SlideShare une entreprise Scribd logo
1  sur  15
Cyber Bullying
                          By
              Abhishek Desai
DIGICorp Information Systems
What is it?
   "Cyberbullying involves the use of information
    and communication technologies such as e-
    mail, cell phone and pager text messages,
    instant messaging, defamatory personal Web
    sites, and defamatory online personal polling
    Web sites, to support deliberate, repeated,
    and hostile behaviour by an individual or
    group, that is intended to harm others." - Bill
    Belsey
What forms does cyber
bullying take?
   Email
   SMS
   MMS
   IM (Instant Messaging)
   Blogs
   Personal websites
   Personal polling sites
Cyber bullying and Law
   Cyber bullying is a CRIMINAL ACT
   It is a CRIME to communicate repeatedly with
    someone if it causes them to fear for their own
    safety or safety of others
   It is also a crime to publish “defamatory libel” –
    writing something which is intended to insult
    someone
   It violates the human rights act.
   Personally I believe it is an act of “COWARDICE”
What can be done?
   Awareness and education
       www.cyberbullying.ca

   You should never send message to others
    when you are angry

   You should never open a message from
    someone you don’t know
What can be done? Contd          ..



   If you encounter something on internet which
    doesn’t feel right don’t open it

   You don’t have to be always on the internet

   Schools should update the Internet and
    computer access policies as soon as possible
If you are a victim…
   DO NOT keep it to yourself, You are not
    ALONE.
   Inform an ADULT you know and trust.
   Inform you Internet Service Provider or
    Mobile service provider
   Inform your LOCAL POLICE
   Do not reply to message from cyber bullies
   Do not erase or delete the message from
    cyber bullies
What kind of information can
be saved?
   Save following from the email
       E-mail address
       Date and time received
       Copies of relevant emails with full email headers

   Save following from chat room
       Date and time of chat
       Name and URL of the chat room
       Nickname of the offending person
       Email address if available
       Screenshot of chat room
Report Cyber bullying Email
   Report cyber bullying email to your ISPs.

   Emails can be traced easily using different
    available software

   If somebody has stolen your account contact
    support team of that mail site.
Report chat room cyber
bullying
   Highlight the chatter’s name
   Use the ignore button to stop all
    conversations
   Take a screen shot of the abuse
   Note the time and date of the chat
   Report to chat room operator or service
    operator
   Speak to parent or a teacher
Its not your fault
   You should know that it is not your fault if bad
    people are there in the world
   You should not be ashamed of telling it to
    adults or teachers
   People are not anonymous on the internet.
    With the right information they can be easily
    traced and punished by local police or
    authorities.
Protect yourself
   Never arrange a meeting with someone you
    don’t know

   If you have to, go with your parents.

   You may need to delete your current email
    accounts, cell phone etc and setup a news
    ones.
Examples of cyber-bullying
   One example of cyber-bullying was the Star Wars kid whose
    classmates uploaded video footage of him posing as the Star
    Wars character Darth Maul onto Kazaa in 2003. The footage was
    downloaded extensively and modified causing the subject
    extensive embarrassment resulting in psychiatric treatment.

   13 year old Vermont boy Ryan Halligan committed suicide, as a
    result of cyber-bullying:
     "Ryan Halligan hanged himself after prolonged bullying at school
       and at home through the Internet. He was repeatedly taunted
       online. Due to the continued bullying, Ryan latched on to the idea
       of killing himself as vengeance against those who had hurt him."
       [6]
Questions?
Thank You

Contenu connexe

Tendances

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingCoachElrod
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parentsdamarissepulveda
 
My protection plan
My protection planMy protection plan
My protection planShakena12
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaAlexander Berta
 
Cyberstalking
CyberstalkingCyberstalking
CyberstalkingTrevschic
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1sabrinacotta
 
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...Kim Wesson
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingNuraySmat
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingQazi Anwar
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
The Hazards Of Cyberbullying
The Hazards Of CyberbullyingThe Hazards Of Cyberbullying
The Hazards Of CyberbullyingIC
 

Tendances (19)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 
My protection plan
My protection planMy protection plan
My protection plan
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Internet safety
Internet safety Internet safety
Internet safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
Cyberbullying: DON'T DO IT! How to recognize it, understanding it and CONSEQU...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
The Hazards Of Cyberbullying
The Hazards Of CyberbullyingThe Hazards Of Cyberbullying
The Hazards Of Cyberbullying
 

Similaire à Abhishek cyber bullying

Similaire à Abhishek cyber bullying (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying!!!
Cyberbullying!!! Cyberbullying!!!
Cyberbullying!!!
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Cyberbullying power pot student copy
Cyberbullying  power pot student copyCyberbullying  power pot student copy
Cyberbullying power pot student copy
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying power ppt student copy
Cyberbullying  power ppt  student copyCyberbullying  power ppt  student copy
Cyberbullying power ppt student copy
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 

Plus de parulata

The philosophy of timetabling
The philosophy of timetablingThe philosophy of timetabling
The philosophy of timetablingparulata
 
School leadership
School leadershipSchool leadership
School leadershipparulata
 
Riverside Eduretreat
Riverside Eduretreat Riverside Eduretreat
Riverside Eduretreat parulata
 
Riverside training program ppt
Riverside training program pptRiverside training program ppt
Riverside training program pptparulata
 
Riverside framework
Riverside frameworkRiverside framework
Riverside frameworkparulata
 
Phonics ( New)
Phonics ( New)Phonics ( New)
Phonics ( New)parulata
 
Multiple Intelligence theory
Multiple Intelligence theory Multiple Intelligence theory
Multiple Intelligence theory parulata
 
Differentiated Instruction
Differentiated InstructionDifferentiated Instruction
Differentiated Instructionparulata
 
Creative classroom workshop
Creative classroom workshopCreative classroom workshop
Creative classroom workshopparulata
 
Classroom mgmt (mod)
Classroom mgmt (mod)Classroom mgmt (mod)
Classroom mgmt (mod)parulata
 
Adult learning model
Adult learning modelAdult learning model
Adult learning modelparulata
 
Interest center final
Interest center finalInterest center final
Interest center finalparulata
 
Funderstanding
FunderstandingFunderstanding
Funderstandingparulata
 
Assembly performances
Assembly performancesAssembly performances
Assembly performancesparulata
 
Adolescence
AdolescenceAdolescence
Adolescenceparulata
 
Teachers poem
Teachers poemTeachers poem
Teachers poemparulata
 
Sciencequiz08ppt
Sciencequiz08pptSciencequiz08ppt
Sciencequiz08pptparulata
 
Yadu computer internals final-2
Yadu  computer internals final-2Yadu  computer internals final-2
Yadu computer internals final-2parulata
 
Yadu computer internals final 1
Yadu  computer internals final 1Yadu  computer internals final 1
Yadu computer internals final 1parulata
 

Plus de parulata (20)

The philosophy of timetabling
The philosophy of timetablingThe philosophy of timetabling
The philosophy of timetabling
 
School leadership
School leadershipSchool leadership
School leadership
 
Riverside Eduretreat
Riverside Eduretreat Riverside Eduretreat
Riverside Eduretreat
 
Riverside training program ppt
Riverside training program pptRiverside training program ppt
Riverside training program ppt
 
Riverside framework
Riverside frameworkRiverside framework
Riverside framework
 
Planner
PlannerPlanner
Planner
 
Phonics ( New)
Phonics ( New)Phonics ( New)
Phonics ( New)
 
Multiple Intelligence theory
Multiple Intelligence theory Multiple Intelligence theory
Multiple Intelligence theory
 
Differentiated Instruction
Differentiated InstructionDifferentiated Instruction
Differentiated Instruction
 
Creative classroom workshop
Creative classroom workshopCreative classroom workshop
Creative classroom workshop
 
Classroom mgmt (mod)
Classroom mgmt (mod)Classroom mgmt (mod)
Classroom mgmt (mod)
 
Adult learning model
Adult learning modelAdult learning model
Adult learning model
 
Interest center final
Interest center finalInterest center final
Interest center final
 
Funderstanding
FunderstandingFunderstanding
Funderstanding
 
Assembly performances
Assembly performancesAssembly performances
Assembly performances
 
Adolescence
AdolescenceAdolescence
Adolescence
 
Teachers poem
Teachers poemTeachers poem
Teachers poem
 
Sciencequiz08ppt
Sciencequiz08pptSciencequiz08ppt
Sciencequiz08ppt
 
Yadu computer internals final-2
Yadu  computer internals final-2Yadu  computer internals final-2
Yadu computer internals final-2
 
Yadu computer internals final 1
Yadu  computer internals final 1Yadu  computer internals final 1
Yadu computer internals final 1
 

Dernier

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Dernier (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Abhishek cyber bullying

  • 1. Cyber Bullying By Abhishek Desai DIGICorp Information Systems
  • 2. What is it?  "Cyberbullying involves the use of information and communication technologies such as e- mail, cell phone and pager text messages, instant messaging, defamatory personal Web sites, and defamatory online personal polling Web sites, to support deliberate, repeated, and hostile behaviour by an individual or group, that is intended to harm others." - Bill Belsey
  • 3. What forms does cyber bullying take?  Email  SMS  MMS  IM (Instant Messaging)  Blogs  Personal websites  Personal polling sites
  • 4. Cyber bullying and Law  Cyber bullying is a CRIMINAL ACT  It is a CRIME to communicate repeatedly with someone if it causes them to fear for their own safety or safety of others  It is also a crime to publish “defamatory libel” – writing something which is intended to insult someone  It violates the human rights act.  Personally I believe it is an act of “COWARDICE”
  • 5. What can be done?  Awareness and education  www.cyberbullying.ca  You should never send message to others when you are angry  You should never open a message from someone you don’t know
  • 6. What can be done? Contd ..  If you encounter something on internet which doesn’t feel right don’t open it  You don’t have to be always on the internet  Schools should update the Internet and computer access policies as soon as possible
  • 7. If you are a victim…  DO NOT keep it to yourself, You are not ALONE.  Inform an ADULT you know and trust.  Inform you Internet Service Provider or Mobile service provider  Inform your LOCAL POLICE  Do not reply to message from cyber bullies  Do not erase or delete the message from cyber bullies
  • 8. What kind of information can be saved?  Save following from the email  E-mail address  Date and time received  Copies of relevant emails with full email headers  Save following from chat room  Date and time of chat  Name and URL of the chat room  Nickname of the offending person  Email address if available  Screenshot of chat room
  • 9. Report Cyber bullying Email  Report cyber bullying email to your ISPs.  Emails can be traced easily using different available software  If somebody has stolen your account contact support team of that mail site.
  • 10. Report chat room cyber bullying  Highlight the chatter’s name  Use the ignore button to stop all conversations  Take a screen shot of the abuse  Note the time and date of the chat  Report to chat room operator or service operator  Speak to parent or a teacher
  • 11. Its not your fault  You should know that it is not your fault if bad people are there in the world  You should not be ashamed of telling it to adults or teachers  People are not anonymous on the internet. With the right information they can be easily traced and punished by local police or authorities.
  • 12. Protect yourself  Never arrange a meeting with someone you don’t know  If you have to, go with your parents.  You may need to delete your current email accounts, cell phone etc and setup a news ones.
  • 13. Examples of cyber-bullying  One example of cyber-bullying was the Star Wars kid whose classmates uploaded video footage of him posing as the Star Wars character Darth Maul onto Kazaa in 2003. The footage was downloaded extensively and modified causing the subject extensive embarrassment resulting in psychiatric treatment.  13 year old Vermont boy Ryan Halligan committed suicide, as a result of cyber-bullying:  "Ryan Halligan hanged himself after prolonged bullying at school and at home through the Internet. He was repeatedly taunted online. Due to the continued bullying, Ryan latched on to the idea of killing himself as vengeance against those who had hurt him." [6]