing or threatening words. Monitoring The recording and reporting of online activity through software. It may record a history of all Internet use or just of inappropriate use. A person can also serve this function. Trolling Deliberately but disingenuously posting information to entice genuinely helpful people to respond (often emotionally). Often done to inflame or provoke others. Next installment: The Effects of Cyberbullying Newspaper Activity: Understanding Terms Look through several editions of the newspaper (print or electronic) to see if you can fi nd news stories about incidents of cyberbullying. Did you fi nd any of these terms mentioned? Were other cyber terms or text talk abbreviations used? With your class and/ or family discuss any terms you don t know or understand.

4 The Effects of Cyberbullying Many targets of cyberbullying report feeling depressed, sad, angry and frustrated. As one teenager stated, It makes me hurt both physically and mentally. It scares me and takes away all my confidence. It makes me feel sick and worthless. Victims who experience cyberbullying say they are afraid or embarrassed to go to school. In addition, research has revealed a link between cyberbullying and low self-esteem, family problems, academic problems, school violence, and delinquent Warning Signs of Cyberbulling: behavior. Finally, A child or teenager may be a victim of cyberbullying if he or she: unexpectedly stops using their computer or cell phone; appears nervous or jumpy when receiving an instant message or ; appears uneasy about going to school or outside in general; appears to be angry, depressed, or frustrated after using the computer or cell phone; avoids discussions about what they are doing on the computer or cell phone; or becomes abnormally withdrawn from usual friends and family members. A child may be cyberbullying others if he or she: quickly switches screens or closes programs when you walk by; uses the computer at all hours of the night; gets unusually upset if he/ she cannot use the computer; laughs excessively while using the computer; avoids discussions about what they are doing on the computer or uses multiple online accounts or using an account that is not their own. cyberbullied youth also report having suicidal thoughts. There have been a number of recent, well-publicized cases involving cyberbullying sometimes combined with other forms of bullying that have contributed to acts of suicide. According the U.S. Department of Health and Human Services, children who are cyberbullied are more likely to: Use alcohol and drugs Skip school Experience in-person bullying Be unwilling to attend school Receive poor grades Have lower self-esteem Have more health problems But cyberbullying can impact more than just its victims. Family and friends of the target, witnesses and the even the people who bully can be affected. According to the American Psychological Association bullies are more prone to other forms of antisocial behavior such as vandalism, fighting and shoplifting. The APA estimates that one in four boys who bully will have a criminal record by age 30. Next installment: Who Participates in Cyberbullying? Newspaper Activity: Understanding Actions and Effects Look through editions of the newspaper for a current problem affecting your school or community. It can but doesn t have to involve bullying or cyberbullying. As a class and/or family discuss what you think about how the people are handling the problem. Are their actions having positive or negative effects?

5 Who Participates in Cyberbullying? Nearly every child at some point will face a situation where he/she is either a bully, a target or victim of bullying or a bystander. At different times, any one of these roles can be switched among participants. An individual s physical size and strength doesn t necessarily determine the make-up of a cyberbully. As a result, young people occasionally change roles, going from victim to bully and back again. Here s one example: a victim of bullying responds by providing the personal information including phone numbers and addresses of the people who have bullied him. His online friends decide to get even by making dozens of prank calls, sending anonymous, inappropriate and threatening s and even ordering hundreds of pizzas to the victims (former bullies) doors. According to the Cyberbullying Research Center about 20% of 11 to 18 year-old students surveyed in 2010 have been a victim of cyberbullying at some point in their lives. About the same number admitted to cyberbullying others and 10% of kids said they had been both a victim Bystander: a person present but not actively involved; onlooker; spectator and an offender. Most traditional bullying occurs around other people who assume the role of bystanders or witnesses. Being a bystander in the cyber world is different because bystanders aren t just onlookers. Bystanders participate by receiving and forwarding s or instant messages, viewing web pages, forwarding images sent to cell phones, etc. And, unlike the limited crowd of spectators in a traditional bullying event, the number of cyber-bystanders can reach into the millions and throughout the world. Those who witness cyberbullying generally do not want to get involved out of fear, yet they often realize that what they are seeing is not right and should stop. Experts believe that bystanders can make a huge difference in helping cyberbullying victims, who often feel helpless and hopeless and need someone to offer support. Bystanders should note what they see and when. They should also stand up for the victim, becoming an ally or upstander, and tell an adult they trust who can step in and improve the situation. Finally, they should never encourage or indirectly contribute to the behavior by forwarding hurtful messages, laughing at inappropriate jokes or content, agreeing with the act just to fit in, or otherwise silently allowing it to continue. Whether you ve been a victim of cyberbullying, know someone who has been cyberbullied, or have even cyberbullied yourself, there are steps you and your friends can take to stop cyberbullying and stay cyber-safe. Next installment: How to Respond to Cyberbullying Newspaper Activity: Bullying/Cyberbullying is No Laughing Matter Look through several editions of the comics section and fi nd instances of bullying or cyberbullying. Pick one and identify the bully, the victim and bystanders. As a class and/or family discuss why the cartoon character is being a bully, how the victim is responding, and what the bystanders are doing. Can you think of better and more positive ways in which these characters could interact with each other?

6 How to Respond to Cyberbullying So what should a person do if he or she is the target or know someone else who is being cyberbullied? Do not reply to cyberbullying. If the cyberbully is ignored and doesn t get a reaction, he or she may stop or move on. But, save or print text messages, postings or s as evidence. Block offending addresses and cell phone numbers, or if necessary change your phone number and address. Report bullying and file complaints with communication services providers and websites where the cyberbullying is occurring. Service providers can find the offenders, cancel their service, and report them to the police if necessary. Try to identify the cyberbully and have a parent or guardian contact his or her parents if Dignity for All Students Act - As the original 2010 New York state law was taking effect in July 2012, an amendment to the new law expanded it to help protect students from cyberbullying as well as other forms of harassment, bullying and discrimination. Effective July 1, 2013, the law requires school districts to have a plan in place to deal with cyberbullying and to act when cyberbullying occurs. School offi cials must investigate reports of cyberbullying, on or off campus, when it creates or would create a substantial risk to the school environment, substantially interferes with a student s educational performance or mental, emotional or physical well-being, or causes a student to fear for his or her physical safety. The law also requires current and future school employees to be trained to identify and reduce the incidences of harassment, bullying, cyberbullying and discrimination. possible. Notify your school of the problem. Involve law enforcement when extremely harmful online speech (including harassment, stalking and threats of violence) is involved. When you see someone being bullied, try to step in and do something about it. Tell the bully to stop. If a bully or cyberbully receives criticism from their peers, they may not do it in the future. If someone tells you that they are being cyberbullied, help them get help so the problem is resolved. All young people should be instructed that when in doubt about what to do log off the computer or electronic device and ask for help from a trusted adult. Newspaper Activity: Resolving Confl icts Use the newspaper (print or electronic) as a resource to fi nd a current confl ict among individuals or groups of people that may or may not involve bullying or cyberbullying. As a class and/or family discuss the possible solutions and work on fi nding the best compromise. Next installment: How can Cyberbullying be Prevented?

7 How Can Cyberbullying be Prevented? Parents and teachers need to educate young people about what is appropriate to write, post or share online. Rules need to be established for safe use of the Internet, cell phones and other electronic devices. Parents also need to monitor use of these devices. Monitoring can be done through active participation or through the use of software. Keep in mind filtering and blocking software alone cannot keep young users safe or prevent them from bullying others or accessing inappropriate content. Everyone, but especially children, should protect their passwords and private information even from best friends. If others find out your password change it immediately! Also, when using social media, set up privacy controls restricting access of your online profile to friends only. No one should open messages ( s, text messages, instant messages (IMs) etc.) from people they don t know or from known bullies. These messages should be deleted without opening them or reading the content. They could Think before you post. Don t post when you re angry or upset. You might express something you ll regret later. Also, consider whether what you re about to write or the photo or video you re ready to post is something you want your parents, grandparents, teachers or complete strangers to see. Ask yourself How would I feel if someone posted this about me? If you might be embarrassed or get in trouble for your action later this is probably not worth sharing now. Remember, even after comments, photos, video, etc. have been deleted from the Internet, this content never completely goes away. contain viruses that automatically infect the electronic device when opened. It is important to remember to log out of online accounts. And, don t save passwords in form fields within websites or web browsers for convenience. Leaving an account open can give someone else access to pose as you online using your account. According to Eyes on Bullying, bystanders also have the power to play a key role in preventing or stopping bullying. Some bystanders directly intervene, by discouraging the bully, defending the victim, or redirecting the situation away from bullying. Other bystanders get help, by rallying support from peers to stand up against bullying or by reporting the bullying to adults. Finally, in keeping with the central theme of folk singer, Peter Yarrow s Operation Respect, we need to work togehter to create a climate where we say - We don t do that here. We all need to understand and reinforce the importance of how everyone should always be treated with respect and dignity in-person and in cyberspace. Newspaper Activity: Use Technology For Good/Protect Against Bad Look through recent editions of the newspaper (print or electronic) for stories about new inventions and discoveries. As a class and/ or family discuss whether each could be used to promote respect, peace or understanding. Consider ways some may be misused to spread disrespect. Think about how people could and should guard against these misuses. For more information about anti-bullying and anti-cyberbullying go online to Operation Respect at and to the Cyberbullying Research Center at

CyberbullyNOT Student Guide to Cyberbullying

CyberbullyNOT Student Guide to Cyberbullying CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.

More information

Bullying 101: Guide for Middle and High School Students

Bullying 101: Guide for Middle and High School Students Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

FAQs: Bullying in schools

FAQs: Bullying in schools FAQs: Bullying in schools FAQs: Bullying in schools answers frequently asked questions about bullying, provides useful advice to parents and students about dealing with bullying, and summarises contemporary

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

What Is the Olweus Bullying Prevention Program?

What Is the Olweus Bullying Prevention Program? Dear Parent/Guardians, Your child s school will be using the Olweus Bullying Prevention Program. This research-based program reduces bullying in schools. It also helps to make school a safer, more positive

More information

GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY

GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Approved: 4 September 2014 Review Date: Page 1 of 7 GRANGE TECHNOLOGY COLLEGE ANTI-BULLYING POLICY Introduction Schools have a duty of care for pupils and

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

Cyberbullying. How common is cyberbullying?

Cyberbullying. How common is cyberbullying? Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:

More information

Guidelines for Preventing and Dealing with Bullying Issues

Guidelines for Preventing and Dealing with Bullying Issues Guidelines for Preventing and Dealing with Bullying Issues Stapleford School aims to value all its members, to give all the opportunity to learn, act fairly and celebrate differences between individuals.

More information

Finchley Catholic High School. Anti Bullying Policy

Finchley Catholic High School. Anti Bullying Policy Finchley Catholic High School Anti Bullying Policy Bullying can occur through many types of anti-social behaviour: Physical A student can be physically punched, kicked, hit, spat at etc Verbal This can

More information

Bullying: A Systemic Approach to Bullying Prevention and Intervention

Bullying: A Systemic Approach to Bullying Prevention and Intervention Bullying: A Systemic Approach to Bullying Prevention and Intervention Session 3 Educators and Teachers icare.ebrschools.org An Alcohol, An Alcohol, Drug Abuse Drug Abuse and Violence and Violence Prevention

More information

A Guide for Parents. of Elementary and Secondary School Students

A Guide for Parents. of Elementary and Secondary School Students A Guide for Parents of Elementary and Secondary School Students The effects of bullying go beyond the school yard. As a parent, here s what to watch for, what you can do, and where you can go to get help.

More information

Bullying. Take Action Against. stealing money. switching seats in the classroom. spreading rumors. pushing & tripping

Bullying. Take Action Against. stealing money. switching seats in the classroom. spreading rumors. pushing & tripping switching seats in the classroom stealing money Take Action Against Bullying spreading rumors pushing & tripping U.S. DEPARTMENT OF HEALTH & HUMAN SERVICES Substance Abuse and Mental Health Services Administration

More information

TAVISTOCK COLLEGE POLICIES & PROCEDURES

TAVISTOCK COLLEGE POLICIES & PROCEDURES TAVISTOCK COLLEGE POLICIES & PROCEDURES TITLE: ANTI CYBER BULYING POLICY MODEL POLICY STATEMENT This is not a Local Authority model policy Local changes have / have not been made to the model policy by

More information

Cyber-bullying is covered by this policy: all members of the community need to be aware that

Cyber-bullying is covered by this policy: all members of the community need to be aware that DUKE OF KENT SCHOOL A8 ANTI-BULLYING POLICY Aims and Objectives: Duke of Kent School values every individual in the community and believes each deserves to be treated with respect. Sensitivity to the feelings

More information

Bystander Intervention

Bystander Intervention Bystander Intervention T Y P E S 1 Common Components 2 What is Bystander Intervention 3 Techniques to Try 4 Steps to Action 5 Who you can contact for more information regarding bystander intervention and

More information

Chapter 3. Online Bullying

Chapter 3. Online Bullying Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.

More information

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences

More information

Bullying Prevention. When Your Child Is the Victim, the Bully, or the Bystander

Bullying Prevention. When Your Child Is the Victim, the Bully, or the Bystander Bullying Prevention When Your Child Is the Victim, the Bully, or the Bystander What Is Bullying? Bullying is not a conflict or a fight. Bullying is physical, verbal, or emotional abuse that is deliberate,

More information

Bullying Prevention: Steps to Address Bullying in Schools. Getting Started

Bullying Prevention: Steps to Address Bullying in Schools. Getting Started Bullying Prevention: Steps to Address Bullying in Schools Getting Started Bullying can threaten students physical and emotional safety at school and can negatively impact their ability to learn. The best

More information

POLICY 5111 ANTI-BULLYING/HARASSMENT/HATE

POLICY 5111 ANTI-BULLYING/HARASSMENT/HATE POLICY 5111 Purpose/Introduction: The Kenosha Unified School District strives to provide a safe, secure and respectful learning environment for all students in school buildings, on school grounds, in school

More information

Crossing. the. L ne. Sexual Harassment at School

Crossing. the. L ne. Sexual Harassment at School Crossing the L ne Sexual Harassment at School Executive Summary Executive Summary A student is groped on the way to class. Kids call a student gay and faggot and just won t quit. A demeaning sexual rumor

More information

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 ) Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.

More information

Bullying Prevention and Intervention:

Bullying Prevention and Intervention: Bullying Prevention and Intervention: A Guide for the Individualized Education Program (IEP) Team Dr. Carol R. Johnson Superintendent Boston Public Schools 26 Court St. Boston, MA 02108-2528 www.bostonpublicschools.org

More information

Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence

Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence Cyber Bullying: A Prevention Curriculum for Grades 6-12 Scope and Sequence Cyber Bullying: A Prevention Curriculum for Grades 6-12 What is Cyber Bullying: A Prevention Curriculum for Grades 6-12? Cyber

More information

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY The signature(s) at the end of this document is/are legally binding and indicate(s) the party/parties who signed has/have

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

It s hard to know what to do when you know or suspect that a friend or family member is living with violence.

It s hard to know what to do when you know or suspect that a friend or family member is living with violence. How can you help? A B It s hard to know what to do when you know or suspect that a friend or family member is living with violence. How do I know what is the right thing to do? Should I say something or

More information

Cyberbullying: What Parents Can Do to Protect Their Children

Cyberbullying: What Parents Can Do to Protect Their Children Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,

More information

Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty

Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty Nancy Willard, M.S., J.D., Director Center for Safe and Responsible Internet Use URL: http://cyberbully.org or http://csriu.org

More information

A Time to Tell Troop Meeting Guide

A Time to Tell Troop Meeting Guide A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as

More information

Lesson 3 Preventing Bullying

Lesson 3 Preventing Bullying Lesson 3 Preventing Bullying Overview This lesson focuses on bullying. Students read and react to the thoughts of someone who is a target of bullying. They identify key elements of bullying and discuss

More information

Idaho. Coalition Against Sexual & Domestic Violence Engaging Voices, Creating Change. Table of Contents

Idaho. Coalition Against Sexual & Domestic Violence Engaging Voices, Creating Change. Table of Contents stalking Most victims are stalked by someone they know. Stalking is serious, often violent, and can escalate over time. This handbook provides information on stalking and available resources. Idaho Coalition

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

THE TRUTH ABOUT BULLIES

THE TRUTH ABOUT BULLIES THE TRUTH ABOUT BULLIES OVERVIEW: The goal of this activity is to inform and educate students about bullying. The lesson plan asks students to consider a list of statements about bullies and to decide

More information

FIRBANK GRAMMAR SCHOOL

FIRBANK GRAMMAR SCHOOL FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

Grade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4

Grade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4 Cyberbullying and Harrassment 30 Minutes* Curriculum Expectations Health and Physical Education - 1.3, C2.2, C3.2 Language: Media - 1.5 Lesson 2 Learning Goals By the end of this lesson, students will

More information

Cranmere Primary School ANTI-BULLYING POLICY

Cranmere Primary School ANTI-BULLYING POLICY Cranmere Primary School reviewed Autumn 2015 Governors committee: Learning and Achievement Part i) Advice for children ANTI-BULLYING POLICY Bullying is never right. If you are being bullied tell someone.

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

e-rate toolkit Cyberbullying: Crossing the Line

e-rate toolkit Cyberbullying: Crossing the Line e-rate toolkit Cyberbullying: Crossing the Line Lesson Plan Essential Question: When does inappropriate online behavior cross the line to cyberbullying, and what can you do about it? Learning Overview

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

Talking to our children about Violence and Terrorism: Living in Anxious times

Talking to our children about Violence and Terrorism: Living in Anxious times Talking to our children about Violence and Terrorism: Living in Anxious times Living in Anxious Times: Introductory Remarks Since the September 11 attack America has changed. Children and adults alike

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

Parent Guide to Cyber bullying and Cyber threats

Parent Guide to Cyber bullying and Cyber threats School Address: 4450 S Mendenhall Rd Memphis, TN 38141 Tel: (901) 367 7814 Fax: (901) 367 7816 www.sememphis.org MEMPHIS SCHOOL OF EXCELLENCE Parent Guide to Cyber bullying and Cyber threats Young people

More information

Preventing Bullying and Harassment of Targeted Group Students. COSA August 2013 John Lenssen

Preventing Bullying and Harassment of Targeted Group Students. COSA August 2013 John Lenssen Preventing Bullying and Harassment of Targeted Group Students COSA August 2013 John Lenssen Definition Bullying is unfair and one-sided. It happens when someone keeps hurting, frightening, threatening,

More information

Their stories are tragic. A new chapter starts now. now.

Their stories are tragic. A new chapter starts now. now. ! Their stories are tragic. A new chapter starts now. now.! Bully is a movie that tells powerful stories about children and their families dealing with extreme pain and tragic consequences related to bullying.

More information

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence)

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) The prohibition against hazing, dating violence, harassment, intimidation or bullying is publicized in student handbooks and in the publications

More information

What does compassion look like?

What does compassion look like? Lesson One: What does compassion look like? Learning Objectives: Students will: Demonstrate an understanding of the concept compassion. Identify elements of compassion shown in various images. Begin to

More information

Digital Citizenship: Etiquette. My Online code & Breaking Down Hate Speech Grades 9-12

Digital Citizenship: Etiquette. My Online code & Breaking Down Hate Speech Grades 9-12 Digital Citizenship: Etiquette My Online code & Breaking Down Hate Speech Grades 9-12 Essential Question: What does it mean to do the right thing online? How can you create a community culture in which

More information

Preventing bullying: a guide for teaching assistants. SEN and disability: developing effective anti-bullying practice

Preventing bullying: a guide for teaching assistants. SEN and disability: developing effective anti-bullying practice Preventing bullying: a guide for teaching assistants SEN and disability: developing effective anti-bullying practice Preventing bullying: a guide for teaching assistants 2 Introduction This guide is based

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

ACTION AGAINST BULLYING POLICY

ACTION AGAINST BULLYING POLICY Page 1 of 13 ACTION AGAINST BULLYING POLICY We want our pupils to be: Eager, excited, curious and engaged in learning. Have a sense of self and are happy, confident and emotionally healthy. Able to co-operate

More information

Mental Health Role Plays

Mental Health Role Plays Mental Health Role Plays Goals: To discuss various mental health issues and mental illnesses. To discuss stigma, support and treatment options surrounding mental health issues and mental illnesses. Requirements:

More information

CYBERBULLYING TEACHER S GUIDE:

CYBERBULLYING TEACHER S GUIDE: TEACHER S GUIDE: CYBERBULLYING LEARNING OBJECTIVES Students will understand the meaning of cyberbully. Students will learn to recognize different forms of cyberbullying. Students will learn different strategies

More information

Portmarnock Community School ICT and Social Media Expected Use Policy. June 2013

Portmarnock Community School ICT and Social Media Expected Use Policy. June 2013 Portmarnock Community School ICT and Social Media Expected Use Policy June 2013 1.0 Introduction Portmarnock Community School recognizes that access to Information and Communication Technology (ICT) gives

More information

Child Protection. Be vigilant, report child abuse

Child Protection. Be vigilant, report child abuse Child Protection Be vigilant, report child abuse Introduction All children have the right to live free of abuse. Most children grow up in families where they are safe and secure. Others may be abused

More information

Predators will use information obtained from children to gain trust and friendship

Predators will use information obtained from children to gain trust and friendship 1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and

More information

OPENING ACTIVITY BALL OF STRING FLING

OPENING ACTIVITY BALL OF STRING FLING NWAC Youth Violence Prevention Workshop Bullying OPENING ACTIVITY BALL OF STRING FLING Acknowledgements Recognizing and Responding to Violence against Women in Aboriginal Communities created in conjunction

More information

Anti-Bullying Policy. Page 1 of 6

Anti-Bullying Policy. Page 1 of 6 Anti-Bullying Policy Date of Last Review: May 2016 Reviewed by: Mr R Beattie Agreed by Governors: Frequency of Review: Annually Date of Next Review: May 2017 Page 1 of 6 Statement of Intent 1 We are committed

More information

Girls & Cyber- bullying

Girls & Cyber- bullying MARC Research Results First Report March, 2010 Girls & Cyber- bullying Elizabeth K. Englander, Ph.D. Director, Massachusetts Aggression Reduction Center Bridgewater State University Bridgewater, Massachusetts

More information

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really

More information

Internet Safety. A guide to staying smart & safe online

Internet Safety. A guide to staying smart & safe online Internet Safety A guide to staying smart & safe online What you will learn Privacy how to keep your information safe & secure Safety how to protect yourself & your family online It s not just about computers

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

Eanes Independent School District Responsible Use Guidelines for Technology

Eanes Independent School District Responsible Use Guidelines for Technology Eanes Independent School District Responsible Use Guidelines for Technology My student and I are committed to the Responsible Use Guidelines. By signing this, we commit to discussing and reviewing the

More information

Springfield Public Schools

Springfield Public Schools Springfield Public Schools BULLYING POLICY Approved by School Committee May 13, 2010 Amended March 6, 2014 Amended December 5, 2014 SPRINGFIELD PUBLIC SCHOOLS BULLYING PREVENTION POLICY INTRODUCTION Bullying

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

What do I Need to Know?

What do I Need to Know? Community Legal Information Association of PEI What do I Need to Know? A Guide to Child Protection for Youth Number to call evenings, weekends and holidays if you are being abused: 368-6868 or 1-800-341-6868

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

A Parents Guide to. 2014 ConnectSafely.org

A Parents Guide to. 2014 ConnectSafely.org A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

SWITZERLAND COUNTY School Corporation Policy Anti-Bullying Policy

SWITZERLAND COUNTY School Corporation Policy Anti-Bullying Policy SWITZERLAND COUNTY School Corporation Policy Anti-Bullying Policy SCSC POLICY 6.72 The following policy has been established by the school board of Switzerland County School Corporation regarding anti-bullying.

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

Policy/Program Memorandum No. 128

Policy/Program Memorandum No. 128 Date of Issue: December 5, 2012 Effective: Until revoked or modified Subject: Application: THE PROVINCIAL CODE OF CONDUCT AND SCHOOL BOARD CODES OF CONDUCT Directors of Education Supervisory Officers and

More information

School Policy Regarding Computer Use, Technology and Internet Access

School Policy Regarding Computer Use, Technology and Internet Access School Policy Regarding Computer Use, Technology and Internet Access Please read the following carefully, as it provides information about the responsibilities and expectations regarding use of school

More information

It is hard to express just how awful the whole situation was and the problems that it still brings us five years on.

It is hard to express just how awful the whole situation was and the problems that it still brings us five years on. Bullying of children with disabilities and Special Educational Needs in schools: briefing paper for parents on the views and experiences of other parents, carers and families Introduction This briefing

More information

Are You In An Emotionally Destructive Relationship?

Are You In An Emotionally Destructive Relationship? Are You In An Emotionally Destructive Relationship? By Leslie Vernick From Chapter 1 The Emotionally Destructive Relationship Seeing It! Stopping It! Surviving It! (Harvest House Publishers 2007) Complete

More information

Today s mobile ecosystem means shared responsibility

Today s mobile ecosystem means shared responsibility It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has

More information

Wisconsin Anti-Bullying Center

Wisconsin Anti-Bullying Center Patrick Evans, M.S. CESA 7 - Project Management Consultant Green Bay, Wisconsin Certified Trainer Wisconsin Emergency Management Multi-Hazard Emergency Planning for Schools Writer, Editor, Contributor,

More information

COMPUTERS & INTERNET SAFETY. Saint Francis Academy April 26, 2012

COMPUTERS & INTERNET SAFETY. Saint Francis Academy April 26, 2012 COMPUTERS & INTERNET SAFETY Saint Francis Academy April 26, 2012 HELLO! Mr. Michael Hoehl Pronounced Mr. Hale AGENDA Let s talk about the Internet! Challenges Trivia Safety Awareness Call to Action CHALLENGE

More information

STUDENT BULLYING PREVENTION AND INTERVENTION

STUDENT BULLYING PREVENTION AND INTERVENTION 0115 STUDENT BULLYING PREVENTION AND INTERVENTION The Board of Education is committed to providing an educational and working environment that promotes respect, dignity and equality. The Board recognizes

More information

STOP BULLYING. take a stand! A half hour special from IN THE MIX, the award-winning weekly PBS teen series KNOW?

STOP BULLYING. take a stand! A half hour special from IN THE MIX, the award-winning weekly PBS teen series KNOW? STOP BULLYING take a stand! A half hour special from IN THE MIX, the award-winning weekly PBS teen series Hosted by Erika Harold, Miss America 2003, herself a victim of severe harassment, this solution

More information

FAIRFIELD AREA SCHOOL DISTRICT

FAIRFIELD AREA SCHOOL DISTRICT No. 249 FAIRFIELD AREA SCHOOL DISTRICT SECTION: PUPILS TITLE: BULLYING / CYBERBULLYING ADOPTED: REVISED: August 11, 2015 249. BULLYING / CYBERBULLYING 1. Purpose 2. Definitions The Board is committed to

More information

UTC READING Anti-Bullying Policy

UTC READING Anti-Bullying Policy UTC READING Anti-Bullying Policy Introduction Bullying may be defined as deliberately hurtful behaviour usually repeated over a period of time, where it is difficult for those bullied to defend themselves.

More information

Whether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives.

Whether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives. Cyberbullying Whether it happens at school or off-campus, cyberbullying disrupts and affects all aspects of students lives. By Ted Feinberg and Nicole Robey Ted Feinberg is the assistant executive director

More information

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone? SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers

More information

WHOLE SCHOOL ANTI-BULLYING POLICY

WHOLE SCHOOL ANTI-BULLYING POLICY 130 High Road, Buckhurst Hill, Essex IG9 5SD Telephone number: 0208 504 1133 WHOLE SCHOOL ANTI-BULLYING POLICY 1 Persons responsible: The Head Teacher, in consultation with the Directors, the Governing

More information

Classroom Toolkit for National Bullying Prevention Awareness Week

Classroom Toolkit for National Bullying Prevention Awareness Week Classroom Toolkit for National Bullying Prevention Awareness Week Uniting people, schools, and communities nationwide to prevent bullying Promote bullying awareness in your classroom by using the activities

More information

How To Prevent Bullying At The Beaconsfield School

How To Prevent Bullying At The Beaconsfield School ANTI-BULLYING POLICY 2015 Approved by the Governing Body: 25 th November 2015 Approved by the Learning & Development Committee: 21 st October 2015 Approved by Leadership Team: 8 th October 2015 Review

More information

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying

More information

Improve Your Ability to Handle Workplace Conflict: An Interview with Judy Ringer

Improve Your Ability to Handle Workplace Conflict: An Interview with Judy Ringer Improve Your Ability to Handle Workplace Conflict: An Interview with Judy Ringer Recently our local newspaper interviewed me on the subjects of workplace conflict, difficult people, and how to manage them

More information

The Bullying Triangle

The Bullying Triangle R343 Justin Hall Kansas State University Manhattan, Kansas 66506 785-532-5773 http://www.theringofvalor.com Charles A. Smith, Ph.D. The Bullying Triangle.......... An Activity for Fifth and Sixth Graders

More information

Anti Bullying Policy

Anti Bullying Policy BRABYNS PREPARATORY SCHOOL Anti Bullying Policy This policy applies all pupils in the school, including in the EYFS Created July 2014 Revised August 2015 Date for revision august 2016 Lee Sanders. Headteacher

More information

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents June 2012 The Digital Divide: How the Online Behavior of Teens is Getting Past Parents Parent Disconnect Despite the obvious disconnect between teens online behaviors and parents knowledge of them, parents

More information