1. 21st Century Bullying:
Cyber-Bullying
A Guide and Tutorial for Parents and
Educators on How to Recognize, Prevent,
and Address Cyber-Bullying
2. Cyber Bullying
A Statement of Goals
Tutorial Goals
1.Identify what constitutes cyber-bullying and review some examples.
2.Learn Preventative Cyber-Bullying Steps to Take.
3.Learn How to Address Cyber-Bullying.
3. Legal Definition of Cyber-Bullying
California Education Code 48900r: Engaged in an act of bullying. For purposes of this subdivision, the following
terms have the following meanings:
(1) "Bullying" means any severe or pervasive physical or verbal act or conduct, including
communications made in writing or by means of an electronic act, and including one or more acts
committed by a pupil or group of pupils as defined in Section 48900.2, 48900.3, or 48900.4,
directed toward one or more pupils that has or can be reasonably predicted to have the effect of
one or more of the following:
(A) Placing a reasonable pupil or pupils in fear of harm to that pupil's or those pupils'
person or property.
(B) Causing a reasonable pupil to experience a substantially detrimental effect on his
or her physical or mental health.
(C) Causing a reasonable pupil to experience substantial interference with his or her
academic performance.
(D) Causing a reasonable pupil to experience substantial interference with his or her
ability to participate in or benefit from the services, activities, or privileges provided
by a school.
(2) "Electronic act" means the transmission of a communication, including, but not limited to, a
message, text, sound, or image, or a post on a social network Internet Web site, by means of an
electronic device, including, but not limited to, a telephone, wireless telephone or other wireless
communication device, computer, or pager.
(3) "Reasonable pupil" means a pupil, including, but not limited to, an exceptional needs pupil,
who exercises average care, skill, and judgment in conduct for a person of his or her age, or for a
person of his or her age with his or her exceptional needs.
4. What is Bullying?
Physical Bullying is when one person uses threatening physical
action or force in order to make another person comply with
them, scare them, intimidate them, or harm them.
Verbal Bullying is when one person uses verbal communication to
intimidate, harm, or threaten another into doing or acting how the
bully wants . This would also include verbal retaliation threats with
terms such as “snitch, narc, tattle, etc.” that are intended to keep the
victim from speaking out.
Gossiping or spreading rumors about another person is also a form
of bullying meant to hurt someone else’s feelings, intimidate them,
and /or harm them.
5. Adding Cyber to the Bullying
When the bullying is communicated or committed through an electronic device or an electronic
transmission, it becomes cyber bullying. This would include threats, intimidation, gossip,
rumors, or any other verbal or visual actions that are meant to harm another person.
Cyber bullying can take place on cell phones, tablets,
computers, laptops, etc. Cyber bullying messages can
be transmitted via text messages, social media posts,
images, pictures, and video.
7. How do parents and educators prevent
Cyber Bullying?
Be Active… Be Vigilant
For parents, monitor, monitor, and monitor
your child’s use on the internet. Let them
know that you expect computer use to be
done in an open area of the house.
For educators, circulate, circulate, and keep
circulating around when students are on
the computer in your classroom or in the computer lab.
Give Expectations
Both parents and educators need to let kids know that if
you would not say something in person to someone, you
would not say it to them online in a post or text.
8. How do parents and educators prevent
Cyber Bullying?
Utilize computer monitoring software
Parents can purchase or download software that can
monitor what sites children go to, block certain sites as
needed, and provide a way to see what kids are posting.
Educators should check with their local IT person to learn
what is software available at the school site, what is in
place, what its limitations are and how to use it.
Set up guidelines at home for social media use
Parents should talk to their child about rules for using social media
sites. One of the rules should be that parents have the passwords for
the child’s site in order to be able to check or access their account.
Educators should already have usernames and password
lists set up from their IT person for student use at school
9. How do parents and educators prevent
Cyber Bullying?
Don’t be afraid to
terminate or block access.
Parents can always end their child’s
access to a computer, website, or
cell phone if the child is not
following the expectations laid out
or agreed upon. This can be a
temporary restraint or a permanent
one depending on the situation.
Educators can follow suit by making
sure that they inform
the parent, administration, and the
IT person if a student
violates the school computer use
agreement.
13. Cyber Bullying has occurred.
First step is determine and identify…
In the video we saw, it was a clear case of cyber-bullying
and fulfills the legal requirements of Ed Code 48900r.
The steps to be taken are as follows:
1. An adult is informed by the student/child of the
situation/event.
2. The adult confirms the good choice of the student
in letting him/her know.
3. The adult reviews the electronic evidence of the
cyber-bullying attack and if possible generates a
hard copy.
4. The adult meets with the school administrator to review what has
happened, who is involved, and what has been done.
5. School administrator can help determine if local law enforcement also
needs to be contacted.
Now what?
14. Cyber Bullying has occurred.
Second step is contact the school…
1. The administrator will take the cyber-bullying information
and evidence and meet first with the alleged bully.
2. The administrator will determine the level of responsibility
for the cyber-bullying by the bully and if any other
participants are involved.
3. The administrator will then contact
the parents of the bully and inform
them of the situation and schedule
a meeting. This is a meeting only
between the parent’s of the bully
and the administrator. The victim and
victim’s parents are not there.
15. Cyber Bullying has occurred.
Third step is resolution…
1. Consequences are determined and explained. In
this situation a violation of CA EC 48900r carries
a consequence of suspension. The amount of
days the student is suspended will be
determined based on the event and past
discipline history, but will be between 1 and 5
days. This is solely a school administration
decision.
2. Depending on the severity or the frequency of the
cyber-bullying, law enforcement may be
contacted.
3. Any further participants related to this incident
will be dealt with. Any record of the cyber-
bullying will be removed and/or deleted.
4. Counseling and other follow-up services will be
suggested/required for the victim and/or the
bully.
16. Cyber Bullying has occurred.
Final step is outcome…
Reviewing the cycle of bullying, we can see that with our outcome, the victim has stood up
for herself; the bully has been identified and consequenced as well as any other participants
and/or supporters; parents have been informed, made aware, and been involved; the cyber-
bullying has been removed or deleted; and follow-up services have been established
including counseling. In this manner the cycle has been broken successfully.
This was all accomplished by the adults knowing how to identify cyber-bullying, how to
prevent it when possible, and how to address it successfully for both the victim and bully.
18. Cyber Bullying Assessment
(write down answers and turn in to proctor)
1) True or False - Bullying is any severe or pervasive physical or verbal act or conduct that is intentionally harmful to another person?
2) Which device could be used in a cyber-bullying situation? A) Cell Phone B) Computer C) Laptop D) All of the above
3) Which law is cyber-bullying prohibited by? A) EC 48900r B) EC 5519x C) PC 1229 D) PC 3451k
4) Where should a parent allow their child to work on a laptop computer? A) At their desk in their room B) At a friend’s house C) In
the dining room supervised D) All of the above
5) What information should a parent have about their child’s social media site? A) The child’s friend list B) The child’s username and
password C) The child’s avatar D) The child’s permission
6) Who has the final say on control of a cell phone or computer at home? A) The parent/guardian B) The school C) The Child D) The
government
7) Who should an educator contact if a student violates the school computer use agreement? A) Another teacher B) School
administrator C) School secretary D) No one
8) Who should the parent contact if cyber-bullying is suspected? A) Law enforcement B) School psychologist C) School nurse D)
School administrator
9) True or False - A hard copy of what was stated or posted is strong evidence for a cyber bullying crime?
10) Who should the school administrator involve with a suspected bully? A) The suspected bully’s parents B) Law enforcement C) The
suspected bully’s teacher D) The school counselor
11) True or False – The victim should be praised for standing up for themselves verbally and telling a trusted adult.
12) What follow-up should be required for the victim and bully? A) Jail time B) Apologies C) Counseling D) Expulsion