Teacher-Facing Resources


Estimated Time:15 minutes


Score Type:Automatically Graded

Work completed by a student will be automatically graded and the grade will be sent to the Learning Management System (LMS) gradebook

Available Languages: English, Spanish

Vocabulary: blog, chat room, cyber bully, cyber bullying, dealing with cyber bullying, email, extort, flaming, harass, impersonate, instant message, intimidate, isolate, password, phone, rumor, social network, stalk, text message


  • Student learns what cyber bullying is and becomes familiar with different forms it can take.
  • Student learns that a cyber bully is someone that repeatedly uses technology to hurt another person, individually or as part of a group.
  • Student learns that some ways that cyber bullies may hurt another person is by harassing them, impersonating them, intimidating them, isolating them, stalking, creating or helping to spread false rumors, extortion, name calling and flaming, tricking or terrorizing them.
  • Student learns that some types of technology that are used by cyber bullies are social networking sites, text messages, camera phones, instant messages, email, malicious Websites, chat rooms, blogs, and phones.
  • Student learns that cyber bullying is taken very seriously by law enforcement and schools.
  • Student learns what they should do to make it harder for someone to cyber bully them.
  • Student learns to create strong passwords with letters and numbers and change them often.
  • Student learns to only share passwords with a responsible adult.
  • Student learns to keep their page, personal information and blog private.
  • Student learns to block cyber bullies.
  • Student learns that treating others well online will make them less of a target for cyber bullies.
  • Student learns what they should and should not do when cyber bullied.
  • Student learns that they should tell their parent or guardian and their school that they are being cyber bullied.
  • Student learns that they must never reply to a cyber bully attack, replying could make the attacks much worse, could make it difficult to prove who started the attacks, and that cyber bullies feed off of the reactions of their victims.
  • Student learns that they should always save and print all evidence of being cyber bullied and print it, and never delete the evidence before saving it or printing it and showing it to an adult.
  • Student learns that if it an attack is posted in a comment they should print it, tell their parent or guardian, and flag it to make sure the site provider knows what the poster is doing.
  • Student learns to report imposter profiles to a social networking site or gaming site.
  • Student learns why it is important to act when they know someone else is being cyber bullied and what they have a responsibility to do.
  • Student learns to tell the school if they know of another student being cyber bullied.
  • Student learns to never participate in cyber bullying.
  • Student learns to tell friends to stop cyber bullying if safe to do so, if they don’t feel safe they should let an adult know, is better to do so privately instead of in front of a group.
  • Student learns ways to support targeted students, send private positive messages to befriend a student that is being targeted.
  • Student learns about the harmful effects that cyber bullying can cause.


Bullying and Harassment

Library Media > Information Technology > Internet > Bullying and Harassment

Bullying and Harassment 

Technology Education > Information Technology > Internet > Bullying and Harassment 

Digital Citizenship

Library Media > Information Literacy > Student Use - Digital Media > Digital Citizenship

Digital Citizenship 

Technology Education > Digital Literacy > Student Use > Digital Citizenship 


Technology Education > Information Technology > Digital Communications > Ethics 

Internet Attacks and Abuse

Library Media > Information Technology > Internet > Internet Attacks and Abuse

Internet Attacks and Abuse 

Technology Education > Information Technology > Internet > Internet Attacks and Abuse 

Listening / Pay Attention

Language Arts > Communication > Media Literacy / Viewing > Comprehension > Listening / Pay Attention

Negative Impact

Library Media > Information Technology > Internet > Negative Impact

Negative Impact 

Technology Education > Information Technology > Internet > Negative Impact 

On-line Etiquette 

Technology Education > Information Technology > Basic Operations and Concepts > On-line Etiquette 

Personal Safety / Use / Online

Science > History / Technology / Social Perspectives > Computer Science > Personal Safety / Use / Online

Risks and Benefits of Use 

Technology Education > Information Technology > Mobile Applications > Risks and Benefits of Use 


Library Media > Information Technology > Internet > Safety


Technology Education > Information Technology > Internet > Safety 

Social Networking 

Technology Education > Information Technology > Internet > Social Networking 

Vocabulary Development

Language Arts > Communication > Listening Strategies / Context > Vocabulary Development
Show More
  • Lead discussion with class on “Reporting versus Snitching.” Tattling or snitching is trying to get someone in trouble, reporting is trying to help someone or try to prevent someone from being hurt. No one deserves to be treated badly, if someone is treated badly and it isn't reported, things will just keep getting worse and people will be hurt more (Case example of Bystander Effect or Genovese Syndrome, http://www.youtube.com/watch?v=JozmWS6xYEw, and http://en.wikipedia.org/wiki/Kitty_Genovese). Very Important: Have students engage in class discussion about how they can support and befriend people that are being cyberbullied. Research shows the incredible value to victims that this has, and that because of embarrassment some victims prefer private support over public.

See how our curriculum can help you meet your instructional goals

Check it out