You are here

Preventing Cyber-Bullying: A Resource Guide for Parents and Teachers

Filed Under:
Publication Number: P2587
Updated: September 22, 2016
View as PDF: P2587.pdf

Online communication can be very difficult because it lacks emotion. We cannot see facial expressions or hear voice intonation. With online communication, be sure to put the information in context before responding.

A child is looking upset due to bullying.

Defining the Issue

From the playground to the locker room, bullying has long been a problem for children, preteens, and teenagers alike. For the most part, traditional bullying is characterized by the face-to-face relationship of the bully to his or her victim and the ability of the victim to escape. But with new technologies—instant messaging, text messaging, e-mail, social networking sites, video capable cell phones, and the like—bullying has taken on a new life and a new name: cyberbullying.

With the new technologies, bullies can harass their victims 24/7 and reach a much larger audience. In addition, the bullying often follows the victim for much longer. With cyberbullying, both the bully and the victim are minors. Cyberbullying should not be confused with cyberharassment or cyberstalking, both of which have an adult in the equation.

 

Did You Know?

  • Cyberbullies are twice as likely to be girls.
  • 75 percent of teen victims of cyberbullying received the message at home.
  • Only 35 percent told their parents about being bullied.
  • Instant messaging is the most commonly used tool for cyberbullies.

 

Your Child’s Cyberbully Toolbox

There are several rules that can help your child deal with the cyberbullies in your neighborhood. The most important thing is to make sure your child knows he/she can talk to you about being bullied. Also, teach your child these things:

  • Never respond to the cyberbully; put down the mouse and walk away.
  • Never say anything online you wouldn’t say face to face.
  • Never give out your password to anyone—even friends!
  • Never post your personal information online.

 

Your Response to Cyberbullying

  • Avoid the temptation to respond to the cyberbully. This usually only escalates the situation.
  • Talk to your children about the situation. Do they know who it is? How long has it been going on? How are they dealing with it emotionally?
  • Supervise computer use and frequently review “buddy” lists.
  • Keep instant messages, text messages, e-mails, and other electronic messages for evidence.
  • Escalate your response as the threat to your child worsens.

 

Gathering Evidence

Taking a Simple Print Screen

  1. Hold down the Control key and the Print Screen key on your keyboard at the same time.
  2. Press the Control key plus the letter C to copy the image on the screen.
  3. Open up a blank document (for example, in Word) and press the Control key and the letter V to paste the image on the screen.

 

Print screens are quick and easy to create, but they will not hold up in court. In order to provide usable evidence, you will also need to save and copy the source or header information.

 

A screenshot of a hateful email sent by a bully.

Looking at the Header or Source Information in an E-mail

For Gmail (Google e-mail):

  1. Open the e-mail by clicking on the subject line.
  2. Click the down arrow next to Reply.
  3. In the drop-down menu, click Show Original.

 

For Yahoo! e-mail:

  1. Open the e-mail by clicking on the subject line.
  2. Scroll down to the bottom of the page and click Full Headers.

 

For MSN Hotmail e-mail:

(This only works for the newest version of MSN Hotmail.)

  1. Right-click on the e-mail subject line.
  2. In the pop-up menu, click View Source.
  3. The source code will be displayed in a new window.

 

Finding source information in an email.
Finding source information in an email.

Creating a Google Alert

Creating a Google Alert will allow Google to notify you anytime information is posted on the Internet containing the search terms you specify. To create a Google Alert, try the following:

  1. Open Internet Explorer and type http://www.google.com/alerts into the address bar.
  2. Type the search terms you would like Google to notify you about (such as a name or address).
  3. Select the type of search you would like Google to conduct.
  4. Select how often you would like to be notified.
  5. Enter your email address, and then click Create Alert.

 

Googling your child’s name from time to time is a good way to see if anything has been posted about him or her on the Internet. Listed below are a few other things you might want to check out:

  • Images on Google
  • Facebook
  • Twitter
  • Snapchat
  • Instagram

 

Blocking Instant Messages

To ignore anyone not in your messenger list on Yahoo! Instant Messaging, try this:

  1. Click Messenger.
  2. In the drop-down menu, click Preferences.
  3. Under Category, select Ignore List.
  4. Select the button next to “Ignore anyone not on my Messenger List.”
  5. Click Apply.
  6. Click OK.

If you want to block just one person, click Ignore in the instant message itself.

 

Implementing Acceptable Use Policies for Schools

Many schools face a difficult task when it comes to disciplining students who cyberbully other students or school staff. On the one hand, they have the First Amendment guaranteeing free speech; on the other hand, they have students who are being bullied daily.

It is nearly impossible for school administrators to exercise authority over students’ out-of-school behavior. Administrators should include a provision in the school’s acceptable use policy, stating the school has the right to intervene if a student’s off-campus behavior impacts another student’s well-being.

Schools should consider the following when dealing with cyberbullying:

  • Make sure both parents and students sign the policy.
  • Teach students cyberethics and appropriate responses to cyberbullying.
  • When cyberbullying occurs, talk to the student and his or her parents/guardians first.
  • Record all instances of cyberbullying.
  • Contact police immediately if there is a threat of violence, child sexual solicitation, hate crimes, or stalking.

Sample Acceptable Use Policy

Under no circumstances will you, your parents, or your guardians, engage in any abusive action that directly impacts the well-being of another student, teachers, school administrators, staff, or the school itself. This includes any actions that originate on the school grounds or off school grounds. Abusive actions may be defined as cyberbullying, cyberstalking, or cyberharassment.

 

As a student of XYZ School or as a parent, I agree to abide by the following:

  • I will not send harassing or demeaning text messages to other students or school staff.

  • I will not use cell phones or digital cameras in locker rooms.

  • I will not take or transmit inappropriate or demeaning images or videos.

  • I will not post any harmful messages on social networking websites.

  • I will not post another student’s information online.

  • I will not impersonate another student online.

  • I will not engage in cyberbullying in my online activities. If I do engage in such activities, I understand that my rights to the school’s network will be suspended and I will be subject to disciplinary action by the school (see Policy ABC of the student handbook).

  • I will notify appropriate authorities if I discover any of the aforementioned activities taking place.

 

Student signature: ______________________________

Date: _________

 

 

Parent/guardian signature: ________________________

Date: _________

 

 

Understanding the Law in Mississippi

SEC. 97-45-15. “Cyberstalking”; penalties.

(1) It is unlawful for a person to:

(a) Use in electronic mail or electronic communication any words or language threatening to inflict bodily harm to any person or to that person’s child, sibling, spouse, or dependent, or physical injury to the property of any person, or for the purpose of extorting money or other things of value from any person.

(b) Electronically mail or electronically communicate to another repeatedly, whether or not conversation ensues, for the purpose of threatening, terrifying, or harassing any person.

(c) Electronically mail or electronically communicate to another and to knowingly make any false statement concerning death, injury, illness, disfigurement, indecent conduct, or criminal conduct of the person electronically mailed or of any member of the person’s family or household with the intent to threaten, terrify, or harass.

(d) Knowingly permit an electronic communication device under the person’s control to be used for any purpose prohibited by this section.

 

SEC. 97-45-17. Posting of messages through electronic media for purpose of causing injury to any person; penalties.

(1) A person shall not post a message for the purpose of causing injury to any person through the use of any medium of communication, including the Internet or a computer, computer program, computer system, or computer network, or other electronic medium of communication without the victim’s consent, for the purpose of causing injury to any person.

 

Want to Know More?


Publication 2587 (POD-09-16)

By Dr. Mariah Smith Morgan, Assistant Extension Professor, Extension Center for Technology Outreach.

 

Contact Your County Office

Authors

Assistant Extension Professor

Your Extension Experts

Extension Instructor
Extension Instructor
Distance Education Coordinator
Assistant Extension Professor
Extension Instructor
Extension Instructor
Extension Instructor

Related Publications

Publication Number: P3085
Publication Number: P3086
Publication Number: P3028
Publication Number: p3080

Pages