Cyberbullying Policy

Only available on StudyMode
  • Download(s) : 264
  • Published : May 24, 2013
Open Document
Text Preview
THE PROPOSED LIGAO NATIONAL HIGH SCHOOL (LNHS)
CYBER BULLYING POLICY

RATIONALE

The Department of Education (DepEd) is mandated to ensure that all schools are conducive to the learning of students. Schools are expected to implement zero tolerance policy for any act of child abuse, exploitation, violence, discrimination, bullying, and other forms of abuse. Thus, DepEd issued Department Order No. 40 or the DepEd Child Protection Policy. The order includes a provision on cyber bullying.

The DepEd Child Protection Policy defines cyber bullying as any conduct [of bullying] resulting in harassment, intimidation, or humiliation, through electronic means or other technology, such as, but not limited to texting, email, instant messaging, chatting, internet, social networking websites or other platforms or formats. Examples of cyber bullying include mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles.

We still don’t have recorded cases of cyber bullying in Ligao National High School, however, the school’s Prefect of Discipline suspects that it happens but not reported since the problem is not yet well recognized.

Generally, occurrences of cyber-bullying should not be taken lightly because cyber-bullying is much more damaging to teens than traditional bullying since harmful messages and images can be communicated to a much larger audience (Strom & Strom, 2005).  In the country, there have been reported cases of cyber bullying with a few victims, being children, stopping attending school. Other consequences of cyber bullying are: alcohol and drugs use, poor grades, lower self-esteem and health problems.

Cyber bullying can happen 24 hours a day, 7 days a week and usually cyber-bullies and cyber-predators often remain anonymous to their victims. However, law enforcers in the country claims that they have the capability to trace the identity of the...
tracking img