Cyberbullying: Laws and Prevention Tips



The top 5 cybercrimes complaints in the Philippines, according to PNP were online scams, online libel, online threats, identity theft, photo and video voyeurism, and the illegal access to someone else’s online account.

Wherein online libel is directly form of cyber bullying, the commission of identity theft, anti-photo, and video voyeurism, and illegal access to someone else’s online account can also result in online bullying.

Source: https://www.dubailad.com/uae-cyberbullies-could-be-hit-with-6-months-jail-time-and-aed150000-fine/

What is Cyberbullying?

Cyber Bullying is bullying with the use of digital technologies. It can take place on social media, messaging platforms, gaming platforms and mobile phones. It is repeated behaviour, aimed at scaring, angering or shaming those who are targeted.

While bullying refers to the definition according to Republic Act. 10627. Though this law is intended for minors.

SEC. 2. Acts of Bullying. – For purposes of this Act, “bullying” shall refer to any severe or repeated use by one or more students of a written, verbal or electronic expression, or a physical act or gesture, or any combination thereof, directed at another student that has the effect of actually causing or placing the latter in reasonable fear of physical or emotional harm or damage to his property; creating a hostile environment at school for the other student; infringing on the rights of the other student at school; or materially and substantially disrupting the education process or the orderly operation of a school

R.A. No.10627, Sec. 2

Different Types Of Cyberbullying

Cyberbullying has many forms and can include a variety of acts. Some of the most common cyberbullying tactics are briefly described below.

Cyberstalking: a bully repeatedly and intensively harasses, denigrates or threatens the target, enough to create fear.

Example Situation: “When Annie broke up with Sam, he sent her many angry, threatening, pleading messages. He spread nasty rumors about her to her friends and posted a sexually suggestive picture she had given him in a sex-oriented discussion group, along with her e-mail address and cell phone number.”

Cyberthreats: a bully makes threatening remarks on the internet or implies violent behaviour. It can also be threatening with suicide.

Example Situation: “Greg set up an anonymous IM account and sent a threatening message to his older sister suggesting that she would be killed the next day at school.”

Denigration: a bully starts rumours about a person to damage their reputation. “Dissing” someone online.

Example Situation: Some boys created a “We Hate Joe” Web site where they posted jokes, cartoons, gossip, and rumors, all dissing Joe.

Exclusion: a group of bullies excludes someone from online conversations, groups or from events shared online to hurt their feelings.

Example Situation: “Millie tries hard to fit in with a group of girls at school. She recently got on the “outs” with a leader in this group. Now Millie has been blocked from the friendship links of all of the girls.”

Flaming: a bully starts or fuels online fights exchanged through emails, instant messages, chat rooms or comments. There is often harsh language directed towards a specific person.

Example Situation: “Joe and Alec’s online exchange got angrier and angrier. Insults were flying. Joe warned Alec to watch his back in school the next day.”

Harassment: a bully repeatedly sends or posts mean, hurtful or insulting messages or comments.

Example Situation: “Sara reported to the principal that Kayla was bullying another student. When Sara got home, she had 35 angry messages in her e-mail box. The anonymous cruel messages kept coming—some from complete strangers.”

Masquerading/impersonation: a bully creates a fake identity to harass someone anonymously or impersonating somebody else to him send malicious messages or post material to get that person in trouble or danger or to damage that person’s reputation or friendships.

Example Situation: “Laura watched closely as Emma logged on to her account and discovered her password. Later, Laura logged on to Emma’s account and sent a hurtful message to Emma’s boyfriend, Adam.”

Outing: a bully shares someone’s secrets or embarrassing photos online.

Example Situation: “Greg, an obese high school student, was changing in the locker room after gym class. Matt took a picture of him with his cell phone camera. Within seconds, the picture was flying around the phones at school.”

Trickery: a bully tricks someone to share private information or photos with them and then shares this online.

Example Situation: “Katie sent a message to Jessica pretending to be her friend and asking lots of questions. Jessica responded, sharing really personal information. Katie forwarded the message to lots of other people with her own comment, “Jessica is a loser.”

Source: http://socialna-akademija.si/joiningforces/3-5-types-of-cyber-bullying/


Suicide and Cyberbullying

In comparison to verbal bullying, a research study showed that adolescents who reported cyberbullying were 11.5 times more likely to have suicidal ideation, while those who have reported verbal bullying were only 8.4 times more Iikely.

Source: https://en.m.wikipedia.org/wiki/Bullying_and_suicide#:~:text=In%20comparison%20to%20verbal%20bullying,only%208.4%20times%20more%20Iikely.

What to do if you are receiving Online Bullying

Cyberbullying | How to Protect Yourself…

Always inform somebody when you are being cyberbullied, harassed, stalked, or mobbed.

• As a minor, tell your parents or guardian. It is best to share this also to your class adviser or the school’s guidance office. Parents, it’s best to inform the principal about the incident. As required by law, schools thru the Principal or his/her designate should conduct an investigation.

• As an adult, tell someone you trust, and if harassment is work-related, it is wise to give your HR a heads-up. If you’re experiencing workplace bullying, here’s what you can do

Always keep a copy and screenshot of the hate messages, degrading images, and/or videos using a browser where the URL is visible.

• Do not delete text messages, emails, tweets, and PMs/DMs.
• Always take a screenshot of the Facebook, Twitter, and other social network’s timeline
• Download a copy of degrading images or videos to be kept as evidence

Block the accounts of the people who are harassing you.

• Parents, do this immediately and have your kids take an online vacation
• For adult victims, do this if the attacks are affecting you already but ask someone to monitor the accounts of the bully.
• If you can, take an online vacation. Use different CP numbers when necessary, but ask someone to monitor the SMS in your original number.

• If you have a Facebook account and you wish to report harassment/bullying follow this GUIDELINES.

• For Twitter abuses, report HERE.

• For Instagram, go HERE.

• For Snapchat, go HERE.

• For TikTok, go HERE.

For the discussion of School Bullying

• Please go to “Protecting Filipino children from bullying”.

Applicable Laws for Cyberbullying

For minors, aside from RA 10627, or the anti-bullying act of 2013, “Republic Act 7610 also known as Special Protection of Children Against Abuse, Exploitation and Discrimination Act” can also be used.

ARTICLE VI- Other Acts of Abuse

Section 10. Other Acts of Neglect, Abuse, Cruelty or Exploitation and Other Conditions Prejudicial to the Child’s Development. –

(a) Any person who shall commit any other acts of child abuse, cruelty, or exploitation or to be responsible for other conditions prejudicial to the child’s development including those covered by Article 59 of Presidential Decree No. 603, as amended, but not covered by the Revised Penal Code, as amended, shall suffer the penalty of prison mayor in its minimum period.

R.A. 7610 ARTICLE VI, Sec. 10

For adults, provisions of RA 10175 or the cybercrime law can apply. As mentioned in our opening paragraph, online libel, identity theft, and illegal access to online accounts.

The Anti-Photo and Video Voyeurism Act of 2009 or RA 9995 also applies. This, if the perpetrators use intimate personal images and videos to blackmail, extort or harass the victims.

For “non-cyber” harassment offenses. Exhaustive list of discrimination laws, rulings, and regulations, so if there is a need to go the legal route, it will be guided.

Cyberbullying when Adults are Involved

• Go to the nearest Women and Children’s Protection Desk of PNP
• Alternately, you can file an online report here.
• Or visit either the PNP Cybercrime Unit at Camp Crame or the NBI Cybercrime Unit at Taft Ave
• According to this news report, you can contact the National Bureau of Investigation at ccd@nbi.gov.ph or call 028521-9208, local extensions 3429 (Chief) and 3497 (Staff).

Seek financial damages, if applicable

According to Atty. Cyndy P. Dela Cruz.

A person who is aggrieved by a defamatory post in social media may find refuge in the provisions of the Civil Code on Damages (Art. 2176, Civil Code)

Whoever by act or omission causes damage to another, there being fault or negligence, is obliged to pay for the damage done. Such fault or negligence, if there is no pre-existing contractual relation between the parties, is called a quasi-delict and is governed by the provisions of this chapter.”

When a cyberbullying is not?

Furthermore, due to the evolvement of technology, a lot of forms of cyber bullying has emerged too. But, when we can say a cyber bullying is NOT?

Protected speech is not cyberbullying because the Philippine constitution guarantees free speech and expression. So written, verbal, artistic, and creative expressions both in virtual and real-world are protected unless it falls under cyber libel.

Whoever by act or omission causes damage to another, there being fault or negligence, is obliged to pay for the damage done. Such fault or negligence, if there is no pre-existing contractual relation between the parties, is called a quasi-delict and is governed by the provisions of this chapter.”


SOURCE : https://asksonnie.info/cyber-bullying-philippines/

DECLAIMER: This blog was all about for educational purposes only. The informations and ideas intended on this blog was credited to the rightful owner of each sources.

Leave a comment

Design a site like this with WordPress.com
Get started