{"id":16,"date":"2015-03-03T15:20:06","date_gmt":"2015-03-03T20:20:06","guid":{"rendered":"http:\/\/www.stjohns.k12.fl.us\/sdfs\/?page_id=16"},"modified":"2023-05-01T16:25:22","modified_gmt":"2023-05-01T20:25:22","slug":"cyberbullying","status":"publish","type":"page","link":"https:\/\/www.stjohns.k12.fl.us\/sdfs\/cyberbullying\/","title":{"rendered":"Cyberbullying, Social Media, &amp; Internet Safety"},"content":{"rendered":"<p><img decoding=\"async\" class=\"size-full wp-image-61 alignleft\" src=\"https:\/\/www.stjohns.k12.fl.us\/sdfs\/wp-content\/uploads\/sites\/67\/2015\/03\/phone.png\" alt=\"phone\" width=\"149\" height=\"149\" srcset=\"https:\/\/www.stjohns.k12.fl.us\/sdfs\/wp-content\/uploads\/sites\/67\/2015\/03\/phone.png 149w, https:\/\/www.stjohns.k12.fl.us\/sdfs\/wp-content\/uploads\/sites\/67\/2015\/03\/phone-100x100.png 100w\" sizes=\"(max-width: 149px) 100vw, 149px\" \/>Cyberbullying is bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites.<\/p>\n<p>Examples of cyberbullying include mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles.<\/p>\n<p><strong>Report Cyberbullying<\/strong><br \/>\nWhen cyberbullying happens, it is important to document and report the behavior so it can be addressed.<\/p>\n<p><strong>Steps to Take Immediately<\/strong><\/p>\n<ul>\n<li>Don\u2019t respond to and don\u2019t forward cyberbullying messages.<\/li>\n<li>Keep evidence of cyberbullying. Record the dates, times, and descriptions of instances when cyberbullying has occurred. Save and print screenshots, emails, and text messages. Use this evidence to report cyberbullying to web and cell phone service providers.<\/li>\n<li>Block the person who is cyberbullying.<\/li>\n<\/ul>\n<p><strong><a href=\"https:\/\/cyberbullying.org\/standing-up-to-cyberbullying-tips-for-teens.pdf\">Tips for Teens &#8211; Preventing Cyberbullying<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/cyberbullying.org\/Top-Ten-Tips-Teens-Response.pdf\">Tips for Teens &#8211; Responding to Cyberbullying<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.stjohns.k12.fl.us\/sdfs\/wp-content\/uploads\/sites\/67\/2023\/05\/Cyberbullying-Warning-Signs.pdf\">Cyberbullying Warning Signs<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/cyberbullying.org\/tips-for-parents-when-your-child-is-cyberbullied.pdf\"><strong>What To Do When Your Child is Cyberbullied<\/strong><\/a><\/p>\n<p><strong>Other useful Tip Sheets from the Cyberbullying Research Center-\u00a0<a href=\"https:\/\/cyberbullying.org\/resources\">https:\/\/cyberbullying.org\/resources<\/a><\/strong><\/p>\n<p><strong>Be Aware of What Your Kids are Doing Online<\/strong><\/p>\n<ul>\n<li>Talk with your kids about cyberbullying and other online issues regularly.<\/li>\n<li>Know the sites your kids visit and their online activities. Ask where they\u2019re going, what they\u2019re doing, and who they\u2019re doing it with.<\/li>\n<li>Tell your kids that as a responsible parent you may review their online communications if you think there is reason for concern. Installing parental control filtering software or monitoring programs are one option for monitoring your child\u2019s online behavior, but do not rely solely on these tools.<\/li>\n<li>Have a sense of what they do online and in texts. Learn about the sites they like. Try out the devices they use.<\/li>\n<li>Ask for their passwords, but tell them you\u2019ll only use them in case of emergency.<\/li>\n<li>Ask to &#8220;friend&#8221; or &#8220;follow&#8221; your kids on social media sites or ask another trusted adult to do so.<\/li>\n<li>Encourage your kids to tell you immediately if they, or someone they know, is being cyberbullied. Explain that you will not take away their computers or cell phones if they confide in you about a problem they are having.<\/li>\n<\/ul>\n<h1>Social Media<\/h1>\n<p>Teaching Kids to be Smart About Social Media-\u00a0<a href=\"https:\/\/kidshealth.org\/en\/parents\/social-media-smarts.html\">https:\/\/kidshealth.org\/en\/parents\/social-media-smarts.html<\/a><\/p>\n<p><strong><a href=\"https:\/\/www.stjohns.k12.fl.us\/sdfs\/wp-content\/uploads\/sites\/67\/2023\/05\/smart-social-networking.pdf\">Smart Social Networking<\/a><\/strong><\/p>\n<h1>Internet Safety<\/h1>\n<p>There\u2019s a lot to deal with on the Internet \u2014 cyberbullies, privacy settings, gossip, and even cyber criminals. These resources can help parents and teens understand how to make safe choices when using the internet:<\/p>\n<p>Florida Department of Education \u2013 Internet Safety &#8211; <a href=\"http:\/\/www.fldoe.org\/safe-schools\/related-topics\/internet-safety.stml\">http:\/\/www.fldoe.org\/safe-schools\/related-topics\/internet-safety.stml<\/a><br \/>\nSafe Florida \u2013\u00a0<a href=\"http:\/\/www.safeflorida.net\/safesurf\">http:\/\/www.safeflorida.net\/safesurf<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberbullying is bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites. Examples of cyberbullying include mean text messages or emails, rumors sent by email or posted on social networking sites, [&hellip;]<\/p>\n","protected":false},"author":429,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-16","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.stjohns.k12.fl.us\/sdfs\/wp-json\/wp\/v2\/pages\/16","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stjohns.k12.fl.us\/sdfs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.stjohns.k12.fl.us\/sdfs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.stjohns.k12.fl.us\/sdfs\/wp-json\/wp\/v2\/users\/429"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stjohns.k12.fl.us\/sdfs\/wp-json\/wp\/v2\/comments?post=16"}],"version-history":[{"count":6,"href":"https:\/\/www.stjohns.k12.fl.us\/sdfs\/wp-json\/wp\/v2\/pages\/16\/revisions"}],"predecessor-version":[{"id":231,"href":"https:\/\/www.stjohns.k12.fl.us\/sdfs\/wp-json\/wp\/v2\/pages\/16\/revisions\/231"}],"wp:attachment":[{"href":"https:\/\/www.stjohns.k12.fl.us\/sdfs\/wp-json\/wp\/v2\/media?parent=16"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}