Discover Internet Abuse Laws

In the beginning, Internet abuse laws were drafted to protect internet users from fraud and other cybercrime types. Laws and policies designed to protect internet users are drafted and enforced by the FCC or Federal Communications Commission.


As the internet gained popularity, the number of reported cyberbullying cases increased dramatically. When the first cases began to appear, few law enforcement officers could punish the offender or protect the victim. In the case of Megan Meier, no charges were ever filed against the bullies who harassed her. The mother and daughter who initiated the ruse created a fictitious MySpace profile for a young man. They convinced Megan that “Josh” liked her and wanted to be her boyfriend. After a few weeks, Megan was told that Josh no longer wanted to talk to her.

The constant barrage of negative comments and veiled threats pushed Megan over the edge. Two weeks short of her 14th birthday, she committed suicide. The two perpetrators knew that Megan struggled with depression and took medication to control her condition.

Internet Abuse Laws

According to law enforcement officers who investigated the incident, they could not be charged whatever crime they committed because there was no documented charge on the books for what they had done. No charge existed that fit the description of what they had done. That eventually changed when the Cyberbullying Protection Law was drafted into legislation. The Cyberbullying Protection Law made it a crime to harass, stalk and bully another person over the internet. Other pieces of legislation soon followed. Cyberstalking laws were drafted and enacted in every state of the union. Federal legislation was also enacted to protect internet users from being stalked and harassed. Special laws were also passed that were designed to protect minors specifically. Each state was responsible for drafting, approving and enforcing their own versions of the federal Internet laws.

Various Types of Internet Abuse

Internet abuse takes many forms. With the introduction of new forms of technology, the number of fraud and identity theft cases skyrocketed in a few short years. In addition to major financial crimes, the Internet created the perfect medium for the production and sale of child pornography. The inclusion of the internet into public schools taught children how to navigate the world wide web. As students became more proficient in using computers, bullies began to use the internet to stalk and harass their victims. For a bully, the Internet was the perfect medium in which to operate. They could come and go as they pleased without leaving any physical evidence. The best part of them was that they could remain completely anonymous.

Internet Abuse Laws: Cyber Bullying

Internet abuse laws designed to deal with cyberbullying must be drafted in great detail to be effective. In Megan Meier’s case, the legislation came too late. However, the Foundation that bears Megan’s name continues to push for new and improved legislation that will hold cyberbullies accountable for their actions. Members of the foundation have been advocates of change to ensure each law that gets passed, no more victims will fall through the cracks. It is their goal for every victim to guarantee that their bully will be prosecuted to the fullest extent of the law. Cyberbullying laws cover a variety of activities that are now considered to be illegal. The following activities are included in many pieces of legislation:

  • Stalking using any communications device
  • Sending threatening texts or emails over cell phones, texts, instant messaging, etc.
  • Harassing an individual with repeated attempts at contact either through phone calls or texts, emails, instant messaging, etc.
  • Soliciting sexual favors
  • Sending or receiving pornographic images of minors
  • Sexually interacting with a minor using any device governed by the FCC.

Cyberbullying has become one of the fastest-growing crimes in history. Before the Internet, a bully could only harass those that were close to their location. With the internet as a starting point, they can threaten, harass and stalk individuals who are half a world away. There are few boundaries they can’t cross, and they can do it all from the security of their own home. Technologically savvy individuals can hide their tracks fairly well, leaving behind few traces for investigators to follow. Those who are exceptionally skilled at hacking and programming can create shields and firewalls that are difficult to crack, even with the advanced systems law enforcement agencies can access.

Internet Abuse Statistics

Statistics that detail how extensive cyberbullying really is create an incredible picture of just how widespread the problem is. Internet stalking and harassment reports increase daily and from the looks of the numbers, there is no end in sight.

  • Over 80 percent of students think that cyberbullies choose to use the internet because they can remain anonymous, and it is much easier for them to get away with the crime.
  • Over two-thirds of the teens surveyed believe that cyberbullying is becoming a serious problem that needed to be investigated further.
  • Over 40 percent of students admit to having been bullied at least once, and out of those numbers, at least 1 in 4 claims that it has happened more than once
  • Statistics have proven that girls are targeted by cyberbullies twice as often as boys.
  • The majority of girls who are stalked online are white.
  • Statistics state that a bully online is 9 times more likely to contemplate suicide than individuals who aren’t bullied.
  • Statistics show that only 1 out of every 10 children bullied online will report the incident to a parent, teacher, or another person in a position of authority.
  • Cell phones are increasingly ordinary among middle and high school students. It is estimated that almost 80 percent of students use a cell phone or other electronic device .daily
  • Statistics have shown that almost 90 percent of teens have seen or experienced bullying on social media sites such as Facebook and Twitter.

Internet abuse laws target individuals who attempt to use the internet as their own personal playground. Cyberbullying and Internet stalking have reached epidemic proportions, causing schools, libraries, and other public places to implement anti-bullying programs to raise awareness about the dangers of surfing the internet without taking adequate precautions. Anti-bullying programs attempt to teach both parents and children safe ways to navigate the internet without becoming vulnerable to predators and cyberbullies capable of hacking into personal computers and other electronic devices. Programs designed to help students remain safe while surfing the web offer tips to the public to learn what types of online behavior are acceptable and what should be avoided.


Anti-virus programs are designed to prevent hackers from installing spyware and malware on computers. Hackers attach files to emails and websites so that when a person opens the attachment or clicks on the website, the malicious software is downloaded directly to their computer. These programs can take over manual operations of a laptop’s camera or install keyloggers that track the users every move. This allows the hacker to retrieve passwords, codes, confidential banking information, and a variety of other types of private and personal information.

Vickie Saunders
Vickie Saunders
Introvert. Tv enthusiast. Freelance twitter practitioner. Beeraholic. Analyst. Bacon trailblazer. Troublemaker. Skateboarder, traveler, band member, Bauhaus fan and independent Art Director. Performing at the fulcrum of minimalism and function to craft an inspiring, compelling and authentic brand narrative. Nothing ventured, nothing gained.

More from author

Related posts

Latest posts

Burgundy Boots – A Trendy Boot For Summer 2022

Burgundy Boots is a brand new boot collection launched by fashion house HUGO in June 2019. It is the first collection to be found...

Learn How to Draw the Cool Black Shadow Figure

You've no doubt seen his work online. With speed and accuracy that is baffling, I will show you how to draw the black shadow...

Distance Learning – The New Way to Learn Online

Distance learning is the new way to learn online with all-new interactive learning tools and features. It’s a new, easy way to access your...

How to Build a Financial Modeling Strategy in 2022

The financial modeling strategy is a business model developed by the company for planning and developing products, services, and markets to achieve sustainable profit...

Quotes About Positive Mental Health

Quotes about positive mental health, from famous people, like Oprah Winfrey and Stephen King, and quotes about negative mental health from celebrities like Angelina...

Want to stay up to date with the latest news?

We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!