SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
10Things to Do WhenYou
DiscoverYou’ve Been
Cyber-libeled or Cyerbullied
By Debbie Elicksen
When you discover you’ve been
cyberbullied, DO NOT RESPOND,
COMMUNICATE, ENGAGE, OR
GET ANY OFYOUR FRIENDSTO
ENGAGETHE CYBERBULLY.
Do a forensic Google audit —
search your name — every
page, including the ones that
have been archived by Google.
When you come across something, take a
screenshot. Capture everything and
document everything you can find,
including the comments to the post.The
people who participate in the cyber post
may have also shared the said post on
social media, et. al., so Google them, too,
and screenshot anything you find.
Keep an organized file of your screenshots
and anything else you’ve found. Back it up
on your device and on the web (i.e. Google
Drive). Put this file in a place where you
can’t view it and call it something like
Excrement. Don’t name your troll and
don’t let this folder hit your eyesight when
you go into your device. Hide the folder in
another folder (such as Personal). Keep it
out of your view and your subconscious.
You will have an emotional reaction,
much like being punched in the gut.The
adrenalin will rise to the top of your head
and you’ll feel heat overtake your body.
Sit down, hold onto your chair or desk.
Breathe. Mourn. Cry. Beat up a pillow. Be
wary of the depression that will set in. It’s
inevitable.You’re human. Someone just
attacked you for everyone to see.
If your cyberbully has taken the time
and energy to dedicate a web page
to you, go through it line by line. For
each line you can debunk, do that in
a document. Save the document
and put in that Excrement file.
Start taking your power back.
Research your
country/state/province as to the
cyberbullying and cyber-libel
laws. Copy and past the highlights
that apply to your situation, along
with the source, in another
document and save to that
Excrement file.
Go to whois.net to find out the owner
of the website, if it is not a social
media site. See if the host (if it is not
your cyberbully — do not engage
him/her) will remove the post (it’s
unlikely, but ask anyway).
Now you are ready to file a police report.
YES, a police report. Regardless if your
district police even know what
cyberbullying is, get it on record that this
is NOT okay. Keep your police report and
file number in a file you can’t see. Also
scan it and put in the Excrement file.
Whether you can pursue the police case or
not, having that file number will help with
your recovery.
Develop a cyber plan to counter the attacks
online by setting up an editorial plan and being
EVERYWHERE. Post good stuff. Post positive
stuff. Post stuff that helps other people. Be a
pillar of the community, especially the cyber
community. Be a good cyber citizen. Even if that
post remains at the top of Google, your other
work on the web will drown its effectiveness.
There will be those who choose to believe the
cyberbully rather than look further down the
feed to actually see what you do every day.
So be it.
Debbie Elicksen
Email: debbie.elicksen@gmail.com
Website: http://www.freelancepublishing.net/wp/
Books: http://www.freelancepublishing.net/wp/books/
About Me: http://about.me/debbie.elicksen
Twitter: https://twitter.com/bookpublish101
Facebook: https://www.facebook.com/debbie.elicksen
Virtual
Newsmakers: https://www.youtube.com/user/VirtualNewsmakers/about
Cyber Crimefighter: http://debbieelicksen.wix.com/cyber-crimefighter

Mais conteúdo relacionado

Mais procurados

Techonomy Detroit 2014: The Next Big Thing?
Techonomy Detroit 2014: The Next Big Thing?Techonomy Detroit 2014: The Next Big Thing?
Techonomy Detroit 2014: The Next Big Thing?Albert Wenger
 
Creating infosavvy students
Creating infosavvy students Creating infosavvy students
Creating infosavvy students Kay Oddone
 
The Big Questions About the Future (Information Age)
The Big Questions About the Future (Information Age)The Big Questions About the Future (Information Age)
The Big Questions About the Future (Information Age)Albert Wenger
 
Social Media for Newsgathering
Social Media for NewsgatheringSocial Media for Newsgathering
Social Media for NewsgatheringMandy Jenkins
 
Digital Paleontology - Digging for Ancient Tweets
Digital Paleontology - Digging for Ancient TweetsDigital Paleontology - Digging for Ancient Tweets
Digital Paleontology - Digging for Ancient Tweetsmartin255
 
Evaluating web content authenticity
Evaluating web content authenticityEvaluating web content authenticity
Evaluating web content authenticityKelly Walsh
 
Parent to Parent - Social Media and Privacy
Parent to Parent - Social Media and PrivacyParent to Parent - Social Media and Privacy
Parent to Parent - Social Media and PrivacyDave Tinker, CFRE
 
effective design
effective designeffective design
effective designteachflute
 

Mais procurados (10)

Gee 4 2 Media Or News Rev 5540
Gee 4 2 Media Or News Rev 5540Gee 4 2 Media Or News Rev 5540
Gee 4 2 Media Or News Rev 5540
 
Web 2.X Tools Dudenhoffer
Web 2.X Tools DudenhofferWeb 2.X Tools Dudenhoffer
Web 2.X Tools Dudenhoffer
 
Techonomy Detroit 2014: The Next Big Thing?
Techonomy Detroit 2014: The Next Big Thing?Techonomy Detroit 2014: The Next Big Thing?
Techonomy Detroit 2014: The Next Big Thing?
 
Creating infosavvy students
Creating infosavvy students Creating infosavvy students
Creating infosavvy students
 
The Big Questions About the Future (Information Age)
The Big Questions About the Future (Information Age)The Big Questions About the Future (Information Age)
The Big Questions About the Future (Information Age)
 
Social Media for Newsgathering
Social Media for NewsgatheringSocial Media for Newsgathering
Social Media for Newsgathering
 
Digital Paleontology - Digging for Ancient Tweets
Digital Paleontology - Digging for Ancient TweetsDigital Paleontology - Digging for Ancient Tweets
Digital Paleontology - Digging for Ancient Tweets
 
Evaluating web content authenticity
Evaluating web content authenticityEvaluating web content authenticity
Evaluating web content authenticity
 
Parent to Parent - Social Media and Privacy
Parent to Parent - Social Media and PrivacyParent to Parent - Social Media and Privacy
Parent to Parent - Social Media and Privacy
 
effective design
effective designeffective design
effective design
 

Semelhante a 10 Things to Do When You've Been Cyber-Libeled or Cyberbullied

Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
New activism campaign wants boylovers to speak out
New activism campaign wants boylovers to speak outNew activism campaign wants boylovers to speak out
New activism campaign wants boylovers to speak outRonSpain
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Parenting & Education
 
Top 20 questions about web 2.0 for everyone
Top 20 questions about web 2.0 for everyone Top 20 questions about web 2.0 for everyone
Top 20 questions about web 2.0 for everyone Karthick Vikram
 
Internet Use for Third & Fourth Graders
Internet Use for Third & Fourth GradersInternet Use for Third & Fourth Graders
Internet Use for Third & Fourth GradersBarb Jansen
 
The Do’s and Don’ts of Using Social Media When Facing Criminal Charges .pdf
The Do’s and Don’ts of Using Social Media When Facing Criminal Charges .pdfThe Do’s and Don’ts of Using Social Media When Facing Criminal Charges .pdf
The Do’s and Don’ts of Using Social Media When Facing Criminal Charges .pdfLaw Offices of Steven J. Pisani, LLC
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parentsagoldberghvs
 
Teens & Social Networks: New Realties and Threats
Teens & Social Networks: New Realties and ThreatsTeens & Social Networks: New Realties and Threats
Teens & Social Networks: New Realties and ThreatsSociallyActive
 
Expanding our Horizons by Exploring the World Wide Web
Expanding our Horizons by Exploring the World Wide WebExpanding our Horizons by Exploring the World Wide Web
Expanding our Horizons by Exploring the World Wide WebSheila Dingcong
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Library skittles: a tasy mix of ideas to make the library sweet!
Library skittles: a tasy mix of ideas to make the library sweet!Library skittles: a tasy mix of ideas to make the library sweet!
Library skittles: a tasy mix of ideas to make the library sweet!Naomi Bates
 
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 ConferenceFive Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 ConferenceDave LaFontaine
 
Five tricks to grow your audience using social media
Five tricks to grow your audience using social mediaFive tricks to grow your audience using social media
Five tricks to grow your audience using social mediaDave LaFontaine
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsLeon Letkeman
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullyingkschermerhorn
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of TeensKate Gukeisen
 
CIS490 Lab 1 Social Engineering AuditSocial engineering attacks.docx
CIS490 Lab 1 Social Engineering AuditSocial engineering attacks.docxCIS490 Lab 1 Social Engineering AuditSocial engineering attacks.docx
CIS490 Lab 1 Social Engineering AuditSocial engineering attacks.docxmonicafrancis71118
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 

Semelhante a 10 Things to Do When You've Been Cyber-Libeled or Cyberbullied (20)

Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
New activism campaign wants boylovers to speak out
New activism campaign wants boylovers to speak outNew activism campaign wants boylovers to speak out
New activism campaign wants boylovers to speak out
 
Famous online
Famous onlineFamous online
Famous online
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
Top 20 questions about web 2.0 for everyone
Top 20 questions about web 2.0 for everyone Top 20 questions about web 2.0 for everyone
Top 20 questions about web 2.0 for everyone
 
Internet Use for Third & Fourth Graders
Internet Use for Third & Fourth GradersInternet Use for Third & Fourth Graders
Internet Use for Third & Fourth Graders
 
The Do’s and Don’ts of Using Social Media When Facing Criminal Charges .pdf
The Do’s and Don’ts of Using Social Media When Facing Criminal Charges .pdfThe Do’s and Don’ts of Using Social Media When Facing Criminal Charges .pdf
The Do’s and Don’ts of Using Social Media When Facing Criminal Charges .pdf
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parents
 
Teens & Social Networks: New Realties and Threats
Teens & Social Networks: New Realties and ThreatsTeens & Social Networks: New Realties and Threats
Teens & Social Networks: New Realties and Threats
 
Expanding our Horizons by Exploring the World Wide Web
Expanding our Horizons by Exploring the World Wide WebExpanding our Horizons by Exploring the World Wide Web
Expanding our Horizons by Exploring the World Wide Web
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Library skittles: a tasy mix of ideas to make the library sweet!
Library skittles: a tasy mix of ideas to make the library sweet!Library skittles: a tasy mix of ideas to make the library sweet!
Library skittles: a tasy mix of ideas to make the library sweet!
 
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 ConferenceFive Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
 
Five tricks to grow your audience using social media
Five tricks to grow your audience using social mediaFive tricks to grow your audience using social media
Five tricks to grow your audience using social media
 
DIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School StudentsDIgital Citizenship for Parents of Middle School Students
DIgital Citizenship for Parents of Middle School Students
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital Footprint
 
CIS490 Lab 1 Social Engineering AuditSocial engineering attacks.docx
CIS490 Lab 1 Social Engineering AuditSocial engineering attacks.docxCIS490 Lab 1 Social Engineering AuditSocial engineering attacks.docx
CIS490 Lab 1 Social Engineering AuditSocial engineering attacks.docx
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 

Mais de Debbie Elicksen

Social Media Thought Leaders
Social Media Thought LeadersSocial Media Thought Leaders
Social Media Thought LeadersDebbie Elicksen
 
Dude, You're Being Very Undude
Dude, You're Being Very UndudeDude, You're Being Very Undude
Dude, You're Being Very UndudeDebbie Elicksen
 
What You See On Public Transit
What You See On Public TransitWhat You See On Public Transit
What You See On Public TransitDebbie Elicksen
 
A Walk Around the Neighborhood
A Walk Around the NeighborhoodA Walk Around the Neighborhood
A Walk Around the NeighborhoodDebbie Elicksen
 
Things You Miss When You Hurry from A to B
Things You Miss When You Hurry from A to BThings You Miss When You Hurry from A to B
Things You Miss When You Hurry from A to BDebbie Elicksen
 
Build your digital and marketing empire
Build your digital and marketing empireBuild your digital and marketing empire
Build your digital and marketing empireDebbie Elicksen
 
Recruiting Talent for Your Firm
Recruiting Talent for Your FirmRecruiting Talent for Your Firm
Recruiting Talent for Your FirmDebbie Elicksen
 
Transmedia Storytelling for Business
Transmedia Storytelling for BusinessTransmedia Storytelling for Business
Transmedia Storytelling for BusinessDebbie Elicksen
 
Cyber-security tips: the heartbleed bug
Cyber-security tips: the heartbleed bugCyber-security tips: the heartbleed bug
Cyber-security tips: the heartbleed bugDebbie Elicksen
 
Virtual Newsmakers Lineup of Shows
Virtual Newsmakers Lineup of ShowsVirtual Newsmakers Lineup of Shows
Virtual Newsmakers Lineup of ShowsDebbie Elicksen
 

Mais de Debbie Elicksen (20)

CV of Debbie Elicksen
CV of Debbie ElicksenCV of Debbie Elicksen
CV of Debbie Elicksen
 
Digital PR for Business
Digital PR for BusinessDigital PR for Business
Digital PR for Business
 
Social Media Thought Leaders
Social Media Thought LeadersSocial Media Thought Leaders
Social Media Thought Leaders
 
Dude, You're Being Very Undude
Dude, You're Being Very UndudeDude, You're Being Very Undude
Dude, You're Being Very Undude
 
How to Write a Book
How to Write a BookHow to Write a Book
How to Write a Book
 
Media Fails
Media FailsMedia Fails
Media Fails
 
Classic Cars
Classic CarsClassic Cars
Classic Cars
 
Inside the NHL Dream
Inside the NHL DreamInside the NHL Dream
Inside the NHL Dream
 
What You See On Public Transit
What You See On Public TransitWhat You See On Public Transit
What You See On Public Transit
 
A Walk Around the Neighborhood
A Walk Around the NeighborhoodA Walk Around the Neighborhood
A Walk Around the Neighborhood
 
The Future of Education
The Future of EducationThe Future of Education
The Future of Education
 
Things You Miss When You Hurry from A to B
Things You Miss When You Hurry from A to BThings You Miss When You Hurry from A to B
Things You Miss When You Hurry from A to B
 
Build your digital and marketing empire
Build your digital and marketing empireBuild your digital and marketing empire
Build your digital and marketing empire
 
Recruiting Talent for Your Firm
Recruiting Talent for Your FirmRecruiting Talent for Your Firm
Recruiting Talent for Your Firm
 
Transmedia Storytelling for Business
Transmedia Storytelling for BusinessTransmedia Storytelling for Business
Transmedia Storytelling for Business
 
How to start a story
How to start a storyHow to start a story
How to start a story
 
Cyber-security tips: the heartbleed bug
Cyber-security tips: the heartbleed bugCyber-security tips: the heartbleed bug
Cyber-security tips: the heartbleed bug
 
Inspiring Words
Inspiring WordsInspiring Words
Inspiring Words
 
Empowering Your Message
Empowering Your MessageEmpowering Your Message
Empowering Your Message
 
Virtual Newsmakers Lineup of Shows
Virtual Newsmakers Lineup of ShowsVirtual Newsmakers Lineup of Shows
Virtual Newsmakers Lineup of Shows
 

Último

Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxran17april2001
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsGOKUL JS
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSendBig4
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 

Último (20)

Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptx
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebs
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.com
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 

10 Things to Do When You've Been Cyber-Libeled or Cyberbullied

  • 1. 10Things to Do WhenYou DiscoverYou’ve Been Cyber-libeled or Cyerbullied By Debbie Elicksen
  • 2. When you discover you’ve been cyberbullied, DO NOT RESPOND, COMMUNICATE, ENGAGE, OR GET ANY OFYOUR FRIENDSTO ENGAGETHE CYBERBULLY.
  • 3. Do a forensic Google audit — search your name — every page, including the ones that have been archived by Google.
  • 4. When you come across something, take a screenshot. Capture everything and document everything you can find, including the comments to the post.The people who participate in the cyber post may have also shared the said post on social media, et. al., so Google them, too, and screenshot anything you find.
  • 5. Keep an organized file of your screenshots and anything else you’ve found. Back it up on your device and on the web (i.e. Google Drive). Put this file in a place where you can’t view it and call it something like Excrement. Don’t name your troll and don’t let this folder hit your eyesight when you go into your device. Hide the folder in another folder (such as Personal). Keep it out of your view and your subconscious.
  • 6. You will have an emotional reaction, much like being punched in the gut.The adrenalin will rise to the top of your head and you’ll feel heat overtake your body. Sit down, hold onto your chair or desk. Breathe. Mourn. Cry. Beat up a pillow. Be wary of the depression that will set in. It’s inevitable.You’re human. Someone just attacked you for everyone to see.
  • 7. If your cyberbully has taken the time and energy to dedicate a web page to you, go through it line by line. For each line you can debunk, do that in a document. Save the document and put in that Excrement file.
  • 8. Start taking your power back. Research your country/state/province as to the cyberbullying and cyber-libel laws. Copy and past the highlights that apply to your situation, along with the source, in another document and save to that Excrement file.
  • 9. Go to whois.net to find out the owner of the website, if it is not a social media site. See if the host (if it is not your cyberbully — do not engage him/her) will remove the post (it’s unlikely, but ask anyway).
  • 10. Now you are ready to file a police report. YES, a police report. Regardless if your district police even know what cyberbullying is, get it on record that this is NOT okay. Keep your police report and file number in a file you can’t see. Also scan it and put in the Excrement file. Whether you can pursue the police case or not, having that file number will help with your recovery.
  • 11. Develop a cyber plan to counter the attacks online by setting up an editorial plan and being EVERYWHERE. Post good stuff. Post positive stuff. Post stuff that helps other people. Be a pillar of the community, especially the cyber community. Be a good cyber citizen. Even if that post remains at the top of Google, your other work on the web will drown its effectiveness. There will be those who choose to believe the cyberbully rather than look further down the feed to actually see what you do every day. So be it.
  • 12. Debbie Elicksen Email: debbie.elicksen@gmail.com Website: http://www.freelancepublishing.net/wp/ Books: http://www.freelancepublishing.net/wp/books/ About Me: http://about.me/debbie.elicksen Twitter: https://twitter.com/bookpublish101 Facebook: https://www.facebook.com/debbie.elicksen Virtual Newsmakers: https://www.youtube.com/user/VirtualNewsmakers/about Cyber Crimefighter: http://debbieelicksen.wix.com/cyber-crimefighter