We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.

What is the Best Way to Deal with Bullying Online?

Michael Pollick
Updated May 16, 2024
Our promise to you
EasyTechJunkie is dedicated to creating trustworthy, high-quality content that always prioritizes transparency, integrity, and inclusivity above all else. Our ensure that our content creation and review process includes rigorous fact-checking, evidence-based, and continual updates to ensure accuracy and reliability.

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

Editorial Standards

At EasyTechJunkie, we are committed to creating content that you can trust. Our editorial process is designed to ensure that every piece of content we publish is accurate, reliable, and informative.

Our team of experienced writers and editors follows a strict set of guidelines to ensure the highest quality content. We conduct thorough research, fact-check all information, and rely on credible sources to back up our claims. Our content is reviewed by subject-matter experts to ensure accuracy and clarity.

We believe in transparency and maintain editorial independence from our advertisers. Our team does not receive direct compensation from advertisers, allowing us to create unbiased content that prioritizes your interests.

The destructive practice of online or cyber bullying can be just as harmful to a victim as physical or emotional bullying. Threats or insults received through online communications can even be more sinister, since the cyber bully may have the advantage of anonymity or alternative identities. There are steps a computer user can take to prevent or reduce incidents of bullying online, but a number of these steps may involve restricting access to an online social account or eliminating such accessible accounts altogether. In many cases, bullying online begins with bullying in the real world, so a victim may have to take proactive steps in order to keep both worlds as separate as possible.

One way to deal with bullying online is to treat it like the crime it is. This means keeping track of times, dates, email addresses and content of all harassing online communications. Emails received from a cyberbully should not be deleted immediately, but should instead be stored in a special online file or downloaded to a secure computer file. Many online chatting programs also allow conversations to be saved, so a victim may want to use that option following a disturbing or intimidating chat with a cyberbully. Some online bullies will post embarrassing photographs or other humiliating materials on the Internet, so a victim should record all of the information about the post, such as the domain name, date of post, screen name of poster, comments and any other identifiers. A large online video or photo hosting website may need all of this information in order to perform an internal investigation.

Many incidents of bullying online start out as incidents of real life bullying. The bully often knows the victim personally, and has enough information already to begin a cyberstalking or online bullying campaign. Knowledge of a victim's complete first and last name can literally be enough information for a motivated and computer-savvy bully to find out what online social or professional networks a victim frequents. Additional information about a victim can be discovered in public records or through paid online background checks. In order to deal with bullying online, a person should use every means available to reduce his or her online footprint, from increasing security levels on social accounts to changing online screen names and passwords.

If a victim continues to be assaulted online by a cyberbully, it may be time to inform the website owner or email service provider of the violation. Once the owner of the website or domain has been contacted, he or she may be in a better legal position to identify and penalize the offender. A victim should also make an effort to identify the bully by his or her real life actions. Did the bullying online begin after a real life incident, such as a job promotion, a new romantic relationship or a conflict with a fellow student or co-worker? Has the online bully mentioned specific incidents or used information only a limited number of real life associates would know? Few cyberbullies select their victims at random, so a person who receives threatening online communications could also be the victim of a workplace or school bully. Once their anonymity has been compromised, either by the victim or an authority figure, many cyberbullies lack the courage to continue bullying their online targets.

EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Michael Pollick
By Michael Pollick
As a frequent contributor to EasyTechJunkie, Michael Pollick uses his passion for research and writing to cover a wide range of topics. His curiosity drives him to study subjects in-depth, resulting in informative and engaging articles. Prior to becoming a professional writer, Michael honed his skills as an English tutor, poet, voice-over artist, and DJ.
Discussion Comments
Michael Pollick
Michael Pollick
As a frequent contributor to EasyTechJunkie, Michael Pollick uses his passion for research and writing to cover a wide...
Learn more
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.