Main Nav

Hello All,

 

Does anyone have a specific policy or specifically mention Cyber-Bullying in their policies?  IT Policies or otherwise?

 

Thanks,

 

Daniel Bennett

IT Security Analyst

Adjunct Faculty

Vice-Chair North Central PA Members Alliance

 

Pennsylvania College of Technology

One College Ave

Williamsport, PA 17701

 

P:570.329.4989

E:dbennett@pct.edu

 

ITS and Penn College will never solicit you for your username or password in an e-mail.

 

Comments

Hello All,

 

I recently attended a webinar about bullying and cyber-bullying in policy.  Does any of your departments or institutions specifically mention cyber-bullying in your policies (IT policies or others)?  I am trying to derive a sense as to the most appropriate place to mention guidelines in policy for this.  I am torn between the Acceptable Use Policy, since cyber-bullying uses technology, or if it should be in a student affairs related policy.  Because cyber-bullying can be between students and employees I believe it would need to be in a more general institutional policy such as an AUP.

 

Thanks,

 

Daniel Bennett

IT Security Analyst

Adjunct Faculty

Vice-Chair North Central PA Members Alliance

 

Pennsylvania College of Technology

One College Ave

Williamsport, PA 17701

 

P:570.329.4989

E:dbennett@pct.edu

 

ITS and Penn College will never solicit you for your username or password in an e-mail.

 

********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.

Can’t you use your non cyber policies?  Harassment is harassment…why would the method be a distinguishable factor that would make it allowable in one format when it would not be allowed in another?

 

There should be some generic language in your Student Handbook/Code of Conduct regarding this type of issue and I’d leverage that. If you try to write a specific policy for each possible event you’ll spend the rest of your career writing policies.

 

My $.02

 

Dan Sarazen

Senior IT Auditor

The Boston Consortium for Higher Education

Brandeis University, Mailstop 110

Phone: 781-736-8703

Cell:     781-296-4444

Fax:     781-736-8706

 

 

 

Harassment (both sexual and non-sexual), Bullying, and Discrimination are all different.  Bullying is often thought of as a k-12 issue with children.

 

I am thinking that the “cyber” part should be mentioned within an IT policy (AUP maybe).

 

Not directly but we do an item in our use policy (http://www.uni.edu/policies/954) that should cover this:

Policy on Ethical Behavior with Respect to the Electronic Information Environment


6. Impairing, interrupting or inhibiting any other person's access to or use of resources except consequential to normal and acceptable use. (Examples include generating or spreading a virus, sending codes to lock another person's keyboard, making excessive noise, and inordinate consumption of resources, including network band-width).

Tom
Director, ITS - User Services University of Northern Iowa 36 ITTC Building Cedar Falls, IA 50614-0522 Phone: 319-273-6460 fax: 319-273-7518 "For deaf or hard of hearing, use Relay 711" Website: http://www.uni.edu/peterson "The University of Northern Iowa provides transformative learning experiences that inspire students to embrace challenge, engage in critical inquiry and creative thought, and contribute to society." On 8/30/2012 8:27 AM, Daniel Bennett wrote:

Hello All,

 

I recently attended a webinar about bullying and cyber-bullying in policy.  Does any of your departments or institutions specifically mention cyber-bullying in your policies (IT policies or others)?  I am trying to derive a sense as to the most appropriate place to mention guidelines in policy for this.  I am torn between the Acceptable Use Policy, since cyber-bullying uses technology, or if it should be in a student affairs related policy.  Because cyber-bullying can be between students and employees I believe it would need to be in a more general institutional policy such as an AUP.

 

Thanks,

 

Daniel Bennett

IT Security Analyst

Adjunct Faculty

Vice-Chair North Central PA Members Alliance

 

Pennsylvania College of Technology

One College Ave

Williamsport, PA 17701

 

P:570.329.4989

E:dbennett@pct.edu

 

ITS and Penn College will never solicit you for your username or password in an e-mail.

 

********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.


********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.

Hi,
Our general appropriate use policy for all university technology users states:

http://www.oakland.edu/policies/890/

Demonstrating common courtesy and respect for rights of others - Authorized Users must respect and value privacy rights, behave ethically, and comply with all legal restrictions regarding the use of information that is the property of others. Compliance with all University policies regarding sexual, racial, and other forms of harassment and discrimination is required.

and

  1. Avoidance of harassment - No member of the community may use Resources to libel, slander, or harass any other person.

    Harassment includes, without limitation, the following:
  1. Intentionally using Resources to annoy, harass, terrify, intimidate, threaten, offend or bother another person by conveying obscene language, pictures, or other materials or threats of bodily harm to the recipient or others;

  2. Intentionally using Resources to contact another person repeatedly with the intent to annoy, harass, or bother, whether or not any actual message is communicated, and/or where no purpose of legitimate communication exists, and where the recipient has expressed a desire for the communication to cease;

  3. Intentionally using Resources to contact another person repeatedly regarding a matter for which one does not have a legal right to communicate, once the recipient has provided reasonable notice that he or she desires such communication to cease;

  4. Intentionally using Resources to disrupt or damage the academic, research, administrative, or related pursuits of another;

  5. Intentionally using Resources to invade the privacy, academic or otherwise, of another or the threatened invasion of the privacy of another.
Resources are defined as:
Resources - Resources means the University's computing, network and information technology Resources, including without limitation all data and information in electronic format or any hardware or software that makes possible, in the broadest possible sense, the processing, transmission, storage or use of such information. As an example, included in this definition are access identity accounts and login processes; communications devices; computers; data; databases; digital images; digitized information; electronic mail; messaging; network electronics and access points; servers; software; storage devices; web sites, blogs and public information services; and workstations.
___

I will offer, after being on the receiving end of such behavior, it is important to have something that states:  "once the recipient has provided reasonable notice that he or she desires such communication to cease;".
I was able to state specifically that I wanted the communication stopped.  When the individual continued, that continued action seemed to really trigger attention that prior complaints did not.

Theresa




To Roger’s point, we specifically avoid calling out a particular form or vector.  Our thought is that bad behavior is bad behavior, regardless of the particular avenue.  I have recently been reviewing a lot of the AUPs from schools in the same category as mine and I have come across such statements several times, so it seems a common approach.  This is not a quote, but it sums up what I have often seen: “Just because you are hazing, harassing or bullying through a computer doesn’t change the fact that that is what you are doing.”

 

Quinn R Shamblin
------------------------------------------------------------------------------------------------
Executive Director of Information Security, Boston University
CISM, CISSP, GCFA, PMP  –  O 617-358-6310  M 617-999-7523

 

While it doesn't mention "cyber bullying" specifically, we feel it's covered in our Information Technology Responsible Use Policy with the following statement: People who use both on-campus and external network media (including any communication performed on the network for any purpose) must do so responsibly, in a manner that constitutes respectful behavior as laid out in the Faculty, Student and Staff Handbooks. It is unethical not to adhere to this type of behavior, even when communicating with people outside the Macalester community. For example, no form of harassment, as defined in the Student, Faculty and Staff Handbooks, will be tolerated within any media. In addition, all communications must include the sender's complete network address, unless the service explicitly invites anonymous communication. If someone requests you stop communicating electronically with him/her, you are required to do so immediately. Thanks, Harry Harry Pontiff, Ph.D., GISF Information Security Officer Macalester College 1600 Grand Avenue - Hum 308 St. Paul, MN 55105 Phone: (651) 696-6826 Fax: (651) 696-6778 This email may contain information which is privileged, confidential, or protected. If you are not the intended recipient, note that any disclosure, copying, distribution, or use of the contents of this message is prohibited. If you have received this email in error, please notify the sender and delete this email.

It is covered in our Acceptable Use Policy which states:

 

·  Acceptable Use: For use to be acceptable, it must demonstrate respect for:

  1. The intent of the individual authorities granted the user;
  2. The usage privileges of other authorized users;
  3. The rights of others to privacy;
  4. Intellectual property rights (e.g., as reflected in licenses and copyrights);
  5. Ownership, confidentiality, integrity and availability of systems and data;
  6. System mechanisms designed to limit, monitor and/or record use or access (Longwood University IT resources and systems activity are routinely monitored and recorded by technical support staff.);
  7. Current network topology and configuration; and
  8. Individuals' rights to be free of intimidation, harassment and unwarranted annoyance.

Thanks,

Frank

 

 

On Thu, 30 Aug 2012, Daniel Bennett wrote: > Harassment (both sexual and non-sexual), Bullying, and Discrimination are all different. Bullying is often thought of as a k-12 issue with children. > > I am thinking that the "cyber" part should be mentioned within an IT policy (AUP maybe). What's the difference between an abusive email and an abusive letter taped to a dorm door? I think the more we try to write specfic policies targetted at computing, we in fact open the door for more abuse because we implicity accept that certain modes of online behavior can be acceptable where a similar action would not be acceptabe in real-life. Mike Mike Porter Systems Programmer V IT/NSS University of Delaware > >
Agreed. Just because it can be done on a computer/electronic device doesn't make it an IT problem. The same thing applies to "time stealing" and IP issues around online course materials. Generally everyone already has policies around undesirable behavior, IP created by staff and misuse of organizational time. Not that IT doesn't have a role to play - we do - but use of technology does not mean the responsibility for creating and policing these policies shifts from leadership/management/supervisors to IT staff. Regards, Matthew Gioia Network Security Analyst Technology and Educational Support Services St. Louis Community College
Check with your institutional counsel?   

NACUA has had some good sessions on this topic at their annual conference.  

Tracy 

On a mobile device, and sometimes Siri has strange ideas ...  :-)

Close
Close


Annual Conference
September 29–October 2
View Proceedings

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

Digital Badges
Member recognition effort
Earn yours >

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.