  {"id":1492,"date":"2024-04-25T16:15:33","date_gmt":"2024-04-25T20:15:33","guid":{"rendered":"https:\/\/www.yorku.ca\/uit\/infosecdev\/?page_id=1492"},"modified":"2024-04-25T16:24:57","modified_gmt":"2024-04-25T20:24:57","slug":"cyberbullying-and-online-harassment-guide-and-resources","status":"publish","type":"page","link":"https:\/\/www.yorku.ca\/uit\/infosec\/cyberbullying-and-online-harassment-guide-and-resources\/","title":{"rendered":"Cyberbullying and Online Harassment Guide and Resources"},"content":{"rendered":"\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>As a university, 快播视频 is dedicated to promoting a secure and inclusive online environment. It is vital that students, faculty, and staff are aware of the dangers of cyber threats and provided with tactics for dealing with them.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">UNDERSTANDING CYBERBULLYING AND ONLINE HARASSMENT<\/h4>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The deliberate and persistent harm inflicted through the use of computers, smartphones, and other electronic devices is known as cyberbullying. Early recognition of these behaviors is essential in order to stop them from becoming severe. Be alert for signs of online harassment, which can take various forms such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Trolling: This is the premeditated following and provoking of others on the internet, frequently with offensive content. Though most trolling is simply bothersome, on rare occasions, trolling can intensify into threats or even take on a larger scale when multiple people are harassing the target or the target's organization.<\/li><li>Doxing: This is the act of disclosing confidential personal data online that is not usually publicly available. This information may include sharing a person's private email, personal phone number, home address, and other details on multiple sites in order to intimidate the individual while encouraging further harassment.<\/li><\/ul>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">PROTECTING YOUR ONLINE PROFILE:<\/h4>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Your digital presence functions as your primary line of protection against cyberbullying. Passwords should be updated on a regular basis, two-factor authentication enabled, and social media privacy settings reviewed. Avoid disclosing significant personal data, and be cautious when accepting friend or connection requests from unknown users. Taking proactive measures towards safeguarding your online persona may discourage future harassers and protect your digital safety.<\/p>\n\n\n\n<p>Visit our\u00a0<a href=\"https:\/\/www.yorku.ca\/uit\/infosec\/abuse-via-email-and-social-media-online-safety-plan\/\">Online Safety Plan for Dealing with Harassment and Abuse via Email and Social Media<\/a><\/p>\n\n\n\n<p>Privacy policies and security settings change frequently and are unique to each platform. For the most recent privacy policies and security settings, please visit the specific social media site to learn more.<\/p>\n\n\n\n<p><a href=\"https:\/\/help.twitter.com\/en\/safety-and-security#ads-and-data-privacy\">Twitter<\/a>&nbsp;|&nbsp;<a href=\"https:\/\/www.facebook.com\/help\/\">Facebook<\/a>&nbsp;|&nbsp;<a href=\"https:\/\/www.facebook.com\/help\/instagram\/196883487377501\">Instagram<\/a>&nbsp;|&nbsp;<a href=\"https:\/\/support.tiktok.com\/en\/account-and-privacy\/account-privacy-settings\">TikTok<\/a>&nbsp;|&nbsp;<a href=\"https:\/\/www.linkedin.com\/help\/linkedin\/answer\/a1337839\/managing-your-account-and-privacy-settings-overview?lang=en\">LinkedIn<\/a>&nbsp;|&nbsp;<a href=\"https:\/\/support.snapchat.com\/en-US\/a\/privacy-settings2\">Snapchat<\/a>&nbsp;|&nbsp;<a href=\"https:\/\/support.discord.com\/hc\/en-us\/articles\/217916488-Blocking-Privacy-Settings-\">Discord<\/a>&nbsp;|&nbsp;<a href=\"https:\/\/www.reddithelp.com\/hc\/en-us\/categories\/360003246511\">Reddit<\/a>&nbsp;|&nbsp;<a href=\"https:\/\/faq.whatsapp.com\/3307102709559968\/?locale=en_US\">WhatsApp<\/a>&nbsp;|&nbsp;<a href=\"https:\/\/help.wechat.com\/cgi-bin\/newreadtemplate?t=help_center\/index&amp;lang=en&amp;Channel=helpcenter\">WeChat<\/a><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">DEALING WITH EXTERNAL HARASSMENT:<\/h4>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Cyberbullying might not always originate from within the university community. In the event of external harassment, it is critical to involve law enforcement and other relevant authorities. Keep detailed records of the incidents, preserve evidence, and report the harassment to local authorities. Work with the university's security team to ensure a coordinated response that prioritizes the safety of all involved parties.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">REPORTING ONLINE HARASSMENT AND CYBERBULLYING INCIDENTS:<\/h4>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>It is critical to report cyberbullying incidents as soon as possible to ensure that they are resolved quickly. In addition to reporting, preserve evidence by taking screenshots or documenting relevant information. Immediate and comprehensive reporting not only helps to resolve individual cases, but also contributes to a secure online environment for everyone.<\/p>\n\n\n\n<p>Contact&nbsp;<a href=\"https:\/\/www.yorku.ca\/safety\/security-services\/\">York Security Services<\/a><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">FOR ADDITIONAL RESOURCES AND SUPPORT, VISIT:<\/h4>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h5 class=\"wp-block-heading\">Students:<\/h5>\n\n\n\n<p><a href=\"https:\/\/oscr.students.yorku.ca\/\">Office of Student Community Relations (OSCR)<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/thecentre.yorku.ca\/\">Centre for Sexual Violence Response, Support &amp; Education<\/a><\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h5 class=\"wp-block-heading\">Faculty &amp; Staff:<\/h5>\n\n\n\n<p><a href=\"https:\/\/rights.info.yorku.ca\/online-harassment-guide-for-faculty-and-staff\/\">Centre for Human Rights, Equity and Inclusion Online Harassment Guide for Faculty and Staff<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.yorku.ca\/hr\/health-safety-employee-well-being\/\">Employee Wellbeing Office (Human Resources)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As a university, 快播视频 is dedicated to promoting a secure and inclusive online environment. It is vital that students, faculty, and staff are aware of the dangers of cyber threats and provided with tactics for dealing with them. UNDERSTANDING CYBERBULLYING AND ONLINE HARASSMENT The deliberate and persistent harm inflicted through the use of computers, [&hellip;]<\/p>\n","protected":false},"author":1984,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","ngg_post_thumbnail":0,"footnotes":""},"tags":[],"class_list":["post-1492","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberbullying and Online Harassment Guide and Resources - Information Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.yorku.ca\/uit\/infosec\/cyberbullying-and-online-harassment-guide-and-resources\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberbullying and Online Harassment Guide and Resources - Information Security\" \/>\n<meta property=\"og:description\" content=\"As a university, 快播视频 is dedicated to promoting a secure and inclusive online environment. It is vital that students, faculty, and staff are aware of the dangers of cyber threats and provided with tactics for dealing with them. UNDERSTANDING CYBERBULLYING AND ONLINE HARASSMENT The deliberate and persistent harm inflicted through the use of computers, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yorku.ca\/uit\/infosec\/cyberbullying-and-online-harassment-guide-and-resources\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Security\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-25T20:24:57+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/cyberbullying-and-online-harassment-guide-and-resources\\\/\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/cyberbullying-and-online-harassment-guide-and-resources\\\/\",\"name\":\"Cyberbullying and Online Harassment Guide and Resources - Information Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#website\"},\"datePublished\":\"2024-04-25T20:15:33+00:00\",\"dateModified\":\"2024-04-25T20:24:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/cyberbullying-and-online-harassment-guide-and-resources\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/cyberbullying-and-online-harassment-guide-and-resources\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/cyberbullying-and-online-harassment-guide-and-resources\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberbullying and Online Harassment Guide and Resources\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#website\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/\",\"name\":\"Information Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#organization\",\"name\":\"Information Security\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/wp-content\\\/uploads\\\/sites\\\/806\\\/2025\\\/05\\\/Image-4.png\",\"contentUrl\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/wp-content\\\/uploads\\\/sites\\\/806\\\/2025\\\/05\\\/Image-4.png\",\"width\":1024,\"height\":1024,\"caption\":\"Information Security\"},\"image\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberbullying and Online Harassment Guide and Resources - Information Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.yorku.ca\/uit\/infosec\/cyberbullying-and-online-harassment-guide-and-resources\/","og_locale":"en_US","og_type":"article","og_title":"Cyberbullying and Online Harassment Guide and Resources - Information Security","og_description":"As a university, 快播视频 is dedicated to promoting a secure and inclusive online environment. It is vital that students, faculty, and staff are aware of the dangers of cyber threats and provided with tactics for dealing with them. UNDERSTANDING CYBERBULLYING AND ONLINE HARASSMENT The deliberate and persistent harm inflicted through the use of computers, [&hellip;]","og_url":"https:\/\/www.yorku.ca\/uit\/infosec\/cyberbullying-and-online-harassment-guide-and-resources\/","og_site_name":"Information Security","article_modified_time":"2024-04-25T20:24:57+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/cyberbullying-and-online-harassment-guide-and-resources\/","url":"https:\/\/www.yorku.ca\/uit\/infosec\/cyberbullying-and-online-harassment-guide-and-resources\/","name":"Cyberbullying and Online Harassment Guide and Resources - Information Security","isPartOf":{"@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#website"},"datePublished":"2024-04-25T20:15:33+00:00","dateModified":"2024-04-25T20:24:57+00:00","breadcrumb":{"@id":"https:\/\/www.yorku.ca\/uit\/infosec\/cyberbullying-and-online-harassment-guide-and-resources\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yorku.ca\/uit\/infosec\/cyberbullying-and-online-harassment-guide-and-resources\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/cyberbullying-and-online-harassment-guide-and-resources\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yorku.ca\/uit\/infosec\/"},{"@type":"ListItem","position":2,"name":"Cyberbullying and Online Harassment Guide and Resources"}]},{"@type":"WebSite","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#website","url":"https:\/\/www.yorku.ca\/uit\/infosec\/","name":"Information Security","description":"","publisher":{"@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yorku.ca\/uit\/infosec\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Organization","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#organization","name":"Information Security","url":"https:\/\/www.yorku.ca\/uit\/infosec\/","logo":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#\/schema\/logo\/image\/","url":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2025\/05\/Image-4.png","contentUrl":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2025\/05\/Image-4.png","width":1024,"height":1024,"caption":"Information Security"},"image":{"@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#\/schema\/logo\/image\/"}}]}},"taxonomy_info":[],"featured_image_src_large":false,"author_info":{"display_name":"clara03","author_link":"https:\/\/www.yorku.ca\/uit\/infosec\/author\/clara03\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/pages\/1492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/users\/1984"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/comments?post=1492"}],"version-history":[{"count":5,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/pages\/1492\/revisions"}],"predecessor-version":[{"id":2506,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/pages\/1492\/revisions\/2506"}],"wp:attachment":[{"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/media?parent=1492"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/tags?post=1492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}