OSH Answers Fact Sheets

Easy-to-read, question-and-answer fact sheets covering a wide range of workplace health and safety topics, from hazards to diseases to ergonomics to workplace promotion. MORE ABOUT >

Download the free OSH Answers app
Download on the App Store Get it on Google Play

Search all fact sheets:

Type a word, a phrase, or ask a question

Internet Harassment or Cyberbullying

Why should a workplace look at Internet harassment?

Many workers do their work using the computer and the Internet. Increasingly Internet harassment is being identified as a concern at work, at home and at school.

Internet harassment, also referred to as “cyberbullying”, is the term used to describe the use of the Internet to harass, threaten, or maliciously embarrass. It can involve behaviours such as:

  • Sending unsolicited and/or threatening e-mail.
  • Encouraging others to send the victim unsolicited and/or threatening e-mail or to overwhelm the victim with e-mail messages.
  • Sending viruses by e-mail (electronic sabotage).
  • Spreading rumours.
  • Making defamatory comments about the victim online.
  • Sending negative messages directly to the victim.
  • Impersonating the victim online by sending an inflammatory, controversial or enticing message which causes others to respond negatively to the victim.
  • Harassing the victim during a live chat.
  • Leaving abusive messages online, including social media sites.
  • Sending the victim pornography or other graphic material that is knowingly offensive.
  • Creating online content that depicts the victim in negative ways.

What are some tips to prevent Internet harassment?

While every situation is different, in general, steps to help prevent cyberbullying can include:

  • Use a gender neutral e-mail address if you have a choice.
  • Make your e-mail password at least twelve (12) characters long and make sure that it is a combination of capital and lower-case letters, numbers, and symbols. The best passwords don't spell anything and don't follow a logical pattern.
  • Change your password frequently.
  • Review your e-mail signature (the block of text that gets added automatically to the end of an outgoing message). It should provide enough information about you so that you can be identified, but not so much that you are providing your e-mail recipients with personal information.
  • Use encryption (e.g., PGP (Pretty Good Privacy)) for person-to-person e-mail to prevent someone from impersonating you or reading your e-mail. A frequently asked questions document about PGP is available.
  • Watch for “red-flags”, for example someone asking where you live or where you work.
  • Be very cautious about meeting online acquaintances in person. If you choose to meet, do so in a public place and take along a friend or business associate.
  • Set up two e-mail accounts. One used for business correspondence and one that has another name for use in discussion groups, etc. Change or cancel your secondary account if you start receiving too much unwanted mail.
  • If you want to remain anonymous, DO NOT list your e-mail address on any Web pages or give your e-mail address when filling out forms on Web pages unless necessary.
  • Use an anonymous browser to browse the Web. Web sites collect all sorts of information about visitors (e.g., what Web browser you used, your Internet Service Provider and potentially your e-mail address). Anonymous browsers offer varying degrees of security, some are free and some are not.
  • Discuss your safety and privacy with your Internet Service Provider. Seek their help and advice.
  • Make sure your Internet Service Provider, discussion groups and chat networks have an Acceptable Use Policy (no harassment permitted) and that the policy is enforced by the administrator of the site.
  • Discuss Internet privacy and safety with your organization's Internet technology specialist. Follow any policies or procedures your organization has in place for Internet communication.

DO NOT

  • Do not tell anyone your password.
  • Do not share personal information in e-mail -- even e-mail addressed to a trusted individual.
  • Do not share personal information in public spaces anywhere online, nor give it to strangers, including in chat rooms.
  • Do not leave your computer logged in and unattended.
  • Limit the information you share in your "out of office" message to the dates of your absence and who to contact. Don't broadcast that you are on vacation or on work-related travel.
  • Do not attack or insult anyone while participating in discussion groups. If you disagree with the person, state your position objectively and factually.

How should you respond if someone is harassing you by e-mail?

If someone is harassing you by e-mail:

  • If the harasser is known to you, make it clear that you do not want him or her to contact you again.
  • Once you have told a known harasser not to contact you again, or if you are receiving harassing e-mail from someone you do not know, block or filter messages from the harasser. Many e-mail programs have a filter feature that will automatically delete or place e-mails from a particular e-mail address or that contain offensive words into a separate folder.
  • DO NOT reply to unsolicited, harassing or offensive e-mail if the harasser is not known to you. By responding, you confirm that your e-mail address is valid and active.
  • DO NOT open attachments as they may contain viruses.
  • Keep a log of any harassing activity.
  • Save all offending communications for evidence, both electronically and in hard copy (print). Do not edit or alter them in any way.
  • If this activity is happening at work, report the e-mail or Web harassment to you supervisor and/or the manager responsible for your organizations e-mail/Internet system, and if appropriate, the police.
  • Using your name, conduct a Web search to find out if any information exists about you, so you are at least aware of what information about yourself is publically available.
  • If the harasser is known to you and harassment continues after you have asked the person to stop, contact the harassers Internet Service Provider (ISP).
    • Most ISP's have clear policies prohibiting the use of their services to abuse another person.
    • Often, an ISP can stop the conduct by direct contact with the harasser or by closing his or her account.
    • The ISP domain name is identified by the information after the @ (e.g. name @ home.com). Most ISPs have an e-mail address such as postmaster @ domain name that can be used for complaints.

What can you do if someone is publicly harassing you (in a discussion group or chat situation)?

In a discussion group:

  • Keep a log of any harassing activity.
  • Save all offending communications for evidence, both electronically and in hard copy (print). DO NOT edit them in any way.
  • Contact the group's administrator and provide evidence of the harassment. If they fail to respond, stop participating in the group (i.e., have your e-mail removed from the group's distribution list).

In a live chat situation:

  • Log off or surf elsewhere. If the situation causes you to fear for your safety or that of others, contact your local police or law enforcement agency.
  • Keep a log of any harassing activity.
  • Save all offending communications for evidence, both electronically and in hard copy (print). DO NOT edit them in any way.
  • Contact the group's administrator and provide evidence of the harassment. If they fail to respond, stop participating in the group.

What should you do if someone is bullying or harassing you through social media sites?

Most social media sites (such as Facebook, Twitter, YouTube, and Snapchat) have published guidelines that state what is and is not okay to be posted on their sites. You can find these guidelines by looking for pages on “Terms and Conditions”, or Community Standards/Guidelines. These sites also have a mechanism for reporting abuse of these guidelines. When making a complaint, use the advice provided above about documenting your situation. Include a screenshot of the comment or a copy of the photograph as evidence when you submit your report. If you feel you are in immediate danger, contact the local police or law enforcement agency.

As a user, you can also opt to take action, such as:

  • Always think before you post – are these words or this photo something you would want everyone to see? Could your comments elicit a potentially harmful reaction?
  • Use recommended privacy settings provided by the site.
  • Unfriend, hide, block, or mute another user from seeing your profile.
  • Remove tags as necessary on posts or photos, or adjust your privacy settings so that you can review tags before they are published.
  • Keep personal details private, including your address, date of birth, phone number, school, credit card number(s), and passwords. Be aware of the details you’re showing in photos, such as address numbers, street names, and work buildings.
  • Log out of your accounts when you are not using them, especially when using a public computer or device.
  • Avoid retaliating. Most bullies are looking to get a reaction.

What should you NOT do if being harassed or bullied by e-mail?

DO NOT send or reply to e-mail when you are angry or upset. Wait until you are calm and composed; you do not want to become perceived as the harasser.

DO NOT rush in to a confrontation. You can risk starting a “flame war” which can rapidly escalate.

DO NOT respond to flaming (provocation online).

DO NOT engage in any question and answer scenarios that make you feel uncomfortable.

(From: Violence in the Workplace Prevention Guide, CCOHS)

Document last updated on July 12, 2017

Disclaimer

Although every effort is made to ensure the accuracy, currency and completeness of the information, CCOHS does not guarantee, warrant, represent or undertake that the information provided is correct, accurate or current. CCOHS is not liable for any loss, claim, or demand arising directly or indirectly from any use or reliance upon the information.