ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

A Guide to Legal Options for Victims of Cyberbullying

Updated on April 24, 2015
Modern technology makes communication far easier, but unfortunately it can also be abused, such as by cyberbullying.
Modern technology makes communication far easier, but unfortunately it can also be abused, such as by cyberbullying. | Source

The modern omnipresence of social media sites like Facebook and Twitter has unfortunately led to a massive increase in cases of cyberbullying, or bullying via some type of electronic means. This problem is not limited to young children; children, teens and adults can all be victims of cyberbullying. If you have been a victim of cyberbullying, or are the parent of a child who has, you have legal options. These are a few to consider.

Some individuals feel that these type of situations should simply ignored, feeling that they will eventually go away. Judge Thomas A. Jacobs, however, disagrees, stating, “The victim and his or her parents can and should take action. Ignoring the bully will not put an end to the attacks.

The first logical means of taking action, before involving the legal system, is simply to confront the bully’s school administrators or employers directors to request appropriate preventative and disciplinary action. However, under certain circumstances – especially if the actual identity of the bully is not known – this may be difficult, or the appropriate authorities may not fulfill their responsibilities.

Judge Thomas A. Jacobs:

“The victim and his or her parents can and should take action. Ignoring the bully will not put an end to the attacks.”

Restraining Orders

Once you decide that you have no choice but to pursue legal options, your first possibility is requesting a court-issued restraining order, sometimes known as a protective order or order of protection. Restraining orders are traditionally known for preventing one individual from physically approaching another, but the specific details of each restraining order will vary widely. They can be used to prevent all contact (including online or digital contact), or to restrict it to whatever degree is necessary. Restraining orders can be renewed as many times as necessary to protect the person being targeted.

A restraining order is one legal option in cyberbullying cases.
A restraining order is one legal option in cyberbullying cases. | Source

Lawsuits

An individual who targets another through some form of cyberbullying may be open to some type of lawsuit, as can other individuals or organizations who fail to fulfill their proper responsibility of preventing such behavior. You may be able to file a lawsuit against the parents or school administrators of a cyberbully who is a minor, if they do not rectify the situation when given the opportunity to do so. Similarly, you may be able to file the lawsuit against the bully him or herself (if they are of legal age) for a variety of different legal causes, including slander, libel, invasion of privacy, mental harm, negligence and defamation of character. A lawyer will be able to advise you on the specific pros and cons of your case.

Cyberbullying may sometimes require you to file a lawsuit to rectify the situation.
Cyberbullying may sometimes require you to file a lawsuit to rectify the situation. | Source

Police Intervention

Depending on the degree of severity of the cyberbullying involved in your specific case, you may need to actually get the police involved. Cyberbullying transitions from a civil issue to a criminal one (and therefore mandates law enforcement intervention) when it involves actual threats, identity theft and the like. Since the line between what is and is not technically criminal can be quite blurry, it is best to talk to the police if you feel unsafe, and let them sort out the details.

Keep in mind, however, that since cyberbullying is a relatively recent trend, many of the laws applicable to it – often referred to “cyberharassment” or “cyberstalking” laws – have not been on the books for a particularly long time. For that reason, some law enforcement personnel may not yet be completely familiar with all relevant laws and may therefore need some time to research your situation and educate themselves on how best to handle it.

The police should be notified about instances of cyberbullying that are sufficiently severe to become criminal cases.
The police should be notified about instances of cyberbullying that are sufficiently severe to become criminal cases. | Source

Free Speech Issues

For some time the legal system has struggled with how to properly deal with cyberbullying cases without infringing on citizens' free speech rights. However, in the 2009 Cohen v. Google case, a judge ordered Google to release information about the identity of a blogger who had been harassing Liskula Cohan, a former model, online, allowing Cohen to pursue legal action against the person targeting her. This case set a crucial precedent in determining that cyberbullying is not protected under free speech laws, allowing many other victims of cyberbullying to pursue similar cases.

The courts will generally classify cyberbullying as some form of harassment, slander or libel, not free speech.
The courts will generally classify cyberbullying as some form of harassment, slander or libel, not free speech. | Source

Preserving Evidence

Regardless of the specific type of cyberbullying involved in your situation, you should keep a record of any and all communication involved in the case. Screen capture or save any messages, emails, posts, comments and the like as soon as you see them; this could become crucial evidence later, and the guilty party may well try to delete them as soon as the realize they could be liable to legal action. If you are unable to save this evidence before it is deleted, you may be still be able to track a copy down by contacting the site that hosted the communication. If they will not release the information you are seeking, your attorney may be able to pursue more official means of securing it. Regardless, saving your own copy is still preferable if you are able to do so.

Save copies of any messages or other communications relevant to a case of cyberbullying.
Save copies of any messages or other communications relevant to a case of cyberbullying. | Source

Final Considerations

One particularly tragic aspect of cyberbullying is that an innocent victim is forced to choose between allowing harassment to continue, and spending a potentially significant amount of time, money and energy in putting a stop to it via legal means. Regardless, most experts and past victims believe that standing up to a bully is well worth the unpleasantness and inconvenience involved. Many lawyers will provide an initial consultation to assess your case for no charge, helping you determine the best steps to take to put a stop to the harassment once and for all.

Which option do you think is preferable for victims of cyberbullying?

See results

References

Vanderbilt Law Review: “Constitutionality of Cyberbullying Laws: Keeping the Online Playground Safe for Both Teens and Free Speech”

National Conference of State Legislatures: “State Cyberstalking and Cyberharassment Laws”

New York Post: “A Gaggle of Google Bully Suits”

University of Memphis: “Protecting the Victims of Cyberbullying: An Idea”

IKeepSafe.org: “Cyberbullying: When Should You Take Legal Action?”

Elon University: “Bullying and Cyberbullying: History, Statistics, Law, Prevention and Analysis”

BullyingStatistics.org: “Stop Cyber Bullying”

NoBullying: “Six Unforgettable Cyberbullying Cases”

TheLaw: “Legal Options for Student Victims of Online Bullying”

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)