Mark Lee

This June, in Mallory v. Norfolk Southern Railway Company,[1] the Supreme Court held that a Pennsylvania statutory scheme which requires out-of-state corporations to “consent” to general personal jurisdiction to do business in the state was consistent with Due Process.[2]  This decision allows Robert Mallory, a Virginia resident, to bring a lawsuit in Pennsylvania state court against his former employer, Norfolk Southern, a company incorporated and headquartered in Virginia, for injuries allegedly sustained in the course of his employment at Norfolk Southern facilities in Ohio and Virginia.[3]  While the majority insisted that this decision is consistent with its precedent,[4] it has the potential to displace the Court’s existing corporate personal jurisdiction jurisprudence and green light a forum shopping spree.  But it is nevertheless unclear whether the Mallory decision can withstand a challenge under the Dormant Commerce Clause.

A Brief Overview of Corporate Personal Jurisdiction

The early conception of personal jurisdiction was set forth in the Court’s 1878 decision in Pennoyer v. Neff,[5] where the Court held that a state could exercise personal jurisdiction only over persons or property located within its territory.[6]  With these territorial limitations in mind, state statutes sometimes required corporations to appoint an in-state agent to receive service of process which gave the corporate entity a “presence” in the state.[7]  Although it was typically considered to be an unreasonable burden to require companies to defend against causes of action having no connection to the forum,[8] this was not always the case.[9]  As the 20th century progressed, the Court’s decision in International Shoe Co. v. Washington[10] largely supplanted territorial notions of personal jurisdiction with a contacts-based test.[11]  To exercise personal jurisdiction consistent with the Due Process Clause, the Court required that a plaintiff’s claims arose out of the defendant’s activities within the state or that the defendant had taken other such acts to render the corporation liable to suit.[12]  Scholars later labeled these bases as specific personal jurisdiction and general personal jurisdiction.[13]  Specific and general personal jurisdiction comport with due process because the defendant’s contacts with the forum make defending a suit consistent with “traditional notions of fair play and substantial justice.”[14]  While there have been some interesting developments in specific jurisdiction over the years,[15] the focus of Mallory was general personal jurisdiction.[16]  The Court has previously held that to exercise general personal jurisdiction, a corporate defendant’s contacts must be so extensive that the defendant is “essentially at home in the forum [s]tate.”[17]  A corporation is considered to be “at home” wherever it is incorporated, has its principal place of business,[18] or is engaged in such substantial operations as to render it at home in that state.[19]

The Court’s Decision in Mallory v. Norfolk Southern Ry. Co.

 In Mallory, the Court purportedly recognized another basis for the exercise of general jurisdiction, “consent”  by registering to do business within a state.[20]  Under Pennsylvania law, out-of-state corporations who register to do business in the Commonwealth contemporaneously agree to defend any cause of action against them.[21]  The majority concluded that since the Court’s 1917 decision in Pennsylvania Fire Ins. Co. of Philadelphia v. Gold Issue Mining & Milling Co.,[22] that a state can, consistent with the Constitution, require a company to “consent” to personal jurisdiction as a requirement of doing business in the forum.[23]  In Pennsylvania Fire, the Court upheld a Missouri law which required out-of-state insurance companies to appoint a state official as the company’s agent to receive service of process and accept service on that official as valid in any suit.[24]  Relying on Pennsylvania Fire, the Court made short work of Norfolk Southern’s arguments and ruled in Mallory’s Favor.

The Court’s decision in Mallory was only supported by a majority of the justices, as Justice Coney Barrett joined by Chief Justice Roberts, Justice Kagan, and Justice Kavanaugh dissented.  In her dissent, Justice Coney Barrett took issue with the majority’s acceptance of corporate registration as being synonymous with consent.[25]  Justice Coney Barret contended that this view of consent effectively permits a state to “defeat the Due Process Clause by adopting a law at odds with the Due Process Clause.”[26]  Furthermore, she argued that Pennsylvania’s assertion of general jurisdiction over every company doing business within its borders implicates federalist interests, as Pennsylvania is intruding on the prerogative of other states to adjudicate the rights of its citizens and enforce its laws.[27]  Finally, Justice Coney Barrett contended that Pennsylvania Fire and other cases that utilize the territorial approach to personal jurisdiction and the legal fictions of “implied consent” and “corporate presence” were overruled by the Court’s decision in International Shoe.[28]

Potential Effects of & Challenges to the Mallory Decision

While the effects of the Court’s decision in Mallory are not yet clear, the most obvious consequence is that other states will enact statutory schemes subjecting corporations who do business in-state to general personal jurisdiction in their courts.  It seems likely that state legislatures would be willing to enact legislation that has the potential to bring in extra revenue to their courts and attorneys.  If this does become prevalent, national corporations will likely face increased litigation in states that have preferential choice-of-law provisions for plaintiffs, and personal jurisdiction may become the next preferred tool for forum shopping.  Furthermore, if corporations are subject to general jurisdiction in several states by virtue of “consenting” by registering to do business in the forum, the concepts of general and specific jurisdiction set forth in International Shoe and developed by its progenies may become largely unnecessary.

While the Court’s decision is seemingly final regarding personal jurisdiction, Justice Alito’s concurrence raised that this decision may run afoul of the dormant Commerce Clause which “prohibits state laws that unduly restrict interstate commerce.”[29]  Under applicable precedent, “once a state law is shown to discriminate against interstate commerce ‘either on its face or in practical effect,’ the burden falls on the State to demonstrate both that the statute ‘serves a legitimate local purpose,’ and that this purpose could not be served as well by available nondiscriminatory means.”[30]  Justice Alito noted that Pennsylvania’s registration statute likely discriminates against out-of-state companies or imposes a significant burden on interstate commerce and was skeptical of a state’s interest in adjudicating claims by non-residents harmed by out-of-state actors through conduct outside the state.[31]  Nevertheless, a successful challenge under the dormant Commerce Clause faces long odds in light of the Court’s decision in National Pork Producers Council v. Ross,[32] which displayed the current Court’s division on breadth of the dormant Commerce Clause and its general reluctance to use it to invalidate state law.[33]  Therefore, while the Court’s decision in Mallory has the potential to have significant effects on corporate personal jurisdiction, it seems likely that the Court has not yet said its last word.  So, is the International Shoe on the other foot? We will just have to wait and see.


[1] 600 U.S. 122 (2023).

[2] Id. at 146.

[3] Id. at 126.

[4] Id. at 146 (“[U]nder our precedents a variety of ‘actions of the defendant’ that may seem like technicalities nonetheless can ‘amount to a legal submission to the jurisdiction of a court.’” (quoting Ins. Corp. of Ir. v. Compagnie des Bauxites de Guinee, 456 U.S. 694, 704–705 (1982))).

[5] 95 U.S. 714 (1878).

[6] Id. at 722.

[7] See Charles W. “Rocky” Rhodes, Nineteenth Century Personal Jurisdiction Doctrine in a Twenty-First Century World, 64 Fla. L. Rev. 387, 436 (2012) (“To alleviate the injustice from a corporation’s avoidance of its obligations where they arose, states began to require, as a statutory condition for the corporation to do business in the state, that the corporation register with state authorities and appoint an agent to accept service of process in cases related to its forum activities.”).

[8] See Simon v. S. Ry. Co., 243 U.S. 93, 130 (1915) (“statutory consent of a foreign corporation to be sued does not extend to causes of action arising in other states.”).

[9] See Penn. Fire Ins. Co. of Phila. v. Gold Issue Mining & Milling Co., 243 U.S. 93 (1917).

[10] 326 U.S. 310 (1945).

[11] In Burnham v. Superior Court of Cal., 495 U.S. 604 (1990), the Court upheld transient or “tag” jurisdiction as being consistent with Due Process but noted that consent and presence were purely fictional, and that International Shoe cast those fictions aside.

[12] International Shoe, 326 U.S. at 317–318.

[13] See Arthur T. von Mehren and Donald T. Trautman, Jurisdiction to Adjudicate: A Suggested Analysis, 79 Harv. L. Rev. 1121, 1136–37 (1966).

[14] International Shoe, 326 U.S. at 316 (quoting Milliken v. Meyer, 311 U.S. 457, 463 (1940)).

[15] For a discussion about developments in specific personal jurisdiction see generally Anthony Petrosino, Rationalizing Relatedness: Understanding Personal Jurisdiction’s Relatedness Prong in the Wake of Bristol-Myers Squibb and Ford Motor Co., 91 Fordham L. Rev. 1563, 1563 (2023).

[16] Mallory v. Norfolk S. Ry. Co., 600 U.S. 122, 124 (2023).

[17] Goodyear Dunlop Tires Operations, S.A. v. Brown, 564 U.S. 915, 919 (2011).

[18] Daimler AG v. Bauman, 571 U.S. 117, 137 (2014).

[19] Id. at 139 n.19.

[20] See Mallory, 600 U.S at 135–136.

[21] 42 Pa. Cons. Stat. § 5301(a)(2)(i), (b).

[22] 243 U.S. 93 (1917).

[23] Id. at 96.

[24] Id. at 96–97.

[25] Mallory, 600 U.S at 167.

[26] Id. at 168.

[27] Id. at 169–170.

[28] Id. at 177.

[29] Id. at 157–63.

[30] Maine v. Taylor, 477 U.S. 131, 138 (1986).

[31] Mallory, 600 U.S. at 161–63.

[32] 598 U.S. 356.

[33] Ross, 598 U.S. 356 (affirming dismissal for failure to state a claim on a dormant Commerce Clause challenge of a California law barring the sale of pork from pigs confined in a cruel manner).

By Cameron Bray

On April 20, 2022, attorneys and Justices of the United States Supreme Court sparred over whether Miranda warnings[1] are a constitutional right or a “judicially crafted prophylactic rule,”[2] as lawyer Roman Martinez argued in open court.  In the case of Vega v. Tekoh, the Court granted certiorari[3] of “whether a plaintiff may state a claim for relief against a law enforcement officer under Section 1983 based simply on an officer’s failure to provide the warnings prescribed in Miranda.”[4]The case centers around the Fifth Amendment right against self-incrimination[5] and the Civil Rights Act of 1871, 42 U.S.C. § 1983, which grants a damages remedy for violations of constitutional and statutory civil rights.[6]  At issue is the precedent case Dickerson v. United States,[7] which upheld Miranda in spite of Congress[8] in 2000 but described the doctrine as “constitutionally based”[9] and having “constitutional underpinnings”[10] rather than as a true-born, fundamental constitutional right, like the right to remain silent at trial.[11]

The facts of Vega v. Tekoh are in controversy, but the New York Times reports that respondent, Terence B. Tekoh, is “a hospital attendant who was accused of sexually abusing an immobilized patient receiving an emergency MRI.”[12]  On the flip side, petitioner, Carlos Vega, is a sheriff’s deputy in Los Angeles County who interrogated Mr. Tekoh in connection with a “credible report of sexual assault.”[13]  Accounts differ as to the nature of the interrogation—whether it was coercive or not[14]—but by all accounts, Deputy Vega did not Mirandize Mr. Tekoh prior to questioning, Mr. Tekoh signed a confession, a California trial court admitted the statement in evidence, and a jury acquitted Mr. Tekoh on the merits.[15]

The federal district court, in ruling on Mr. Tekoh’s § 1983 suit against Los Angeles County, held that the use of an un-Mirandized statement was insufficient to show a violation of his right against self-incrimination.[16]  However, the Court of Appeals for the Ninth Circuit, in a published opinion, reversed and held that a plaintiff may state a claim against the State under § 1983 where “the un-Mirandized statement has been used against the defendant in the prosecution’s case in chief in a prior criminal proceeding.”[17]  In so ruling, Judge Wardlaw on behalf of the panel vacated the court’s judgment and remanded for a new trial with orders to include Mr. Tekoh’s instruction on un-Mirandized confessions.[18]  The court of appeals then denied en banc review, with seven judges dissenting.[19]

Based on oral argument in Vega v. Tekoh, it remains to be seen whether the Supreme Court will rule Miranda a constitutional “right” or mere prophylactic rule under the Fifth Amendment.[20]  Either way, with police interrogations and misconduct increasingly under scrutiny, the decision will have a major impact on § 1983 lawsuits moving forward beyond the current Term.[21]  A rule in favor of Mr. Tekoh could create a world in which an un-Mirandized statement in evidence gives rise to liability not just in a few federal circuits, but in all courts across the United States.[22]


[1] In the landmark case of Miranda v. Arizona, 384 U.S. 436, 444 (1966) (Warren, C.J.), the Court held that “[p]rior to any questioning, the [arrestee] must be warned that he has a right to remain silent, that any statement he does make may be used as evidence against him, and that he has a right to the presence of an attorney, either retained or appointed.”  This American policing practice, as seen on shows like Cops and Law & Order, has come to be known as a “Miranda warning” or “Mirandizing” the suspect.

[2] Jordan S. Rubin, Miranda Warnings Probed by Supreme Court in Police-Suit Case, Bloomberg L. (Apr. 20, 2022), https://news.bloomberglaw.com/bloomberg-law-news/miranda-warnings-probed-by-supreme-court-in-police-suit-appeal.

[3] Vega v. Tekoh, 142 S. Ct. 858 (2022) (reviewing judgment of the Court of Appeals for the Ninth Circuit).

[4] Petition for Writ of Certiorari, Vega, 142 S. Ct. 858 (No. 21-499), 2021 WL 4553767.

[5] No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a grand jury, except in cases arising in the land or naval forces, or in the militia, when in actual service in time of war or public danger; nor shall any person be subject for the same offense to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.” U.S. Const. amend. V (emphasis added).  The relevant provision for Miranda warnings is called the Self-Incrimination Clause of the Fifth Amendment.

[6] “Every person who, under color of any statute, ordinance, regulation, custom, or usage, of any State or Territory or the District of Columbia, subjects, or causes to be subjected, any citizen of the United States or other person within the jurisdiction thereof to the deprivation of any rights, privileges, or immunities secured by the Constitution and laws, shall be liable to the party injured in an action at law . . .” 42 U.S.C. § 1983.  Section 1983 is the go-to cause of action for civil rights plaintiffs against state actors such as police officers and sheriff’s departments.

[7] 530 U.S. 428 (2000).

[8] In the wake of Miranda, two years later, Congress enacted 18 U.S.C. § 3501 (1968), which made the admissibility of a custodial statement, or “confession,” turn solely on whether it was voluntarily given by the suspect.  This went against Miranda’s holding that an arrestee must be warned prior to questioning of his Fifth Amendment rights.

[9] Id. at 441 (Rehnquist, C.J.).

[10] Id. at 440 n.5.

[11] During oral argument, Justice Barrett observed that Dickerson “didn’t ever use the word ‘constitutional’ right.”  See Rubin, supra note 2.  The defendant’s right to silence as a constitutional matter was established by Griffin v. California, 380 U.S. 609 (1965), which held that neither the trial court nor the prosecutor may comment on the defendant’s failure to testify before a jury.  Id. at 615.  Chief Justice Rehnquist’s view of Miranda as a constitutional “rule” (not a “right”) was later endorsed by a plurality in Chavez v. Martinez. 538 U.S. 760, 763 (2003), which ruled against respondent because of qualified immunity.  Chavez, to be clear, is non-binding, and the federal circuits are split in whether they regard Miranda warnings as a constitutional right for purposes of § 1983 liability.  See Petition for Writ of Certiorari, supra note 4, at *2.

[12] Adam Liptak, Supreme Court Debates Whether Miranda Warnings Are a Constitutional Right, N.Y. Times (Apr. 20, 2022), https://www.nytimes.com/2022/04/20/us/supreme-court-miranda-rights.html?searchResultPosition=1.

[13] Petition for Writ of Certiorari, supra note 4, at *4.

[14] According to Deputy Vega, “Tekoh quickly confessed to the assault, and later stood trial, where his confession was admitted into evidence.  A jury nevertheless acquitted Tekoh.” Id. at *4–5.  By contrast, Mr. Tekoh claims that: “Petitioner Vega investigated this allegation at the hospital.  He interrogated Respondent in a small windowless, soundproof room . . . [A]fter about an hour in the room with the door shut, Respondent wrote a vague, apologetic confession . . . While Petitioner insists that the statements Respondent gave were voluntary and immediate, Respondent testified to an interrogation replete with profanities and threats to have Respondent and his family deported, and refusing to allow Respondent to speak to a lawyer or one of his supervisors.”  Brief in Opposition, Vega v. Tekoh, 142 S. Ct. 858 (2022) (No. 21-499), 2021 WL 5864537, at *3.

[15] David G. Savage, Los Angeles Police Dispute at Center of Supreme Court Case on Miranda Warnings, L.A. Times (Apr. 20, 2022), https://www.latimes.com/politics/story/2022-04-20/supreme-court-ready-to-shield-police-from-being-sued-for-ignoring-miranda-warnings-hold.

[16] See Tekoh v. Cty. of Los Angeles, 985 F.3d 713, 717 (9th Cir. 2021) (noting that the District of Central California failed to instruct the jury “that it should find in [plaintiff’s] favor on the Fifth Amendment claim if it determined that Deputy Vega obtained statements from him in violation of Miranda that were used in the criminal case against him.”).

[17] Id. at 715.

[18] Id. at 726.

[19] 997 F.3d 1260 (9th Cir. 2021).

[20] Chief Justice Roberts, who once clerked for the Dickerson Court, noted that, “[former Chief Justice Rehnquist] was somebody careful with his words, he didn’t say Miranda is in the Constitution.  He talked about constitutional underpinnings, constitutional basis.”  Rubin, supra note 2.  However, he also asked petitioner’s attorney, Mr. Martinez, “So why isn’t that right one secured by the Constitution?”  Id.  By contrast, Justice Kagan said that Dickerson “understood that Miranda had come to mean something extremely important in the way people understood the law and the way people understood the Constitution” and that undermining Miranda could hurt the Court’s legitimacy.  Id.

[21] LastWeekTonight, Police Interrogations: Last Week Tonight with John Oliver (HBO), YouTube (Apr. 18. 2022), https://www.youtube.com/watch?v=obCNQ0xksZ4.

[22] In dissent, the late Justice Scalia dared the Dickerson Court to take the opinion “out of the realm of power-judging and into the mainstream of legal reasoning” by simply declaring that Miranda was in fact a federal constitutional right recognized by the Supreme Court.  Dickerson, 530 U.S. at 445–46 (Scalia, J., dissenting).

 

By John Van Swearingen

On Wednesday, November 23, 2016, the Fourth Circuit issued a published opinion in the civil case Rodriguez v. Bush. This matter was a habeas corpus petition brought by an offender sentenced to forty-five years in prison for drug trafficking. The United States District Court for the District of South Carolina denied Rodriguez’s petition under 28 U.S.C. § 2254 (2012), holding that Rodriguez’s claim for ineffective assistance of counsel failed to establish that his defense was prejudiced by his counsel’s performance. Rodriguez’s claim was rooted in his counsel’s failure to object to state trial judge’s denial of Rodriguez’s accepted plea offer. The Fourth Circuit Court of Appeals affirmed the district court’s denial of Rodriguez’s petition on the basis that there is no federal or constitutional right to have a plea bargain accepted by a trial court, and therefore, his counsel’s failure to object could not establish prejudice to Rodriguez’s defense.

Facts and Procedural History

In 2009, on the day Rodriguez’s trial, the prosecutor offered Rodriguez and his co-defendants various plea bargains. The offer to Rodriguez was for a recommended sentence of 20 years, and Rodriguez’s co-defendants were made similar offers. The offers to the co-defendants were accepted by the court.

However, when Rodriguez’s counsel presented the plea offer to the trial judge, the judge rejected the offer, stating that “he was not going to accept the plea and that he was ready to try a case this week.” While Rodriguez’s counsel did attempt to convince the judge to accept the plea deal, he did not object on the record to preserve the rejection for appeal.

The state court denied Rodriguez’s motion for post-conviction relief, stating that his counsel’s failure to object did not prejudice Rodriguez’s defense and the trial court’s denial of the plea offer did not violate Rodriguez’s due process rights. Rodriguez then appealed to the South Carolina Supreme Court, but certiorari was denied. Rodriguez then filed a petition in federal court under § 2254.

The Ineffective Assistance of Counsel Claim

Strickland v. Washington, 466 U.S. 668, 687 (1984), governs ineffective assistance of counsel claims. Under Strickland, to prove ineffective assistance of counsel, Rodriguez must show (1) “that counsel’s performance was deficient” and (2) “that the deficient performance prejudiced the defense.”

Despite being a two-pronged test, a reviewing court is free to examine the prejudice prong first, as it is dispositive to the claim. Rodriguez was not prejudiced by his counsel’s failure to object to the rejection of the plea deal, because a defendant cannot be prejudiced by a claim that has no merit under governing law. Therefore, Rodriguez’s ineffective assistance of counsel claim fails.

There is No Due Process Claim to Have a Plea Deal Accepted by the Court

In Missouri v. Frye, 132 S. Ct. 1399, 1410 (2012), the Supreme Court held that there is no federal right to have a judge accept a plea deal. The Court further clarified this point in Lafler v. Cooper, 132 S. Ct. 1376, 1387 (2012), explicitly stating that there can be no due process claim even where “a plea deal is accepted by the defendant but rejected by the judge.” Even further, there is no constitutional claim under the same facts. Fields v. Attorney Gen. of Md., 956 F.2d 1290, 1297 n.19 (4th Cir. 1992).

Therefore, the governing law clearly states that Rodriguez, nor any other similarly-situated defendant, claims a right to have an accepted plea offer honored by a presiding judge. Rodriguez based his due process claim on the premise that such a right existed. Since the claim has no support under governing law, and because this same claim forms the basis of his ineffective assistance of counsel claim, both of his claims on appeal fail.

                                                                    Disposition

The Fourth Circuit affirmed the district court’s denial of Rodriguez’s petition under § 2254. Both the ineffective assistance of counsel and due process claims were based on the premise that a defendant has a right to have a plea deal accepted by a presiding judge. Because no such right exists, Rodriguez’s claims were properly denied.

handcuffs-1078871_960_720

By Mike Stephens

On November 7, 2016, the Fourth Circuit decided the criminal case of Dilworth v. Adams. Michael Dilworth (“Dilworth”) was being held as a pretrial detainee in a North Carolina detention facility, facing charges for failing to appear in court. While detained, Dilworth was involved in an altercation with a fellow inmate and an separate altercation with two correctional officers. Dilworth was placed in disciplinary segregation, without a hearing, following both altercations. Dilworth appealed the district court’s grant of summary judgment in defendants’ favor, arguing that the district court erred in finding Dilworth’s procedural due process rights under 42 U.S.C. § 1983 were not violated when Dilworth was denied a hearing. Additionally, Dilworth appealed the district court’s grant of summary judgment on his claim of excessive force, arguing the district court applied the wrong standard governing a claim of excessive force. The Fourth Circuit held that Dilworth’s due process rights were violated by not providing a hearing, and directed that judgment be entered in favor of Dilworth because the defendants concede no hearing took place. The Fourth Circuit also remanded the excessive force claim given that a subsequent Supreme Court of the United States decision clarified that an objective standard governed the claim.

Facts and Procedural History

While awaiting trial for failure to appear in court, Dilworth was involved in an altercation with a fellow inmate on May 11, 2013. The responding officer filed a disciplinary report, stating he had disciplined Dilworth by placing him in segregation for 45 days. This decision was approved by the commander. On May 21, Dilworth filed a written appeal demanding a hearing which was later dismissed after being reviewed by another correctional officer. Dilworth was released from segregation on June 20 without ever being granted a hearing.

Not long after being released from segregation, Dilworth was involved in an altercation with two officers, Officer Cookson and Officer Trott. The parties dispute how the altercation was started. Yet again, a disciplinary report was filed stating Dilworth had been placed in segregation for 45 days. The decision was again approved by the watch commander. Again, Dilworth filed a written appeal demanding a hearing and review of video evidence regarding the altercation. The appeal was again dismissed. Dilworth served the full 45 day sentence in segregation. Dilworth sued several correctional officers, claiming his due process rights were violated by failing to provide hearings and also claiming the officers in the second altercation used excessive force.

The district court granted summary judgment in favor of the defendants on both claims. The district court reasoned that Dilworth’s due process rights were not violated because Dilworth was given notice of the charges and the opportunity to file a written appeal. Additionally, the district court applied a subjective standard on the excessive force claim, holding that Dilworth had to show that Cookson and Trott used force “maliciously and sadistically to cause harm.” The court held that no reasonable jury could find the officers had a “sufficiently culpable state of mind.” Dilworth appealed.

Due Process Claim

The Fourth Circuit held that Dilworth’s due process rights were violated by not granting a hearing. Given the fact that no hearing took place, the Court directed that judgment be entered in Dilworth’s favor.

Due process claims require two inquiries: (1) whether placing Dilworth in disciplinary segregation “implicated a liberty interest triggering procedural due process requirements;” and (2) if yes, whether the procedures provided to Dilworth satisfied those liberty interests.

In the first inquiry, the Court, agreeing with the district court, found that a pretrial detainee had a liberty interest in freedom from “punishment” while detained and awaiting trial. Defendants argued that only punishments that impose “atypical and significant hardship” on prisoners violated a liberty interest. The Fourth Circuit disagreed, stating that the “atypical and significant hardship” standard did not apply when deciding procedural due process claims of pretrial detainees. The court held that that the Bell v. Wolfish standard of procedural due process claims grant pretrial detainees a liberty interest in freedom from “punishment.” The Court also held that placing Dilworth in segregation was a “punishment” because there was a “expressed intent to punish” given Dilworth was confined to his cell for 23 hours each day and denied all personal contact except with attorneys or members of the clergy. Thus, the Fourth Circuit answered the first inquiry of the due process claim in the affirmative.

In the second inquiry, the Court held that the detention facility failed to meet the “procedural minimums that pertain even in the prison setting.” In Wolff v. McDonnell, the Supreme Court of the United States held that an inmate must be provided a hearing, a written notice of the alleged violation 24 hours before the hearing, and a written statement, after the hearing, detailing the reasons for the disciplinary action. The Court made note of the fact that the detention facility published these requirements within its own policy regarding inmate discipline. The defendants conceded that these requirements were not provided to Dilworth and no factual dispute existed regarding the process Dilworth received. While an inmate may not be provided the same process as a defendant in a trial, such as the right to counsel, the minimum requires a hearing where the inmate may call some witnesses. The Court was also careful to note that “administrative segregation,” or segregation for a temporary amount of time following an altercation, was allowed, provided that the inmate is later given a hearing. Yet, the Fourth Circuit held that Dilworth was not provided a hearing and that the segregation amounted to a punishment and Dilworth’s procedural due process rights were violated as a matter of law. Thus, the Court remanded to resolve Dilworth’s damages claim.

Excessive Force Claim

The Fourth Circuit remanded Dilworth’s excessive force claim so that the district court could apply the proper standard set out in the intervening Supreme Court decision, Kingsley v. Hendrickson. In Kingsley, the Supreme Court of the United States held that a pretrial detainee’s excessive force claim should be governed by an objective standard. A pretrial detainee has to show that the force “purposely or knowingly used against him was objectively unreasonable.” Both parties agreed that the district court had not applied the Kingsley standard to Dilworth’s claim. Therefore, the Court remanded so that the district court could apply the proper standard. The Fourth Circuit also recommended that the district court should view the video that may show evidence regarding this claim, citing to a decision that held a grant of summary judgment on an excessive force claim premature when the trial court did not view video evidence of the altercation.

Disposition

The Fourth Circuit reversed the district court’s grant of summary judgment in defendant’s father on Dilworth’s due process claim and ordered that judgment be entered for Dilworth. The Court remanded this claim so the district court could resolve the damages claim. The Court also vacated the district court’s decision regarding Dilworth’s excessive force claim and remanded it for further proceedings.

Prison outside

By Taylor Anderson

On July 1, 2015, the Fourth Circuit issued its published opinion regarding the civil case Incumaa v. Stirling. The appellant, prisoner Lumumba Kenyatta Incumaa (“Incumaa”), appealed the district court’s decision granting appellee South Carolina Department of Corrections’ (the “Department”) motion for summary judgment on the ground that the Department’s policy did not violate the Religious Land Use and Institutionalized Persons Act (“RLUIPA”) and that the Department did not violate Incumaa’s right to procedural due process. The Fourth Circuit affirmed the district court’s decision as to the RLUIPA claim holding that the claim was not sufficient to go before a jury. Additionally, the Fourth Circuit reversed the grant of summary judgment as it related to the procedural due process claim, holding that there is a triable dispute as to whether the Department’s process for determining which inmates are fit for release from security detention meets the minimum requirements of procedural due process.

Incumaa Alleges RLUIPA and Due Process Violation

In 1988, Incumaa began serving a life sentence without the possibility of parole in a prison operated by the Department. Incumaa is a member of the Nation of Gods and Earths (“NOGE”), a group whose adherents are also known as “Fiver Percenters.” Some Five Percenters have referred to the NOGE as a religion while others have denied it being a religion.

In April 1995, a group of Five Percenters—including Incumaa—organized a prison riot. During the riot, the assailants took three Department employees hostage and held them for 11 hours during a standoff with police. Four law enforcement officers were hospitalized. On June 16, 1995, the Department designated the Fiver Percenters as a Security Threat Group (“STG”).

Due to his role in the 1995 riot, Incumaa was validated as a Five Percenter, taken out of the general population, and placed in the Maximum Security Unit. Incumaa was transferred to the Special Management Unit (“SMU”) in 2005, and he remained in SMU up until this trial. Both the Maximum Security Unit and the SMU are considered security detention and both house inmates who have engaged in violent behavior. At the time of trial, Incumaa was one of only two Five Percenters housed in the SMU. Other validated Five Percenters were permitted to reside in the general population and openly maintained their affiliation with the group. During the decades Incumaa spent in security detention, he did not commit a single disciplinary infraction.

Incumaa claimed that the SMU is substantially more restrictive than the general population. For example, in SMU, Incumaa is (1) confined to his cell 24 hours a day on non-recreation and non-shower days; (2) permitted to leave his cell for recreation only one hour approximately ten times per month; (3) allowed only a ten-minute shower three times per week; and (4) strip searched, made to lift and shake his genitalia, made to bend over, spread his buttocks in the direction of the officer, then made to squat and cough, and afterwards hand cuffed behind his back every time he leaves his cell.

Department regulations required a review of each SMU inmate’s candidacy for release every 30 days. There are three bases on which the Department may recommend reclassification and/or release from the SMU: (1) the inmate renounces affiliation with the STG; (2) improvement in behavioral level; or (3) the Department Director removes the inmate’s group from the STG list. In this case, renunciation of affiliation with the STG would entail Incumaa renouncing his affiliation with the NOGE, since the NOGE was labeled as a STG. The regulations require that the inmate receive a notice of the classification decision after each 30-day review period. The regulations do not require that any factual basis be provided for its decision to recommend against release from the SMU. The record contained copies of Incumaa’s classification notices spanning over several years.

On December 12, 2012, Incumaa filed a pro se complaint against the Department pursuant to 42 U.S.C. § 1983. Incumaa claimed that the Department’s renunciation policy violated his rights under RLUIPA. Incumaa also claimed that, throughout his detention in SMU, the Department violated his procedural due process rights by failing to conduct meaningful review of whether he was fit for release to the general population. The district court granted the Department’s motion for summary judgment as to both claims. Incumaa filed a timely appeal.

The RLUIPA Claim is Without Merit

In relevant part, RLUIPA states: “No government shall impose a substantial burden on the religious exercise of a person resided in or confined to an institution . . . .” Incumaa argued that the Department policy similarly imposed a substantial burden on his religious exercise because it forced him to choose between continued adherence to his religion—the NOGE—in solitary confinement on one hand, and the far more favorable living conditions of the general population on the other.

The Fourth Circuit, for the purposes of this case, assumed that the NOGE was a religious group entitled to protections. However, the Fourth Circuit said that Incumaa’s RLUIPA claim failed because the Department’s policy did not force him to renounce his religion under the NOGE. The Fourth Circuit looked to the Department’s three avenues for securing release from the SMU, and noted that renunciation was only one of three avenues, therefore Incumaa was not forced to renounce his religion under the NOGE in order to be released from SMU.

Moreover, the Court recognized that other Five Percenters reside in the general population and maintain their affiliation, demonstrating that the Department is not forcing a renunciation of religion. The Fourth Circuit held that no reasonable factfinder could conclude that Incumaa’s renunciation of his faith is a prerequisite to returning to the general population. Incumaa failed to demonstrate that the Department’s policy imposes a substantial burden on his religion, therefore, the Department prevailed on the RLUIPA claim as a matter of law.

Incumaa’s Due Process Claim Stands

The Fourth Circuit examined Incumaa’s procedural due process claim under a two-step analysis.

First, the Fourth Circuit determined whether Incumaa had a protectable liberty interest in avoiding security detention. The Court used Sandin v. Conner in which the Supreme Court declared that prisoners have a liberty interest in avoiding confinement conditions that impose atypical and significant hardship on the inmate in relation to the ordinary incidents of prison life. The Fourth Circuit first noted that this part of the analysis is a “fact specific” inquiry and stated that in this case, Incumaa needed to demonstrate that his solitary confinement in security detention constitutes atypical and significant hardship in relation to the general population.

In Wilkinson v. Austin, the Supreme Court emphasized three factors for determining whether an inmate’s confinement constitutes atypical and significant hardship. These three factors are (1) the magnitude of confinement restrictions; (2) whether the administrative segregation is for an indefinite period; and (3) whether assignment to administrative segregation had any collateral consequences on the inmate’s sentence.

The Fourth Circuit looked to the Wilkinson factors, and pointed out that Incumaa demonstrated that his confinement conditions were severe. In particular, the Court looked to Incumaa’s limited activities outside of his cell, the near daily strip searches, and the confinement to a small cell in making its severity determination. Additionally, the Court held that Incumaa’s confinement to the SMU was extraordinary in its duration and indefiniteness. For these reasons, the Fourth Circuit found that Incumaa had a protectable liberty interest and the first part of this analysis was satisfied.

In the second part of the Fourth Circuit’s analysis, the Court evaluated whether the Department failed to afford Incumaa minimally adequate process to protect that liberty interest. The Court used a three-factor test recited in Mathews v. Eldridge in order to determine whether the Department’s procedural protections are sufficient to protect an inmate’s liberty interest. The three factors enunciated in Mathews are (1) the private interest that will be affected by the official action; (2) the risk of an erroneous deprivation of such interest through the procedures used; and (3) the Government’s interest.

Applying the Mathews three-factor test, the Fourth Circuit stated that the Department’s review process is inadequate and fails to honor the basic values of procedural due process. In particular, the Court stated that Incumaa has a significant private interest in leaving the restrictive conditions of the SMU, the risk of erroneous deprivation is high in this case because the Department’s review process is only single-layered and does not require a factual basis for its decisions, and the prison’s interests in the case do not outweigh Incumaa’s well-established right to receive notice of the grounds for his ongoing confinement.

Judgment Affirmed in Part, Reversed in Part and Remanded for Further Proceedings

Because Incumaa’s failed to establish a basis for his RLUIPA complaint, the Fourth Circuit affirmed the decision of the district court granting the Department’s motion for summary judgment as to that claim. Additionally, the Fourth Circuit reversed the district court’s order on Incumaa’s procedural due process claim because Incumaa has demonstrated a liberty interest in avoiding solitary confinement and the Department has not proven as a matter of law that it provided Incumaa meaningful review.

By Dan Menken

Today, in Skinner v. Loudoun County, an unpublished opinion, the Fourth Circuit affirmed the district court’s order granting summary judgment to Loudon County on Skinner’s 42 U.S.C. § 1983 (2012) complaint. The complaint alleged federal and state due process claims as well as a related state claim of defamation.

Skinner Argues that Due Process Rights were Violated by Job Termination

Skinner’s claims arose from his termination from his position as an emergency medical services training officer with the Loudon County Department of Fire Rescue and Emergency Management. He was terminated for striking a student in the head.

As a public employee, Skinner had a constitutionally protected property interest in his continued employment and could not be fired without due process. Although Skinner did have an opportunity to present his side of the story, he argued that Defendants failed to provide him with the evidence used to support his termination, including names of eyewitnesses, names and details of corroborating witnesses, and corroborating documents. The Fourth Circuit noted, however, that “[d]ue process does not mandate that all evidence on a charge or even the documentary evidence be provided, only that such descriptive explanation be afforded as to permit [the employee] to identify the conduct giving rise to the dismissal and thereby to enable him to make a response.” Linton v. Frederick County. Here, Skinner was informed that he was charged, on a specific date, with harassing, hitting, and kicking the student. He was also told that there was another witness to the altercation. The Fourth Circuit held that Skinner understood the charges sufficiently to prepare a detailed response, and therefore there was no due process violation.

Skinner further argued that he was deprived of his right to confront the student under the Fifth and Fourteenth Amendment. The Court held that there is no absolute due process right to confront and cross-examine an accuser in this type of situation and instead used the balancing test laid out in Mathews v. Eldridge. The test looks at (1) the private interest affected; (2) the risk of an erroneous deprivation and the probable value of additional procedural safeguards; and (3) the Government’s interest. Here, Skinner was informed of the charges against him. He was able to testify on his behalf and call corroborating witnesses. The Court reasoned that the remaining procedural safeguards, the lack of any evidence of prejudice, and the fact that the student was deployed in Afghanistan, warranted a conclusion that Skinner was not unconstitutionally deprived of an opportunity to challenge his termination.

Defamation Claim Not Preserved

Finally, Skinner agued that his defamation claims were improperly dismissed for failure to produce evidence of malice. However, Skinner did not address the defamation claim in his response to the Defendants’ summary judgment motion. He objected, for the first time, in his motion for reconsideration. Thus, his arguments against dismissal were waived.

District Court Ruling Affirmed

Thus, the Fourth Circuit affirmed the district court’s ruling granting summary judgment in favor of the Defendants.

By: Naomi Harlin Goodno*

Introduction

Schoolyard bullying has been around for generations, but recently it has taken on a new, menacing face¾cyberbullying.  Now adolescents use technology to deliberately and repeatedly bully, harass, hassle, and threaten peers.  No longer does the bullying end once the school day ends.  With the use of technology, groups of bullies can relentlessly and anonymously attack twenty-four hours a day for the whole world to witness.  There is simply no escape.  Cyberbullying follows victims from their schools to their homes to their personal computer screens, with fresh injuries inflicted every time a new person clicks on an Internet site to witness or join in the bullying.  Adolescents use Internet sites like YouTube, or social networking sites like Facebook and MySpace, to repeatedly mock others by creating web pages, videos, and profiles.  Adolescents use their cell phones to take photos anytime and anywhere (including  bathrooms)[1] and then instantaneously post them online for others to rate, tag, discuss, and pass along.[2]

Cyberbullying is one of the top challenges facing public schools.[3]  There are many recurring legal problems confronting public schools.  By way of example, assume there are two public middle school children, Joe and Jane.  Joe punches Jane on the school’s property between classes.  The school is well within its rights to suspend Joe.[4]  Assume instead that Joe punches Jane off of school grounds, after school ends, and as the children are walking home.  Because the assault took place off of school property and after hours, the school does not have jurisdiction to punish Joe; rather, it is a matter for the parents and law enforcement.[5]

Assume instead that Joe creates an animated video game of Jane from his personal home computer at night.  In the game, Joe shows himself and other students punching Jane.  Joe posts the game on the Internet and it is quickly passed along to over one hundred other students at the same school, many of whom join in the virtual punching of Jane.  Some students log on to the site while at school, using their personal smart phones and laptops, and other students log onto the site after school at home using their personal computers.  Jane is terrified to go to school.

Can the school punish Joe or any of the other students?  In this hypothetical, Joe created the website off-campus and after school hours, so how is it different, if at all, from Joe physically punching Jane off-campus and after school hours?  Is Joe’s website protected by free speech?  Can the school search Joe’s and the other students’ personal cell phones or laptop computers to see if and when the website was accessed?  How does the public school respond, if at all, to this situation without trampling the constitutional and legal rights of the students?

Neither the legislatures nor the courts have been able to give public schools clear and consistent guidance on how to answer these questions.  Indeed, in a recent Third Circuit opinion, the court was deeply divided on how to decide such issues.[6]  There is also a circuit split on these issues making it ripe for the Supreme Court of the United States to resolve.[7]  Cyberbullying raises issues that require a fine balance between protecting the constitutional rights of public school students while also creating a safe learning environment.

The purpose of this Article is to set forth a comprehensive model cyberbullying policy for primary and secondary public schools that meets educational goals and considers constitutional challenges.  This first Part of this Article explores the current problems caused by cyberbullying and why these problems are unique from off-line bullying.  Because of the unique problems caused by cyberbullying, some state legislatures are beginning to enact specific laws to address cyberbullying.  The current statutes are summarized in Appendix A of this Article.  Those statutes, however, provide little to no direction on how public schools should create cyberbullying policies that are constitutional while also meeting statutory requirements.  Thus, Appendix B of this Article sets forth a model cyberbullying policy for public schools.

The second and main Part of this Article considers three constitutional challenges public schools face in adopting a cyberbullying policy.  First, public schools wrestle with how to define “cyberbullying” without violating the students’ First Amendment rights to free speech.  The crux of the problem concerns speech that students make off of school grounds but that impacts other students at school (for example, creating a website at home, which is then accessed at school, that harasses another student).  This Part sets forth a novel way of approaching the conflicting legal precedents by separately considering jurisdictional and substantive issues.  The second constitutional challenge is composing a cyberbullying policy that does not violate due process rights or that is written in language that is unconstitutionally vague or overbroad.  The third constitutional challenge is formulating a way for school officials to know when they can search students’ personal electronic devices without violating the Fourth Amendment.

The final Part of this Article addresses pedagogical concerns such as reporting requirements, disciplinary matters, and educating students, parents, and school officials about cyberbullying.  All of these topics should be considered in order to construct a comprehensive cyberbullying policy.  The model cyberbullying policy for public schools set forth in Appendix B of this Article adopts language that attempts to combat cyberbullying while complying with constitutional requirements and meeting educational goals.

I.  Current Problems

Cyberbullying is a major problem causing significant harm.[8]  There is no dispute that students today use e-mail, messaging, texting, and social networking sites on almost an hourly basis to stay in touch with one another.[9]  In one survey of thirteen- to seventeen-year-olds, thirty-five percent reported being the targets of Internet harassment including “rude or nasty comments, rumors, and threatening or aggressive messages.”[10]  As one teenage victim stated: “It makes me hurt both physically and mentally.  It scares me and takes away all my confidence to make me feel sick and worthless.”[11]  Indeed, in March of 2011, the White House held a special conference that specifically focused on bullying prevention where the President concluded that cyberbullying is a serious problem facing the United States.[12]  Cyberbullying is linked to “low self-esteem, family problems, academic problems, school violence, and delinquent behavior . . . [and] suicidal thoughts.”[13]  Studies have shown that, of adolescents who have contemplated suicide, “cyberbullying victims were almost twice as likely to have attempted suicide compared to youth who had not experienced cyberbullying.”[14]

 

Recent cases: There have been far too many recent cyberbullying cases that have ended in such tragedy.  One case involved Tyler Clementi, a Rutgers University freshman, who leaped to his death after his roommate secretly taped and posted online a video of Clementi having a “sexual encounter” with another young man.[15]  Perhaps even more troubling are those cases that involve young school-age children, both in middle school and high school.  Such cases sadly illustrate how a child’s vulnerabilities are escalated by the use of the wider forum of technology.  There were the three middle school boys who invited fellow students to “kick a ginger” on a specific day which led to the attacks on at least seven red-haired middle school children.[16]  There were middle school boys who created a video game on a website where “they virtually ‘beat up’ one of their classmates on a regular basis and invited others to join them in the beatings.”[17]  There were other middle school children who created a website where “middle school girls were pictured on a ‘Hot or Not’ list that was e-mailed around to be voted on.”[18]

There was thirteen-year-old Megan Meier, who committed suicide after being cyberbullied by a classmate’s parent who adopted a false identity on MySpace as a boy, wooed her, and then viciously turned against her and posted that “[t]he world would be a better place without [her].”[19]  There was the fourteen-year-old boy who sent death threats on Facebook to two other classmates he believed were interested in his girlfriend.[20]  There were the three Louisiana high school students who were arrested for cyberstalking after they created competing websites with the posting of insults and graphically violent poems.[21]  There were two Florida girls, aged fifteen and sixteen, who were arrested for creating a fake Facebook page in another classmate’s name and posting a picture of the girl’s face on a “nude prepubescent girl’s body” with other disturbing images and statements.[22]

There was also Phoebe Prince, who was relentlessly cyberbullied by the students at her high school for three months before she hung herself.[23]  Classmates posted multiple threads on Facebook about how Phoebe was an “Irish slut” and a “poser.”[24]  Ultimately, six teenagers were criminally charged—including two boys charged with statutory rape of a minor—after the group of teenagers taunted, threatened, shoved, and sent demeaning text messages to Phoebe.[25]  One of the most troubling aspects of Phoebe’s case is that the school administrators were well aware of the cyberbullying[26] and, yet, the school did not take any action.[27]  “How long can the school department ignore the increasing rate of bullying before reality sets in?” two students asked in a school newspaper article.[28]

 

Public schools without guidance: For school-age children, incidents of cyberbullying are often ignored.[29]  Schools are ill-equipped to deal with cyberbullying.[30]  Indeed, such failures open up school districts to lawsuits.[31]  For example, a student’s family sued a New York school district for failing to protect their homosexual son from cyberbullying.[32]  There is no question that schools must be more proactive about stopping students from cyberbullying.[33]  But the blame does not lie completely with the schools.  Many schools want to help but do not know where the boundaries of discipline begin and where they end.  “Schools are finding themselves at a loss, particularly because of vague laws,”[34] or because there are no laws or policies at all, to instruct them on how to address cyberbullying.  When can a school legally punish a student for speech that occurs off-campus?  To what extent can schools search students’ personal computers and cell phones for evidence of cyberbullying without running afoul of the students’ constitutional rights?

These are the questions haunting the school districts.  School administrators know that there is a problem, but they do not know to what extent they are allowed to be a part of the solution.  Across the nation, principals have responded to student-on-student cyberbullying in “dramatically different ways.”[35]  One principal of a middle school shared his frustration about student cyberbullying incidents: “All we are doing is reacting, . . . .  We can’t seem to get ahead of the curve.”[36]  Another middle school principal said that for schools it is a lose-lose situation: “I have parents who thank me for getting involved [with cyberbullying incidents] . . . and parents who say ‘[i]t didn’t happen on school property, stay out of my life.’”[37]

 

Courts in conflict: Courts are conflicted in how to deal with cyberbullying and they fail to clearly specify whether (and when) a school has jurisdiction to regulate off-campus speech that bullies others.[38]  The Supreme Court has yet to rule on this issue and lower courts are all over the board.[39]  For example, one district court found that a school could not discipline a student who created a webpage entitled “Satan’s web page,” in which he listed names of students under the heading “people I wish would die.”[40]  Although the student admitted he may have used school computers, the court held that the school’s disciplinary measures violated the student’s First Amendment rights because there was “[no] proof of disruption to the school on-campus activity.”[41]  In contrast, the Supreme Court of Pennsylvania upheld as constitutional the expulsion of a student who created a website called “Teacher Sux,” in which the student made derogatory comments about a teacher—including why the teacher should die.[42]

The Third Circuit’s recent decisions are illustrative of the unclear law concerning cyberbullying.  Very recently, in June 2011, the Third Circuit revisited en banc two of its recent opinions concerning cyberbullying.  In one case, the court initially upheld as constitutional a school’s disciplinary action of a student who created a fake, offensive MySpace page of a principal—but that decision was reversed by a deeply fractured en banc court.[43]  The other en banc opinion held that a school’s disciplinary action was unconstitutional for very similar behavior.[44]  The law in the area of schools regulating cyberbullying is unmistakably in flux, which leaves schools without clear guidance as to how to address the problem.

A.            Bullying versus Cyberbullying

It is apparent that neither the courts nor the schools are clear on how legally to deal with the rampant problem of cyberbullying.  What makes the legal framework for cyberbullying so difficult?  The answer, as set forth in this Subpart, is that cyberbullying differs from off-line bullying such that current laws and school policies are often inadequate to deal with this new forum for bullying.

Cyberbullying, for the purposes of this Article, is distinguishable from off-line bullying by the use of electronic technology to deliberately and repeatedly harass or intimidate fellow students.  Off-line bullying, done face-to-face, has long been a problem in our school system.[45]  While schools and state legislatures have historically taken some steps to curtail schoolyard bullying,[46] these steps are insufficient to address cyberbullying because the scope of cyberbullying is much more immense than off-line bullying.  New technology has not only allowed for new outlets to bully—it has changed the face of bullying.  Cyberbullying presents new problems that “old-fashioned” antibullying laws and policies cannot address for at least six reasons.

First, cyberbullying, unlike off-line bullying, is ubiquitous.  Harassing statements and comments made on the Internet can be made on- and off-campus, day and night.[47]  The victim’s perception, and perhaps the reality, is that an entire school, neighborhood, and community can be involved in the bullying.[48]  With a few keystrokes, the bullying statements can be “circulated far and wide in an instant.”[49]  Therefore, antibullying policies that only address on-campus bullying cannot sufficiently address cyberbullying, yet courts and school officials are confused as to how and to what extent schools can regulate off-campus speech.

Second, cyberbullying allows for much greater anonymity than off-line bullying.[50]  Bullies can easily take on fake Internet identities or even take on the identities of other students so that “victims often do not know who the bully is, or why they are being targeted.”[51]  As one fifteen-year-old explained: “I get mean messages on Formspring,[[52]] with people telling me I’m fat and ugly and stupid.  I don’t know what I ever did to anyone.  I wish it wasn’t anonymous.”[53]  Because of anonymity, cyberbullies may not fit the profile of the typical bully.[54]  For example, three Louisiana students were recently arrested for cyberbullying, despite the fact that they were all honor students.[55]  Anonymity, therefore, not only creates problems for school officials who are investigating cyberbullying (school officials may be at a loss as to what would entail constitutional searches in their investigations) but also may impact which remedies for cyberbullying are most effective.

Third, cyberbullying gives bullies physical distance from their victims while at the same time allowing for a greater audience—which may encourage even more bullying.[56]  The audience mentality allows for others to “join in on ‘the fun’” who may not have done so in a physical confrontation.[57]  Moreover, audience members can easily perpetuate the bullying by adding online comments or by simply forwarding messages and links to others. [58]  Off-line bullying policies fail to address how cyberbullying quickly involves numerous parties.

Fourth, children are often more technologically adept than adults.  Children use and explore new technologies every day,[59] while teachers and parents remain oblivious.[60]  This allows for undetected and unregulated outlets for bullying.

Finally, cyberbullying, unlike off-line bullying, is permanent and “usually irrevocable,”[61] trailing its victims from childhood to adulthood.  Not only does cyberbullying follow students from school to their homes, but harassing statements can be accessed and relived over and over again, even years later.  As one commentator aptly put it: “The Web never stops and it never forgets.”[62]  Because of the possible life-long impact of cyberbullying, it is crucial that school officials are equipped with the legal and necessary tools to try to prevent it.

It is largely because of these differences between cyberbullying and off-line bullying that many current antibullying statutes and school policies are inadequate.  As the next Subpart addresses, even states with antibullying statutes have gaps that do not cover all aspects of cyberbullying.

B.                        Current Statutes and Policies

Appendix A of this Article sets forth a chart analyzing the current state and federal antibullying laws as well as proposed bills.  Overall, on the positive side, a large majority of state legislatures have enacted antibullying laws.  However, some of these state laws fail to address cyberbullying, and even those laws that have tried to do so often give inadequate guidance to public school administrators on how to enforce the law without violating students’ constitutional and legal rights.

Specifically, the District of Columbia and forty-five states have enacted general antibullying laws (mainly targeting off-line bullying).[63]  Only Hawaii, Michigan, Montana, North Dakota and South Dakota lack such statutes.[64]  Hawaii[65] and Michigan,[66] along with the federal government,[67] have proposed antibullying laws, which are currently pending.  While forty-three states require public schools to have a policy regarding bullying,[68] only a minority of those states have model school policies.[69]

The gaps in these laws become even more evident when looking at how cyberbullying is specifically addressed.  Again, the good news is that some states attempt to address the cyberbullying problem in antibullying statutes.  Six states expressly prohibit “cyberbullying,”[70] and twenty-eight states prohibit “electronic harassment,”[71] which likely encompasses most aspects of cyberbullying.

The problem is that, of those states with antibullying statutes, only ten states have model policies.[72]  Those ten model policies fail to fully and adequately give school officials guidance on how to deal with the unique aspects of cyberbullying, further compounding the problem.[73]  For example, neither “cyberbullying” nor “electronic harassment” is even mentioned in the California Department of Education’s “Sample Policy for Bullying Prevention.”[74]  Likewise, the model antibullying policies for Oklahoma and Rhode Island[75] also fail to include any reference to cyberbullying.  Indeed, Colorado’s model policy readily identifies its own gaps: “the [school] district should consult with its own legal counsel to determine appropriate language.”[76]  Such model policies give little guidance to school administrators about how to deal with cyberbullying.

Even those state legislatures that have created model school policies referencing “cyberbullying” fall short.  For example, the Delaware, Florida, Ohio, and South Carolina[77] model school policies define cyberbullying, but fail to give public school officials any guidance on how to apply the definition so as not to run afoul of free speech and other constitutional and legal protections.

Thus, while state legislatures, for the most part, are taking great strides by including cyberbullying in their antibullying legislation, there has been little to no guidance on how public school officials can legally implement policies to deal with cyberbullying.  The remainder of this Article attempts to set forth a constitutional model cyberbullying policy that public schools can adopt and put into action.

II.  A Constitutional Cyberbullying Policy for Primary and Secondary Public Schools: Considering First Amendment, Due Process, and Fourth Amendment Challenges

It is imperative to note at the outset that students’ civil rights must be protected.  Indeed, “[t]he vigilant protection of constitutional freedoms is nowhere more vital than in the community of American schools.”[78]  As one judge explained:

In order to maintain a thriving democracy, students cannot be unreasonably encumbered in their freedom to express moral, political, and social ideals and beliefs.  The classroom is peculiarly the “marketplace of ideas.”  The Nation’s future depends upon leaders trained through wide exposure to that robust exchange of ideas which discovers truth “out of a multitude of tongues, (rather) than through any kind of authoritative selection.” . . . Schools should foster an environment of learning that is vital to the functioning of a democratic system and the maturation of a civic body.[79]

The exercise of students’ civil rights in public school, however, has to be “applied in light of the special characteristics of the school environment.”[80]  The constitutional rights of public school students “are not automatically coextensive with the rights of adults in other settings.”[81]  Thus, in addressing the First Amendment, Due Process, and Fourth Amendment issues related to cyberbullying in public schools, there must be a balance between safeguarding students’ constitutional rights and allowing public school officials to maintain a safe and thriving learning environment.[82]  This Part of the Article attempts to set forth an analysis that strikes this balance.

A.            First Amendment Issues: Defining “Cyberbullying”

It is well established that the First Amendment right to freedom of speech extends to students in public schools.[83]  As the United States Supreme Court declared over forty years ago, public school students do not “shed their constitutional rights to freedom of speech or expression at the schoolhouse gate.”[84]  However, the Supreme Court also recognized the need for schools to be able to exercise a certain amount of authority over the speech of their students to retain order and control of the educational environment.[85]  One of the main concerns is that school cyberbullying policies will run afoul of the First Amendment and interfere with students’ rights to free speech.[86]  Therefore, to address whether or not a specific cyberbullying policy is constitutional, the extent to which student speech is protected by the First Amendment must be carefully examined.  There is no Supreme Court case squarely on point.[87]  The split in lower courts’ decisions shows that the law is ambiguous.[88]  Even the Supreme Court has expressed confusion over how precedents apply to the burgeoning issues involving student free speech, stating that “[t]here is some uncertainty at the outer boundaries as to when courts should apply school speech precedents.”[89]

This Subpart sets forth a novel First Amendment constitutional framework to consider when analyzing public school cyberbullying polices.  The two-prong framework involves both a jurisdictional and substantive inquiry:[90] (1) The school must first decide whether it has jurisdiction over the speech.  The legal standard differs depending on whether the speech originated on- or off-campus (the harder cyberbullying cases usually involve speech originating off-campus);[91] if the school has proper jurisdiction, then (2) the school must determine whether, as a matter of substantive law, it can indeed regulate the speech.  This second inquiry will fall into two subcategories: (i) whether the school is able to categorically regulate the speech; and if not, then (ii) under the “Tinker standard,”[92] whether the speech materially disrupts class work or substantially impinges on the rights of others.[93]

1. Jurisdictional Matters

Speech Originating On-Campus: There is Supreme Court precedent dictating that schools have jurisdiction to regulate speech that originates on school campuses,[94] or at school-sanctioned activities that are equivalent to being on the school campus.[95]  Therefore, in the cyberbullying context, it appears to be within the school’s jurisdiction to regulate speech that originates on-campus whether the student uses the school’s resources or the student uses his or her own personal technology while on-campus.

 

Speech Originating Off-Campus: The Supreme Court has not ruled on whether schools have jurisdiction over student speech that originates off-campus or is not related to a school-sponsored activity.  There are, however, a number of cases that deal with this issue, some of which involve the Internet.[96]  Unfortunately, the holdings in these cases are inconsistent.[97]

The cases can be grouped into three general categories.  First, in a few cases, the courts skip the jurisdictional question all together.[98]  However, the Third Circuit reversed a district court decision in which the jurisdictional question was not addressed.[99]  Thus, it would behoove one, especially given that most cyberbullying originates off-campus, to thoroughly address the jurisdictional issue before attempting to regulate any off-campus speech.[100]

Second, some courts require that it must be “foreseeable” that the speech would reach the campus for the school to regulate it.  If it was “foreseeable” that the speech would reach campus, then it can be regarded as “on-campus” speech and the school would have jurisdiction over it.[101]

Third, some courts have ruled that there must be a “sufficient nexus” between the speech and the school before a school has the jurisdiction to punish the student speech.[102]  However, courts are split as to what constitutes this “sufficient nexus.”  Some courts have broadly applied the rule finding the connection is established if the speech is directed at a school-specific audience;[103] or if the speech has been brought on to the campus, even if it was not the student in question who did so.[104]  Other courts, however, have narrowly applied the rule and found no substantial nexus between the speech and the school because the student speech, “did not attempt to engage other students in any on-campus behavior.”[105]

Given that cyberbullying easily spreads (Internet links and text messages can easily be forwarded to numerous people with the click of a button), courts should adopt the broad application of the “sufficient nexus” test.  For purposes of a cyberbullying policy, schools should consider using both the “foreseeability” and the “sufficient nexus” language.[106]  Such a jurisdictional requirement will also likely protect a cyberbullying policy from a challenge that the policy is constitutionally overbroad.[107]  These legal standards are incorporated in the Model Cyberbullying Policy in Appendix B of this Article.

2. Substantive Matters

Once the school’s jurisdiction has been established, the next inquiry is whether the school can regulate the speech without violating the First Amendment.  Based on precedent, schools can do so in two instances: (i) if the speech is categorically prohibited, or (ii) if the Tinker standard is met.  Each of these rules will be taken in turn.

 

Categorically prohibited speech: Schools can wholly regulate two categories of speech, and a cyberbullying policy should address both.[108]  First, under Hazelwood, schools can regulate speech that “bear[s] the imprimatur of the school.”[109]  Thus, for example, if a cyberbully uses the school’s emblem on an Internet message intended to harass another student, the school can discipline the cyberbully regardless of whether the speech originated on- or off-campus.

Second, it is widely accepted that, even under the broadest reading of the First Amendment, “true threats” are not protected.[110]  Though the threshold for determining whether a statement is a “true threat” is fairly high, courts have held that, “[i]n light of the violence prevalent in schools today, school officials are justified in taking very seriously student threats against faculty or other students.”[111]  Any school cyberbullying policy that requires punishment for a student who makes a “true threat” against a teacher or another student will be constitutional.

Courts, however, often do not decide whether particular speech reaches the level of a true threat because they often do not have to.  If a court finds that the speech can be regulated by the Tinker standard (requiring a lower threshold), then the school’s actions will be constitutionally justified regardless of whether the speech constituted a true threat.[112]  This leads to the second type of speech that schools can regulate¾student speech which satisfies the Tinker standard.  This second type of speech is addressed in the next Subpart of this Article.[113]

 

Student Speech that can be regulated under the Tinker Standard: In the 1969 seminal case Tinker v. Des Moines, the Supreme Court held that it was unconstitutional for a high school to suspend students for wearing black armbands in silent protest of the Vietnam War.[114]  The Court recognized that a school had authority to control student speech but that “it must be able to show that its action was caused by something more than a mere desire to avoid the discomfort and unpleasantness that always accompany an unpopular viewpoint.”[115]  The Court set out a two-part standard for when schools could constitutionally regulate student speech: “[C]onduct by the student, in class or out of it, which for any reason—whether it stems from time, place, or type of behavior—materially disrupts classwork or involves substantial disorder or invasion of the rights of others is, of course, not immunized by the constitutional guarantee of freedom of speech.”[116]  Therefore, under the Tinker standard, schools can regulate student speech that either (i) materially disrupts the operation of the school, or (ii) substantially impinges upon the rights of others.[117]

Schools, therefore, should incorporate the language of the Tinker two-part standard into their cyberbullying policy.[118]  There is, however, some ambiguity in its application.  Courts have unevenly applied the first Tinker standard (that schools can regulate student speech that causes “material disruption”).[119]  Courts tend to consider speech as having materially disrupted school activities if administrators are forced to interrupt their regular duties to deal with the disruption.[120]  The disruption must be a real disturbance and something more than a “buzz” about the speech.[121]  However, when the speech is violent, threatening, or sexually explicit, courts have often found that there was a material disruption.[122]  Moreover, courts have also found that schools may discipline students for speech where “a forecast of substantial and material disruption was reasonable.”[123]

Notably, Tinker is different than most cyberbullying cases because Tinker involved political speech.  Arguably, then, the threshold for establishing a “material disruption” may be lower for purely hurtful speech.[124]  As one scholar noted, “cyberbullying incidents that occur at school—or that originate off-campus but ultimately result in a substantial disruption of the learning environment—are well within the school’s legal authority to intervene.”[125]

Though Tinker clearly set out a two-prong standard under which a school may regulate student speech, the trend has been for courts to focus on the first prong (regulating speech that causes a material disruption).  Courts have, for the most part, ignored the possibility of the second prong (regulating speech that substantially impinges on the rights of others).[126]  Although many courts have not yet embraced this second prong of Tinker, the prong may cover many instances of cyberbullying.  For example, if a cyberbully harasses a victim to the point at which the victim misses school or suffers emotional distress, then a school could arguably discipline the cyberbully on the grounds that the student substantially impinged on the rights of another student.

In sum, by combining precedent (although ambiguous at times) a school should be able to draft a cyberbullying policy that would survive First Amendment free speech challenges.  First, the policy should establish that the school will regulate any student speech within its jurisdiction, which includes (i) all speech originating on-campus and (ii) speech originating off-campus if it was “foreseeable” that the speech would reach campus or if there is a “sufficient nexus” between the off-campus speech and the school.  Once jurisdiction is established, then the cyberbullying policy should set forth that the school can (i) wholly regulate speech that “bear[s] the imprimatur of the school” or contains “true threats,” or (ii) regulate speech that “materially disrupts” school operations or “substantially impinge[s] on the rights” of others at the school.[127]

B.            Due Process Issues: Creating a Nonvague Policy with Proper Notice Requirements

In addition to First Amendment challenges, school policies may also be challenged as unconstitutionally vague.[128]  A regulation is unconstitutionally vague, and thus a violation of due process, if it does not give “fair notice of the regulation’s reach” and requires students “to guess as to the contours of its proscriptions.”[129]  Thus, there are two possible vagueness challenges to school cyberbullying policies: the policy is (1) vague as to the definition of what constitutes cyberbullying, or (2) fails to give proper notice of the regulation.  Each of these issues will be taken in turn.

1. Nonvague Explanation of “Cyberbullying”

Specificity of terms is especially important when a regulation, such as a public school cyberbullying policy, is a “content-based regulation of speech.”[130]  Although a school has “a certain degree of flexibility in its disciplinary procedures,” its regulations may still be found to be unconstitutionally vague or overbroad.[131]  The most common reason for a court to sustain a vague or overbroad challenge of a school policy is when specific terms within the policy are not defined.[132]  Therefore, a cyberbullying policy should set forth a clear definition of “cyberbullying.”

As discussed more fully in Part II.A above, this definition should include language as set forth in Hazelwood, Watts, and Tinker.[133]  For example, a cyberbullying policy can prohibit the use of electronic devices to make an electronic communication that is meant to: (1) be a “true threat” against a student or school administrator;[134] (2) “materially disrupt” school operations;[135] or (3) substantially “impinge on the rights” of others at the school.[136]  This third prohibition of “impinging on others” could include: creating “reasonable fear of harm to the student’s person or property;”[137] creating “a substantially detrimental effect on the student’s physical or mental health;”[138] “substantially interfering with a student’s academic performance . . . [or] interfering with the student’s ability to participate in or benefit from the services, activities, or privileges provided by a school;”[139] or being “so severe, persistent, or pervasive” so as to cause “substantial emotional distress.”[140]

The United States Supreme Court has found that for antidiscrimination statutes, “[e]numeration is the essential device used to make the duty not to discriminate concrete and to provide guidance for those who must comply.”[141]  Thus, another way to make the term “cyberbullying” less vague is to set forth a prohibition of cyberbullying based on enumerated characteristics, such as those describing traditionally protected groups or identity-based groups.[142]  For example, in its definition of cyberbullying, the policy should prohibit cyberbullying on the basis of race, color, national origin, gender, religion, disability, sexual orientation, or gender identity to remove any doubt that cyberbullying is prohibited regarding any of these characteristics.[143]  As one study showed, schools that have policies with enumerated categories report less bullying than schools that do not.[144]  Policies should be drafted so that inclusion of enumerated categories does not affect protection for students who do not fall into any of them.[145]

2. Providing Proper Notice

To make certain that students’ due process rights are not violated, cyberbullying policies must give students and parents notice of the details of the policy.  There are three considerations to ensure proper notice is given.  First, the cyberbullying policy must clearly set forth what conduct is forbidden.  For example, one student raised a successful due process challenge to discipline stemming from a violation of the school’s cyberbullying policy because the policy failed to “put students on notice that off-campus speech or conduct which cause[d] a disruption to school activities may subject them to discipline.”[146]  The court explained such notice was necessary so that students could “modify their conduct in conformity with the school rules.”[147]  Therefore, a cyberbullying policy should clearly set forth the what, who, and when.  In other words, the policy should not only define what constitutes “cyberbullying” and against whom it is prohibited (such as enumerated groups of individuals), but it must also explain when the school can exercise jurisdictional authority over the conduct.[148]

Second, the school must ensure that students and parents receive actual notice of the cyberbullying policy.  Students’ due process rights are implicated if they do not have adequate and actual notice of a school’s policy regarding punishment for certain acts.  To meet the actual notice requirement, one scholar suggests that schools should be required to create cyberbullying policies that require parents to receive copies of the school’s cyberbullying policy, along with information on how to prevent cyberbullying and what to do if their child is being cyberbullied.[149]  Florida’s model bullying policy does just that; it suggests that the student handbook include the bullying policy, that school officials should inform all students and parents in writing of the bullying policy at the beginning of each school year, and that there should be an annual process for discussing the policy with students in a student assembly.[150]  Another way schools can fulfill the actual notice requirement is to implement an “acceptable use policy” for the use of the school’s technology resources, which establishes that school technology cannot be used to cyberbully another student.  The “acceptable use policy” should be in the form of a contract, which parents and students must sign before students are able to use the school’s technology resources.[151]

Third, as some state statutes already require, a valid cyberbullying policy should also include a procedure for immediately notifying parents if the school discovers that their child is involved in a cyberbullying incident.  Eleven state statutes require schools to notify the parents of both the victim and the cyberbully.[152]  The West Virginia statute requires schools to notify parents of any student involved in a cyberbullying incident.[153]  Some scholars suggest that schools should notify the alleged cyberbully’s parents prior to any investigation.[154]  After the investigation, the cyberbully and his parents should be notified of the potential consequences to which they may be subjected.[155]

C.            The Fourth Amendment Issues: Allowing for Reasonable Searches and Seizures

The Fourth Amendment raises additional concerns in cyberbullying cases.  Once an incident of alleged cyberbullying is reported to school officials, how can the school investigate the allegations without violating the Fourth Amendment’s prohibition of unreasonable searches and seizures?[156]  To put the issue in context, consider the illustrative hypothetical set forth in the Introduction of this Article: Joe and Jane are middle school students.  Jane’s parents discover that Joe has posted on the Internet an animated game depicting himself and other students punching Jane.  Joe has forwarded a link to the game to many of his school friends, who have in turn forwarded it to other students.  During school hours, while on-campus, numerous students, including Joe, have logged onto the website and participated in the game.  Jane’s parents report the website to school officials.

Can school officials search Joe’s cell phone and personal laptop computer to see if he did indeed create the website?  Can school officials search other students’ personal electronic devices to see if they accessed the website?  If the school decides to search Joe’s cell phone, can school officials also search the cell phone for other instances of cyberbullying or violations of school rules?  All of these questions pose novel issues under the Fourth Amendment.  There are no Supreme Court cases on point.  Moreover, those states that have drafted model bullying policies also fail to address these issues.[157]  Schools, therefore, are once again left without any guidance.  The discussion below aims to answer these questions.

1. The T.L.O. Legal Standard

The controlling authority on the Fourth Amendment application to schools is the 1985 Supreme Court case New Jersey v. T.L.O.[158]  This case involved a teacher who found high school students smoking in the bathroom in violation of school rules.[159]  School officials searched one student’s purse for cigarettes.[160]  After finding cigarettes, the school official continued to search the purse and subsequently found drug paraphernalia.[161]  The student sought to suppress the evidence found in the purse as a violation of the Fourth Amendment.[162]  The Supreme Court first determined that, under the Fourth Amendment, students have a legitimate expectation of privacy in the private property they bring to school.[163]  The students’ interest, however, must be balanced against the interest of school officials “in maintaining discipline in the classroom and on school grounds.”[164]

The Court established a two-step inquiry for determining when it is reasonable for a public school official to search students’ personal property.[165]  First, the search must be justified at inception, meaning there must be “reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school.”[166]  Second, the scope of the search must be “reasonably related to the objective of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”[167]  Based on this two-prong test, the Court in T.L.O. held the search of the student’s purse did not violate the Fourth Amendment because it was based on an individualized suspicion that she had violated the school rules (first that she was smoking and second that she was using illegal drugs) and was not overly intrusive.[168]  Notably, under T.L.O., once a reasonable suspicion of wrongdoing exists, a search of a student’s personal belongings does not require the student’s consent or the consent of his parents.[169]

Although courts have not specifically dealt with the Fourth Amendment’s role in cyberbullying, two cases have applied the T.L.O. test to the possession and use of cell phones in violation of school rules.  In Klump v. Nazareth Area School District, the school had a policy prohibiting use or display of cell phones during school hours.[170]  The student, Klump, violated the rule when his cell phone fell out of his pocket during class.[171]  After his teacher confiscated his phone, the teacher, along with the principal, then used the phone to call nine other students listed in Klump’s phone directory to determine if they were violating school policy.[172]  They also accessed Klump’s text messages and e-mail, and had an instant messaging conversation with Klump’s younger brother without identifying themselves.[173]  The school officials asserted that they found a drug-related text message while searching the phone.[174]  The court held the search was unreasonable.[175]  While the teacher was justified in seizing the cell phone because it violated the school policy, the search of the phone failed the first part of the T.L.O. test because it was not justified at inception.[176]  The teacher and principal had no reason to suspect that Klump was violating any other school policy other than the possession of the cell phone, thus, seizure alone would have been acceptable.  Notably, there were no facts suggesting that Klump had used his cell phone while on-campus.[177]  Instead the school authorities were impermissibly searching the phone “as a tool to catch other students’ violations.”[178]

In the second cell phone case on point, J.W. v. Desoto County School District, the school district also had a policy prohibiting students from possessing or using cell phones at school.[179]  Student R.W. was caught violating this policy when he opened his cell phone to retrieve a text message during class.[180]  The teacher took R.W.’s phone, opened it, and viewed personal photos stored on it.[181]  R.W. was ordered into the principal’s office where the principal and police sergeant also opened the phone and examined the photographs.[182]  One photo showed another student holding a B.B. gun.[183]  Based on that photo, R.W. was expelled for having gang pictures.[184]  The court applied the T.L.O. test and upheld both the seizure and search of the phone.[185]  The court explained that upon witnessing a student violating the rule, it was reasonable for a school official to seek to determine to what end the student was improperly using the phone.[186]  The court noted the student could have been using his cell phone at school to cheat or communicate with another student who would also be subject to discipline.[187]

The court in Desoto distinguished Klump by explaining that in Klump the student unintentionally violated the school policy (the phone fell out of his pocket) and the school officials used that accident as a pretext for a “fishing expedition.”[188]  In contrast, here R.W. knowingly violated the rules by bringing the phone on school grounds and then using it.[189]  Moreover, as opposed to the “fishing expedition” that occurred in Klump (misleadingly calling other students and responding to text messages and emails using a student’s electronic identity),[190] in R.W.’s case the search by the school officials was limited to a search of the phone.[191]

 

Incorporating the T.L.O. Standard into a Cyberbullying Policy: the search must (1) have “reasonable grounds;” and (2) be limited in “scope.” Cyberbullying policies should incorporate the two-prong test articulated in T.L.O.[192]  First, the policy should indicate that school officials[193] can search a student’s personal electronic device for evidence of cyberbullying only when there are “reasonable grounds” that the search will lead to evidence of cyberbullying by that person (presumably a violation of a school rule).  The policy should also make clear that, unlike in Klump, school officials should not be allowed to misleadingly use the search as a ploy to try to catch other students violating the rules.

As Klump and Desoto illustrate, what constitutes “reasonable grounds” will be a fact-specific inquiry.[194]  For example, applying the first prong of the T.L.O. standard to the illustrative hypothetical set forth at the beginning of this Part of the Article, if Joe, or any other student, was impermissibly using (not just possessing)[195] his electronic device at school, then there would be reasonable grounds to search it to determine to what ends the student was improperly using the electronic device.  The analysis, however, is slightly more complex if the only fact before school officials is a call from Jane’s parents reporting alleged cyberbullying (or an allegation of cyberbullying only from Jane).  Then school officials would have to consider factors such as the perceived credibility of the person making the report[196] and whether the electronic record (e.g., a history of postings or visits to a website, emails, or bullying text messages on a cell phone) is likely to still be accessible.

A school’s cyberbullying policy should also include language incorporating the second prong of the T.L.O. standard, namely a search of a student’s electronic device should be limited in scope.[197]  If there is suspicion of only a cyberbullying text message, or accessing a website as in the hypothetical set forth above involving Joe, then photographs stored on the electronic device should be left alone.  As the Court stated in T.L.O, teachers and school administrators should use their “common sense” in determining the appropriate scope of the search.[198]  Generally, call logs and text logs will be within the scope of the search to determine who else may have received or sent the bullying message, or may have accessed or posted on the bullying website.[199]  However, as addressed in Klump, school officials should not misleadingly or anonymously contact students on these logs to dupe them into admitting further violation of school rules.[200]

2. Special Legal Concerns for Sexting

Sexting is the sending or receiving of sexually explicit messages, images, or videos between cell phones, or posting them on the Internet (such as on Facebook or MySpace).[201]  Unfortunately, sexting is becoming all too popular among high school and middle school students.[202]  These messages are often sent because of romantic interests but can quickly turn into an unforgiving and relentless form of cyberbullying.[203]  Because many child pornography laws prohibit the distribution of child pornography without exception, minors who sext each other can be, and indeed have been, criminally prosecuted.[204]  The possibility of criminal legal liability can also confront school officials.  There are currently no statutory exceptions allowing for school officials to possess or distribute nude images of minors;[205] therefore, school officials who are investigating allegations of cyberbullying that involve sexting could be subject to state and federal criminal felony charges.[206]  One Pennsylvania school board is currently under criminal investigation for improper conduct and disseminating child pornography when it was alleged that phones displaying pornographic images and video clips involving minor students were passed around and viewed by more school employees than necessary to investigate the incident.[207]

Moreover, courts have yet to address the possible civil liability of school officials who uncover and examine nude photos of students.  The American Civil Liberties Union (“ACLU”) recently pursued a private suit against a Pennsylvania district attorney (after privately settling with the school district) when explicit photos on a female student’s cell phone were discovered by the principal and turned over to the district attorney.[208]  In this case, a teacher confiscated a female student’s cell phone when the student used it during class.[209]  The teacher turned the phone over to the principal who informed the student that he had found sexually explicit photos and turned them over to law enforcement.[210]  The cell phone contained photos of the female student in various states of nudity intended to be seen only by the student’s boyfriend and herself.[211]  The ACLU alleges the student’s phone was illegally searched.[212]  Courts have historically been stricter in enforcing the Fourth Amendment when student nudity is involved.[213]

Thus, for a school district and its officials to avoid criminal or civil legal liability, if a cyberbullying investigation leads to the uncovering of images of nude minors, those images should never be distributed or shown to other school officials.[214]  The school official should promptly contact law enforcement and turn the material over to authorities without distributing it.  While school officials can discuss the nature of the material with each other for investigative and disciplinary purposes, cyberbullying policies should strictly prohibit the dissemination or showing of any nude images of children to anyone other than law enforcement.[215]

III.  A Comprehensive Cyberbullying Policy: Including Legally Valid “Policy Considerations”

While cyberbullying is a new and dangerous type of bullying that raises many novel and complex constitutional issues, the sole purpose of a cyberbullying policy—to halt cyberbullying—should not be forgotten.  There are at least three other guidelines that schools should consider in order to create a comprehensive cyberbullying policy: (1) how to set forth  procedures that properly respond to and report cyberbullying incidents; (2) how to adopt legally valid and proportionate remedies once a cyberbullying incident has occurred; and (3) how to educate students, parents, and school officials about the vices of cyberbullying.[216]  This Part of the Article will address these additional issues by incorporating the best elements of already existing statutory requirements along with some refinements to ensure that the model cyberbullying policy in Appendix B of this Article is not only constitutional, but also comprehensive.[217]

A.            Procedures for Responding to and Reporting Cyberbullying Incidents

As discussed in a previous Subpart of this Article, a school must provide notice of its cyberbullying policy to students and parents in order to survive constitutional challenges.[218]  This notice should also include information on how to identify, respond to, and report cyberbullying incidents.[219]  Because of the often sensitive nature of cyberbullying (particularly if it involves sexting), the reporting provision should specifically identify the school official[220] who will be a “safe contact” person for students who wish to report incidents of cyberbullying.[221]

In addition, because some students have “indicated that when they reported cyberbullying incidents to teachers, these conversations were not confidential and in some instances resulted in additional retaliatory harassment,”[222] the reporting provision should allow for anonymous and confidential reporting.[223]  This could be implemented in a number of ways, such as an anonymous online form on the school’s website or an anonymous drop box inside the school.  However, because the reliability and credibility of an anonymous report cannot be ascertained, school officials should neither take disciplinary action[224] nor search a student’s personal electronic devices solely based on an anonymous tip.[225]  Nevertheless, based on an anonymous tip, school officials could research the Internet on their own (to see if certain websites exist) or interview students and parents.

Finally, the reporting provision of a cyberbullying policy should put students and parents on notice that school officials may report cyberbullying incidents to law enforcement depending on the criminal nature, gravity, or repetition of the offense.[226]  Fines and imprisonment for criminal behavior are possibilities.[227]

B.            Proportionate Remedies for Cyberbullying Incidents

Schools have many options in how to respond to cyberbullying.  Such options include suspending, expelling, or counseling the student as well as contacting the appropriate authorities.[228]  While certain state statutes mandate specific remedies,[229] a majority of states leave it to schools to create remedies and punishments for cyberbullying.[230]  Courts generally defer to the school’s judgment of what level of punishment is appropriate.[231]  The court may weigh public policy interests in determining whether the punishment is too harsh, but unless the facts fall heavily on the side of harm to the student, courts will accept the form of punishment that a school chooses.[232]  As one court stated, “we are mindful that ‘[i]t is not the role of the federal courts to set aside decisions of school administrators which the court may view as lacking a basis in wisdom or compassion.’”[233]  Because of the vastly different ways schools can respond to cyberbullying, some have called for uniform policies.[234]

Schools may, for example, adopt a tiered approach to consequential remedies, which would allow schools to take into consideration the nature of the offense and the age of the student.  For a first time or minor offense, schools can mandate the cyberbully attend mandatory counseling and education sessions.  For a second or more serious offense, schools can prohibit students from participating in school activities such as sports or student government.  Prohibiting a student from participation in a school-sponsored activity is often ideal because, while it might be a stern punishment, it will not have the serious detrimental effect on the student’s academic record that school suspension would have.  Additionally, to avoid tragic school shootings like what occurred at Columbine High School,[235] it is particularly important for schools to discipline cyberbullies who are involved in student activities and purportedly serve as role models to other students.  For a serious incident of cyberbullying that includes violent speech, school suspension or expulsion may be warranted.[236]  In such cases, there may also be civil and criminal liability outside the school’s jurisdiction.[237]

In addition to consequential remedies, cyberbullying policies should also include preventive remedies.  A false accusation of cyberbullying might trigger retaliation, which would then lead to actual cyberbullying.  Thus, when considering preventive remedies, schools should also prohibit retaliation or false accusations against a target or witness of cyberbullying.[238]  In addition to delineating prohibited conduct, the cyberbullying policy should also indicate the types of behavior the school wishes to promote.[239]  For instance, the policy should reflect that schools expect students to be “good citizens—not passive bystanders—[and to report incidents] if they are aware of bullying or students who appear troubled.”[240]  Finally, after an incident of cyberbullying, schools should provide post-care counseling to both the cyberbully and victim[241] and, when necessary, “file a complaint with the Internet site or service to have the material removed.”[242]

C.            Educating Students, Parents, and School Officials

Because cyberbullying is a new phenomenon, it takes time, unfortunately, for the law to catch up to the problem.  Thus, it is imperative that a comprehensive cyberbullying policy provide for educational opportunities whenever possible.  As the Florida Department of Education has explained, education about bullying is an important tool that can help “change the social climate of the school and the social norms with regards to bullying.”[243]

Florida law mandates that schools develop “a procedure for providing instruction to students, parents, teachers, school administrators, counseling staff, and school volunteers on identifying, preventing, and responding to bullying or harassment.”[244]  The law, however, provides little guidance as to what those programs should include.[245]  Student training and education should start at a young age, since instances of cyberbullying have been reported by students as young as ten.[246]  An educational program for students should train students on: (1) the meaning of cyberbullying and the need to refrain from engaging in it—even if meant as a joke—since there are possible repercussions within the school or even within the justice system;[247] (2) how to be an ally to peers who are being bullied;[248] and (3) how to protect themselves from being cyberbullied.[249]  Schools should consider allowing students to play an active role in developing the school’s cyberbullying educational programs.[250]

In addition to providing educational opportunities for students, schools should also train parents and school officials.  Maryland law, for example, mandates such training.[251]  Part of the training program for school officials should include training specific faculty members to be “safe contacts” to whom students may report incidents of cyberbullying.[252]  Parents may be in the best position to prevent their children from “abusing available technology, or putting themselves at risk of being cyberbullied.”[253]  Parents should be educated in how to identify and prevent incidents of cyberbullying.[254]  Schools can educate and train parents by various methods including meetings and assemblies at the school, newsletters from the school or district, half-time programs at school sports events, and parent workshops.[255]  Parents should also be educated on the consequences of cyberbullying to send a clear message that schools will not tolerate cyberbullying.[256]

Conclusion

Cyberbullying presents a danger to schoolchildren.  Because cyberbullying involves the Internet and the use of cell phones, it is more pervasive, relentless, and cruel than off-line bullying.  There is simply no escape for victims of cyberbullying.  Indeed, cyberbullying follows a victim from their school to their home, and possibly to their adult life.  Legislatures and public schools are taking measures to combat cyberbullying.  However, with this new medium for bullying comes many new and challenging legal issues.

These new issues can be resolved.  A cyberbullying policy that carefully adopts language to deal with a public school’s jurisdiction over off-campus speech that either materially disrupts school activities or impinges on another student’s rights should address First Amendment concerns.  A cyberbullying policy that sets forth clear definitions of terms and gives proper notice to students and parents should ensure that due process is met.  And finally, a cyberbullying policy that establishes a reasonable process by which school officials can conduct searches of students’ personal electronic devices when investigating cyberbullying claims should address Fourth Amendment issues.  The model cyberbullying policy set forth in Appendix B attempts to do just that—to provide a step in the right direction so that public schools can ensure a safe environment without trampling students’ constitutional and legal rights.

 

 

Appendix A

Chart of Current State and Federal
Antibullying Statutes

State Antibullying Statute

Statute requires schools to enact bullying policy?

 

Statute specifically includes the terms “cyberbullying” or “electronic harassment”?

Model Antibullying School Policy provided?

Statute requires notice be given to parents?

Alabama

Ala. Code §§ 16-28B-1 to -9 (2011)[257]

Yes[258]

Yes[259]

No

No

Alaska

Alaska Stat. §§ 14.33.200-250 (2011)

Yes[260]

No

Yes[261]

No

Arizona

Ariz. Rev. Stat. Ann. § 15-341(37) (2011)

Yes[262]

No

No

No

Arkansas

Ark. Code Ann. § 6-18-514 (2010)

Yes[263]

Yes[264]

No

No

California

Cal. Educ. Code §§ 32282, 32261 (West 2011)

Yes[265]

Yes[266]

Yes[267]

No

Colorado

Colo. Rev. Stat. Ann § 22-32-109.1 (2010)

Yes[268]

No

Yes[269]

No

Connecticut

Conn. Gen. Stat. § 10-222d (2010)

Yes[270]

No

No

Yes[271]

District of Columbia

D.C. Mun. Regs. tit. 5, § 2405.5 (2011)

No[272]

No[273]

No[274]

No

Delaware

Del. Code Ann. tit. 14, § 4112D (2011)

Yes[275]

Yes[276]

Yes[277]

Yes[278]

Florida

Fla. Stat. § 1006.147 (2010)

Yes[279]

Yes[280]

Yes[281]

Yes[282]

Georgia

Ga. Code Ann. § 20-2-751.4 (2011)

Yes[283]

Yes[284]

No

Yes[285]

Hawaii[286]

Proposed but not passed[287]

Idaho

Idaho Code Ann. §§ 18-917A, 33-512 (2011)

Yes[288]

Yes[289]

No

No

Illinois

105 Ill. Comp. Stat. 5/27-23.7 (2010)

Yes[290]

Yes[291]

No

No

Indiana

Ind. Code § 20-33-8-0.2 (2010)

Yes[292]

No

No

No

Iowa

Iowa  Code § 280.28 (2010)

Yes[293]

Yes[294]

Yes[295]

No

Kansas

Kan. Stat. Ann. 72-8256 (2011)

Yes[296]

Yes[297]

No

No

Kentucky

KY Rev. Stat. Ann. §§ 158.148, .440 (West 2010)

Yes[298]

No

No

No

Louisiana

LA Rev. Stat. Ann § 17:416.13 (2011)

Yes[299]

Yes[300]

No

No

Maine

ME Rev. Stat. Ann. tit. 20, § 1001(15(H)) (2010)

Yes[301]

No

Yes[302]

No

Maryland

MD. Code Ann., Educ. §§ 7-424, -434.1 (West 2010)

Yes[303]

Yes[304]

No

No

Massachusetts

Mass. Gen. Laws 71 § 37O (2011)

Yes[305]

Yes[306]

No

Yes[307]

Michigan

proposed but not passed[308]

Yes[309]

Minnesota

Minn. Stat. § 121A.0695 (2010)

Yes[310]

Yes[311]

No

No

Mississippi

Miss. Code. Ann. § 37-11-67 (2010)

Yes[312]

Yes[313]

No

No

Missouri

Mo. Rev. Stat. § 160.775 (2011)

Yes[314]

Yes[315]

No

No

Montana

(No Statute)

No

No

No

No

Nebraska

Neb. Rev. Stat. §§ 79-2, 137 (2010)

Yes[316]

Yes[317]

Yes[318]

No

Nevada

Nev. Rev. Stat. §§ 388.122 to .123, .133 (2010)

Yes[319]

Yes[320]

No

No

New Hampshire

N.H. Rev. Stat. Ann. §§ 193-F:1 to -6 (2011)

Yes[321]

Yes[322]

No

Yes[323]

New Jersey

N.J. Stat. Ann. §§ 18A:37-13, -15 (West 2011)

Yes[324]

Yes[325]

Yes[326]

No

New Mexico

N.M. Code R. § 6.12.7 (Weil 2010)

Yes[327]

Yes[328]

No

No

New York

N.Y. Educ. Law § 2801-a (McKinney 2009)

Yes[329]

No

No

Yes[330]

North Carolina

N.C.  Gen Stat. § 115C-407.15 (2010)

Yes[331]

Yes[332]

No

No

North Dakota

(No Statute)

No

No

No

No

Ohio

Ohio Rev. Code Ann. § 3313.666 (West 2011)

Yes[333]

No

Yes[334]

Yes[335]

Oklahoma

Okla. Stat. tit.70, § 24-100.4 (2011)

Yes[336]

Yes[337]

Yes[338]

No

Oregon

OR. Rev. Stat. §§ 339.351 and 339.356 (2010)

Yes[339]

Yes[340]

No

No

Pennsylvania

24 PA. Cons. Stat. § 13-1303.1-A (2010)

Yes[341]

Yes[342]

No

No

Rhode Island

R.I. Gen. Laws § 16-21-26 (2011)

Yes[343]

Yes[344]

Yes[345]

No

South Carolina

S.C. Code Ann. §§ 59-63-140, -120 (2010)

Yes[346]

Yes[347]

Yes[348]

No

South Dakota

(No Statute)

No

No

No

No

Tennessee

Tenn. Code Ann. §§ 49-6-1015 to -1016 (2011)

Yes[349]

No

No

No

Texas

Tex. Educ. Code Ann. § 37.001 (West 2009)

Yes[350]

No

No

Yes[351]

Utah

Utah Code Ann. § 53A-11A-301 (West 2011)

Yes[352]

No

No

Yes[353]

Vermont

VT. Stat. Ann. tit. 16, § 565 (2011)

Yes[354]

No

Yes[355]

No

Virginia

VA. Code Ann. § 22.1-279.6 (2011)

Yes[356]

Yes[357]

No

No

Washington

Wash. Rev. Code § 28A.300.285 (2010)

Yes[358]

Yes[359]

Yes[360]

No

West Virginia

W. Va. Code Ann. § 18-2C-3 (West 2011)

Yes[361]

No

Yes[362]

Yes[363]

Wisconsin

Wis. Stat. § 118.46 (2010)

Yes[364]

No

Yes[365]

No

Wyoming

Wyo. Stat. Ann. §§ 21-4-312, -314 (2011)

Yes[366]

Yes[367]

No

No

Federal Antibullying Statute

Federal Laws

Proposed, but not passed[368]

Proposed, but not passed[369]

 

Appendix B

Model Cyberbullying Policy For Public Schools[370]
It is the policy of this school that all students and school employees enjoy a safe and secure educational setting.  The school prohibits cyberbullying, as defined herein.  Nothing in this policy is intended to infringe on the constitutional rights of students or school employees.

1. Definitions

(a)   The term “cyberbullying”[371]

(i)     means the use of any electronic communication, by individuals or groups, to

(1)   make a true threat against a student or school employee;[372]

(2)   materially disrupt school operations;[373] or

(3)   substantially impinge on the rights of another student such as, but not limited to: creating reasonable fear of harm to the student’s person or property; creating a substantially detrimental effect on the student’s physical or mental health; substantially interfering with a student’s academic performance or interfering with the student’s ability to participate in or benefit from the services, activities, or privileges provided by the school; or being so severe, persistent, or pervasive as to cause severe emotional distress.[374]

(ii)   includes conduct that is based on, but not limited to, a student’s actual or perceived[375] race, color, national origin, gender, religion, disability, sexual orientation or gender identity, distinguishing physical or personal characteristic, socioeconomic status, or association with any person identified in section 1(a)(ii).

(b)   As used in this policy, the term “electronic communications” means communications through any electronic device, including, but not limited to, computers, telephones, mobile phones, pagers, and any type of communication, including, but not limited to, emails, instant messages, text messages, picture messages, and websites.[376]

2. School Jurisdiction[377]

(a)   No student shall be subjected to cyberbullying by an electronic communication that bears the imprimatur of the school regardless of whether such electronic communication originated on or off the school’s campus.

(b)   The school shall have jurisdiction to prohibit cyberbullying that originates on the school’s campus if the electronic communication was made using the school’s technological resources or the electronic communication was made on the school’s campus using the student’s own personal technological resources.

(c)    The school shall have jurisdiction to prohibit cyberbullying that originates off the school’s campus if: [378]

(i)     it was reasonably foreseeable that the electronic communication would reach the school’s campus; or

(ii)   there is a sufficient nexus between the electronic communication and the school which includes, but is not limited to, speech that is directed at a school-specific audience, or the speech was brought onto or accessed on the school campus, even if it was not the student in question who did so.

3. Notice[379]

(a)   Parents shall receive written notice of this cyberbullying policy at the beginning of each school year.

(b)   There shall be an annual process for discussing this policy with students in a student assembly.

(c)    For access to the school’s technological resources, including but not limited to email and Internet access, students and parents shall review, sign, and return the school’s acceptable use policy which prohibits the use of the school’s technological resources for cyberbullying.[380]

(d)   This policy, along with the school’s acceptable use policy as described in section 3(c), shall be prominently posted at school on student bulletin boards and in computer labs, and on the school’s website.

4. Investigations

(a)   Parents shall be notified as soon as practicable if their child is involved in a school investigation concerning cyberbullying.[381]

(b)   School officials may search and seize a student’s personal electronic device, including but not limited to cell phones and computers, if:[382]

(i)     the student is using the electronic device at school in violation of school rules; or

(ii)   the school official

(1)   has reasonable grounds for suspecting the search will turn up evidence that the student has violated or is violating either the law or the school rules; and

(2)   the search is limited in scope by being reasonably related to the objective of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.

(c)    Reasonable grounds, as set forth in section 4(b)(ii)(1), will not be established solely on anonymous reports.[383]

(d)   If the cyberbullying victim or student reporting the cyberbullying is willing, the school shall initiate an interview to determine the nature of the bullying, the name of the participants, where and how the information was being sent, and how far the images or messages have spread.[384]

(e)    Any evidence of cyberbullying discovered during an investigation should be preserved.  Such actions may include, but are not limited to, saving the victim’s cell phone, text, or email messages; and printing or copying posts or other electronic communications available on websites before removing them.[385]

(f)     If, during the course of a cyberbullying investigation, images of nude minors are discovered, those images should not be distributed or shown to other school officials.  The school official who discovered the image should promptly contact law enforcement.[386]

5. Reporting[387]

(a)   Specific faculty members [insert names here] will be the main contacts for students who wish to report incidents of cyberbullying.  Students, parents, and other school officials may also contact the principal to report incidents of cyberbullying.

(b)   Anonymous and confidential reports of cyberbullying incidents are allowed, but they will not provide the sole basis for a search of a student’s personal electronic device or for disciplinary action.

(c)    School officials may report incidents of cyberbullying to law enforcement depending on the criminal nature of the offense, or the gravity and repetition of the offense.

6. Remedies[388]

(a)   An individual student whose behavior is found to be in violation of this policy will be subject to discipline.  In determining the disciplinary action, the school will take into consideration the nature of the offense, the age of the student, and the following:

(i)     For a first-time or minor cyberbullying offense, the school may mandate that the student attend mandatory counseling and education sessions.

(ii)   For a second or more serious cyberbullying offense, the school may prohibit the student from participating in school activities or events.

(iii)  For a serious incident of cyberbullying, the school may suspend or expel the student.

(b)   No student shall retaliate or make false accusations against a target or witness of cyberbullying.

(c)    Whenever practicable, the school shall provide counseling to all students involved in a cyberbullying incident.

(d)   Whenever practicable, the school shall file a complaint with Internet sites or services containing cyberbullying material to have the material removed.

7. Education[389]

(a)   The school shall provide an annual educational program for students, parents, and school officials.  This education program shall train individuals:

(i)     on the meaning of and prohibition against cyberbullying, including the provisions of this policy;

(ii)   how students can report cyberbullying incidents;

(iii)  how students can be an ally to peers who are being cyberbullied; and

(iv)  how students can protect themselves from being cyberbullied.

(b)   The school shall encourage students to play an active role in developing the school’s cyberbullying educational programs.

 


* Associate Professor of Law, Pepperdine University School of Law.  I am deeply thankful to Professor Bernie James for his mentoring.  I would also like to thank Lindsey Forrester Archer, Holly Townson, and Whitney McEachran for their thorough research and a special thanks to Elizaveta Kabanova for her research and last-minute editing suggestions.

[1]. Cindy Long, Silencing Cyberbullies, NEAToday (May 2008), http://www.nea.org/home/4104.htm.  The article notes that in one cyberbullying incident “a ‘popular girl’ placed her digital camera under a bathroom partition to capture an ‘unpopular’ girl in a compromising position.”  Id.

[2]. See, e.g., Sameer Hinduja & Justin W. Patchin, Cyberbullying: Identification, Prevention, and Response, Cyberbullying Research Center, http://www.cyberbullying.us/Cyberbullying_Identification_Prevention_Response_Fact_Sheet.pdf (last visited Sept. 16, 2011).

[3]. Mary Ellen Flannery, Top Eight Challenges Teachers Face This School Year, NEAToday (Sept. 13, 2010), http://neatoday.org/2010/09/13/top-eight
-challenges-teachers-face-this-school-year/ (“[N]early one in three teens say they’ve been victimized via the Internet or cell phones.  A teacher’s role—or a school’s role—is still fuzzy in many places.  What legal rights or responsibilities do they have to silence bullies, especially when they operate from home?”).

[4]. See, e.g., Thomas v. Bd. of Educ., 607 F.2d 1043, 1052 (2d Cir. 1979).  The court explained:

When school officials are authorized only to punish speech on school property, the student is free to speak his mind when the school day ends.  In this manner, the community is not deprived of the salutary effects of expression, and educational authorities are free to establish an academic environment in which the teaching and learning process can proceed free of disruption. Indeed, our willingness to grant school officials substantial autonomy within their academic domain rests in part on the confinement of that power within the metes and bounds of the school itself.

Id.

[5]. See id.; see also Flaherty v. Keystone Oaks Sch. Dist., 247 F. Supp. 2d 698, 705 (W.D. Pa. 2003) (finding a school policy constitutionally overbroad where the policy lacked language to limit the school’s authority “to discipline expressions that occur on school premises or at school related activities, thus providing unrestricted power to school officials”).

[6]. See J.S. ex rel. Snyder v. Blue Mountain Sch. Dist., 593 F.3d 286 (3d Cir. 2010), vacated, reh’g granted en banc, No. 08-4138, 2010 U.S. App. LEXIS 7342, at *1 (3d Cir. Apr. 9, 2010), rev’d en banc, No. 08-4138, 2011 WL 2305973, at *1 (3d Cir. June 13, 2011).  In this case, the court was deciding whether a school could discipline a student for creating, on a home computer, a vulgar and fake MySpace page of the school’s principal.  Snyder, 2011 WL 2305973, at *1.  Finding that the school could not discipline the student, the en banc court was fractured—seven judges joined the majority, five judges concurred and six judges dissented.  Id. at *8, *18, *22.

[7]. Compare id. at *27 (Fisher, J., dissenting) (stating that “[o]ur decision today causes a split with the Second Circuit”), with Wisniewski v. Bd. of Educ., 494 F.3d 34, 40 (2d Cir. 2007) (holding that the school can regulate student speech created off-campus where it was reasonably foreseeable that it would reach the school campus).

[8]. A proposed bill that would make cyberbullying a federal crime sets forth the following findings of fact:

Congress finds the following: . . .

(4) Online victimizations are associated with emotional distress and other psychological problems, including depression.

(5) Cyberbullying can cause psychological harm, including depression; negatively impact academic performance, safety, and the well-being of children in school; force children to change schools; and in some cases lead to extreme violent behavior, including murder and suicide.

(6) Sixty percent of mental health professionals who responded to the Survey of Internet Mental Health Issues report having treated at least one patient with a problematic Internet experience in the previous five years; 54 percent of these clients were 18 years of age or younger.

Cyberbullying Prevention Act, H.R. 1966, 111th Cong. (2010).

[9]. “Most teens text daily.”  Amanda Lenhart, Teens, Cell Phones and Texting: Text Messaging Becomes Centerpiece Communication, Pew Internet & Am. Life Project, http://pewresearch.org/pubs/1572/teens-cell-phones-text
-messages (last visited Sept. 19, 2011) (noting that teenagers’ use of cell phones and texting has increased from 45% to 75% since 2004, and that 72% of teens are texters); Jill Tucker, Social Networking Has Hidden Dangers For Teens, S.F. Chronicle (Aug. 9, 2009, 08:31 PM), available at http://www.sfgate.com
/cgi-bin/article.cgi?f=/c/a/2009/08/10/BA9T1954T7.DTL#ixzz1J3WA1cEI (“While teens are spending more and more time on social networking sites like Facebook and MySpace¾with 22 percent saying they check their sites more than 10 times a day¾they don’t seem to be aware of the long-term personal havoc they could create with a click of a button.”); see also id. (explaining “51 [percent of teens] check their sites more than once a day”).

[10]. Bullying/Cyberbullying Prevention Law: Model Statute and Advocacy Toolkit, Anti-Defamation League, 5 (Apr. 1, 2009), http://www.adl.org/civil
_rights/Anti-Bullying%20Law%20Toolkit_2009.pdf; see also Bullying, Berkshire Dist. Attorney’s Office, http://www.mass.gov/?pageID=berterminal
&L=3&L0=Home&L1=Crime+Awareness+%26+Prevention&L2=Parents+%26+Youth&sid=Dber&b=terminalcontent&f=parents_youth_bullying&csid=Dber (last visited Aug. 31, 2011).  The article explained:

Bullying is the most common form of violence.  Some 3.7 million youth engage in it, and more than 3.2 million are victims of bullying annually.

An estimated 160,000 children miss school every day out of fear of attack or intimidation by other students . . . .

72% of teens report ‘at least one incident’ of bullying online (name calling, insults via IM or social networking sites).

90% did NOT report the incident to an adult.

Id.

[11]. Hinduja & Patchin, supra note 2, at 1.

[12]. See Jenny Walker, White House Conference on Bullying Prevention, CyberBullyingNews.com (Mar. 10, 2011), http://www.cyberbullyingnews.com
/2011/03/white-house-conference-on-bullying-prevention-watch-live-today/.

[13]. Randy Taran, Cyberbullying: Strategies to Take Back Your Power, Huffington Post (Jan. 17, 2011, 12:12 PM), http://huffingtonpost.com/randy
-taran/cyberbullying-10-ways-to_b_807005.html.

[14]. Sameer Hinduja & Justin W. Patchin, Cyberbullying Research Summary: Cyberbullying and Suicide, Cyberbullying Research Center (2010), http://www.cyberbullying.us/cyberbullying_and_suicide_research_fact
_sheet.pdf.

[15]. Linsey Davis & Emily Friedman, NJ Gov. Wonders How Rutgers ‘Spies’ Can Sleep at Night After Clementi’s Suicide, ABC News (Sept. 30, 2010), http://abcnews.go.com/US/suicide-rutgers-university-freshman-tyler-clementi
-stuns-veteran/story?id=11763784.

[16]. Victoria Kim & Richard Winton, School Holds Tolerance Seminar as 3 Boys Are Arrested in ‘Ginger’ Attacks, L.A. Times, Nov. 30, 2009, http://articles.latimes.com/2009/nov/30/local/la-me-ginger-attacks1-2009dec01.

[17]. Long, supra note 1.

[18]. Id.

[19]. Christopher Maag, A Hoax Turned Fatal Draws Anger but No Charges, N.Y. Times, Nov. 28, 2007, http://www.nytimes.com/2007/11/28/us/28hoax.html?
_r=2&oref=slogin.

[20]. Michelle Kim, Boy, 14, Arrested for Cyber-Bullying 12-Year-Olds, NBC N.Y., Mar. 14, 2011, http://www.nbcnewyork.com/news/local/117966829.html.

[21]. Students Arrested for Cyber Bullying, WAFB La.’s News Channel, http://www.wafb.com/global/story.asp?s=2774728& (last visited Aug. 29, 2011).

[22]. Jason Beahm, Teen Cyberbullying Arrest: Fake Facebook Page, FindLaw Blogs (Jan. 21, 2011, 12:15 PM), http://blogs.findlaw.com/blotter/2011
/01/teen-cyberbullying-arrest-fake-facebook-page.html.

[23]. Russell Goldman, Teens Indicted After Allegedly Taunting Girl Who Hanged Herself, ABC News (Mar. 29, 2010), http://abcnews.go.com/Technology
/TheLaw/teens-charged-bullying-mass-girl-kill/story?id=10231357.

[24]. Emily Bazelon, What Really Happened to Phoebe Prince? The Untold Story of Her Suicide and the Role of the Kids Who Have Been Criminally Charged For It, Slate (July 20, 2010, 10:13 PM), http://www.slate.com/id
/2260952/entry/2260953.

[25]. Erik Eckholm & Katie Zezima, 6 Teenagers Are Charged After Classmate’s Suicide, N.Y. Times, Mar. 29, 2010, http://www.nytimes.com/2010
/03/30/us/30bully.html.

[26]. Bazelon, supra note 24.

[27]. Id.

[28]. Frank LoMonte, States Should Protect Student Journalists, Philly.Com (Aug. 11, 2010), http://articles.philly.com/2010-08-11/news/24971988_1_student
-journalism-student-reporters-number-of-school-systems.

[29]. Hinduja & Patchin, supra note 2, at 2.  This study determined that:

Parents often say that they don’t have the technical skills to keep up with their kids’ online behavior; teachers are afraid to intervene in behaviors that often occur away from school; and law enforcement is hesitant to get involved unless there is clear evidence of a crime or a significant threat to someone’s physical safety.

Id.

[30]. Rick Nauert, Social Workers Struggle to Deal with Cyber Bullying, PsychCentral (Jan. 11, 2011), http://psychcentral.com/news/2011/01/11/social
-workers-struggle-to-deal-with-cyber-bullying/22507.html (“Although cyber bullying is growing in prevalence, new research suggests nearly half of elementary, middle and high school social workers feel ill-equipped to deal with such victimization.”).  The article explains:

In a survey of nearly 400 school social workers at the elementary, middle and high school levels who were members of the Midwest School Social Work Council, the researchers found that while all respondents felt that cyber bullying can cause psychological harm, including suicide, about 45 percent felt they were not equipped to handle cyber bullying, even though they recognized it as a problem.

Further, only about 20 percent thought their school had an effective cyber bullying policy.

“If there’s no policy in place to guide them, staffers are flying solo in this area, and that can be a liability,” said Singer.

Id.

[31]. If a school does not take active steps to prohibit student harassment, they face possible civil liability, under both federal and state laws, from students who have been harassed by their peers.  See, e.g., 20 U.S.C. § 1681(a) (2010) (“No person . . . shall, on the basis of sex, be excluded from participation in, be denied the benefits of, or be subjected to discrimination under any education program or activity receiving Federal financial assistance.”); Murrell v. Sch. Dist. No. 1, 186 F.3d 1238, 1238 (10th Cir. 1999) (finding that a school district could be held liable under Title IX for having actual knowledge of student-on-student harassment and failing to take active steps to prevent it); Williams v. Port Huron Area Sch. Dist. Bd. of Educ., No. 06-14556, 2010 WL 1286306, at *1 (E.D. Mich. Mar. 30, 2010) (holding that a school district was liable for student-on-student harassment under the “deliberate indifference” standard of Title VI and Title IX claims, when students were harassed based on their race); L.W. v. Toms River Reg’l Schs. Bd. of Educ., 915 A.2d 535, 535 (N.J. 2007) (ruling that the New Jersey discrimination law extended a duty to schools to prevent students from being sexually harassed by fellow students); Susan H. Kosse, Student Designed Home Web Pages: Does Title IX or the First Amendment Apply?, 43 Ariz. L. Rev. 905, 905-19 (2001) (explaining the schools’ dilemma in regulating student web pages in violation of the First Amendment but also subjecting themselves to liability under Title IX for failing to prevent sexual harassment).

[32]. Eckholm & Zezima, supra note 25.

[33]. Jan Hoffman, Online Bullies Pull Schools Into the Fray, N.Y. Times, June 27, 2010, http://www.nytimes.com/2010/06/28/style/28bully.html?_r=1&sq
=hoffman&st=cse&scp=3&pagewanted=all.  The author notes:

Many principals hesitate to act because school discipline codes or state laws do not define cyberbullying.  But Bernard James, an education law scholar at Pepperdine University, said that administrators interpreted statutes too narrowly: “Educators are empowered to maintain safe schools,” Professor James said. “The timidity of educators in this context of emerging technology is working to the advantage of bullies.”

Id.

[34]. Cdnogen, Research Post: School Officials Handle Cyber Bullying, StudentWebStuff.com (Oct. 1, 2009, 10:45 AM), http://www.studentwebstuff.com/mis/showthread.php?t=8123.  The article notes:

It is time to address cyber bullying in detail, so that educational institutions can be well aware of their legal rights and responsibilities.  This requires clearly defining the scope of cyber bullying and early detection of activities. From these, schools should be able to better assess and decrease the number of cases through prevention strategies.

Id.

[35]. Hoffman, supra note 33.

[36]. Id. (internal quotation marks omitted).

[37]. Id.

[38]. See infra Part II.A.

[39]. See infra Part II.A.

[40]. Mahaffey v. Aldrich, 236 F. Supp. 2d 779, 781-82 (E.D. Mich. 2002).  The student added a disclaimer to his page, “[D]on’t go killing people and stuff.”  Id. at 782.  Although unintended, the webpage was circulated to other students at the school.  Id. at 786.

[41]. Id.

[42]. J.S. ex rel. H.S. v. Bethlehem Area Sch. Dist., 807 A.2d 847, 851 (Pa. 2002).

[43]. J.S. ex rel. Snyder v. Blue Mountain Sch. Dist., 593 F.3d 286 (3d Cir. 2010), vacated, reh’g granted en banc, No. 08-4138, 2010 U.S. App. LEXIS 7342  (3d Cir. Apr. 9, 2010), rev’d en banc, No. 08-4138, 2011 WL 2305973 (3d Cir. June 13, 2011).  Seven judges joined the majority, five judges concurred, and six judges dissented.  See id. at *8, *18, *22.

[44]. Layshock v. Hermitage Sch. Dist., 496 F. Supp. 2d 587 (W.D. Pa. 2006), aff’d, 593 F.3d 249 (3d Cir. 2010), vacated, reh’g granted en banc, No. 07-4465, 2010 U.S. App. LEXIS 7362 (3d Cir. Apr. 9, 2010), aff’d on reh’g, No. 07-4465, 2011 WL 2305970 (3d Cir. June 13, 2011) (en banc).

[45]. See, e.g., Mitsuri Taki, Relations Among Bullying, Stresses, and Stressors, in Handbook of Bullying in Schools: An International Perspective 151, 151 (Shane R. Jimerson, Susan M. Swearer, & Dorothy L. Espelage eds., 2010) (describing research findings on the causes and effects of bullying from as far back as the 1970s); Ben Craw, The ‘80s Bully Megacut: Shoves, Wedgies, Putdowns, and Punches, The Huffington Post (May 14, 2010), http://www.huffingtonpost.com/2010/05/14/the-80s-bully-megacut-sho_n
_575350.html (describing the typical bully in the 1980s).

[46]. See infra Part I.B (surveying the current state laws concerning bullying and cyberbullying).  The Arizona law regulating bullying in schools gives an example of the typical language used in antibullying statutes.  See infra Part I.B.  The statute provides: “The Governing Board shall . . . [p]rescribe and enforce policies and procedures to prohibit pupils from harassing, intimidating and bullying other pupils on school grounds, on school property, on school buses, at school bus stops and at school sponsored events and activities.”  Ariz. Rev. Stat. § 15-341(A)(37) (2011).  See also Idaho Code Ann. § 33-512(6) (2006) (stating that each district shall have the duty to “prescribe rules for the disciplining of unruly or insubordinate pupils, including rules on student harassment, intimidation and bullying”); Me. Rev. Stat. tit. 20-A, § 1001(15)(H) (2009) (mandating that school boards shall “[e]stablish policies and procedures to address bullying, harassment and sexual harassment”); Neb. Rev. Stat. § 79-2,137 (2008) (establishing that each district shall establish a policy on bullying and finding that “[b]ullying disrupts a school’s ability to educate students”).

[47]. Anti-Defamation League, supra note 10, at 1 (explaining that for victims of cyberbullying “there is no refuge and victimization can be relentless”); see also David Kravets, Cyberbullying Bill Gets Chilly Reception, Threatlevel (Sept. 30, 2009, 6:37 PM), http://www.wired.com/threatlevel
/2009/09/cyberbullyingbill/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+wired27b+%28Blog+‑+27B+Stroke+6+%28Threat+Level%29%29.  The article quotes Rep. Linda Sanchez (D-CA) explaining: “Bullying has gone electronic . . . This literally means kids can be bullied at any hour of the day or the night, or even in the victims’ own home.”  Id. (internal quotation marks omitted).  Representative Sanchez proposed the “Megan Meier Cyberbullying Prevention Act,” which would make cyberbullying a federal offense.  H.R. 1966, 111th Cong. (2010).

[48]. Hinduja & Patchin, supra note 2, at 2.

[49]. Anti-Defamation League, supra note 10, at 1.

[50]. Mike Hardcastle, What is Cyberbullying? Bullying Comes Home, About.Com TeenAdvice, http://teenadvice.about.com/od/schoolviolence/a
/cyberbullying1.htm (last visited Aug. 31, 2011).  The article states:

Bullying has been around forever but cyberbullying is different because it lets a bully remain anonymous.  It is easier to bully in cyberspace than it is to bully face to face.  With cyberbullying a bully can pick on people with much less risk of being caught . . . .

The detachment afforded by cyberspace makes bullies out of people who would never become involved in a real life incident.  The Internet makes bullying more convenient and since the victim’s reaction remains unseen people who wouldn’t normally bully don’t take it as seriously.

Id.

[51]. Hinduja & Patchin, supra note 2, at 2.  See also H.R. 1966, 111th Cong. (2010) (“Congress finds . . . [e]lectronic communications provide anonymity to the perpetrator and the potential for widespread public distribution, potentially making them severely dangerous and cruel to youth.”).

[52]. Formspring, http://www.formspring.me/ (last visited Aug. 29, 2011).  Formspring is a question-and-answer-based social website which allows its users to anonymously set up a profile page, from which anyone can ask them questions.  See generally id.  The questions and their given responses are then published on the user’s profile page, including links to social networking sites such as Facebook and Twitter.  The site’s anonymity has been criticized for generating hateful comments because it allows minors to ask questions and give responses related to sexual experiences and preferences for all the public to see, share, and comment on.  Tamar Lewin, Teenage Insults, Scrawled on Web, Not on Walls, N.Y. Times, May 5, 2010, http://www.nytimes.com/2010/05/06/us
/06formspring.html.

[53]. Hinduja & Patchin, supra note 2, at 4; see also Anti-Defamation League, supra note 10, at 1 (explaining that cyberbullying may be more harmful than traditional bullying because of the invasive and pervasive nature of the communication and because messages are circulated far and wide and there is no refuge¾it is ubiquitous).

[54]. Hardcastle, supra note 50 (“Bullies are natural instigators and in cyberspace bullies can enlist the participation of other students who may be unwilling to bully in the real world.  Kids who stand around doing nothing in a real life bullying incident often become active participants in online harassment.”).

[55]. Students Arrested for Cyber Bullying, supra note 21 (“All of the students involved are honor students.”).

[56]. See, e.g., Long, supra note 1.  The article states:

Unlike the schoolyard bully of yesteryear, the cyberbully can hide behind online anonymity and attack around the clock, invading the privacy of a teen’s home. With young people spending most of their free time online or texting their friends, digital bullies not only have ready access to victims, but also an audience—because without witnesses, virtual bullying loses its punch.

Id.

[57]. Anti-Defamation League, supra note 10, at 1.

[58]. How Is Cyberbullying Different to Other Forms of Bullying?, TeachToday, http://www.teachtoday.eu/en/Teacher-advice/Cyberbullying/How
-is-cyberbullying-different-to-other-forms-of-bullying.aspx (last visited Aug. 29, 2011) (explaining that “bystanders can become perpetrators if they pass on emails or text/picture messages or take part in an online discussion”).

[59]. See, e.g., H.R. 1966, 111th Cong. (2009) (“Congress finds the following: (1) Four out of five of United States children aged 2 to 17 live in a home where either they or their parents access the Internet. (2) Youth who create Internet content and use social networking sites are more likely to be targets of cyberbullying.”).

[60]. Sameer & Patchin, supra note 2 (explaining that parents and teachers may not be able to keep track or even know what to do if cyberbullying is discovered).

[61]. Anti-Defamation League, supra note 10, at 1.

[62]. Rick Rojas, When Students’ Controversial Words Go Viral, What Is the University’s Role?, L.A. Times (Mar. 27, 2011), http://www.latimes.com/news/local/la‑me‑college‑speech‑20110327,0,2970965
.story (reporting on the recent story where a college student posted a YouTube video, in which she complained and mocked Asian students, leading to death threats against her and her subsequent voluntary withdrawal from school).

[63]. See infra Appendix A.

[64]. See infra Appendix A.

[65]. S.B. 2094, 25th Leg. Reg. Sess. (Haw. 2010).

[66]. Matt’s Safe School Law, H.B. 4162, 95th Leg. Reg. Sess. (Mich. 2007); H.B. 4580, 96th Leg. Reg. Sess. (Mich. 2010).

[67]. S. 3739, 111th Cong. (2010).  This proposed bill, if passed, would amend the Safe and Drug-Free Schools and Communities Act to allow federal funding for schools that have bullying prevention programs.  See also Megan Meir Cyberbullying Prevention Act, H.R. 1966, 111th Congress (2009).  This proposed bill, if passed, would make it a federal crime to cyberstalk.

[68]. See infra Appendix A.

[69]. Eighteen states have model school policies, including Alaska, California, Colorado, Delaware, Florida, Iowa, Maine, Michigan, Nebraska, New Jersey, Ohio, Oklahoma, Rhode Island, South Carolina, Vermont, Washington, Wisconsin, and West Virginia.  See infra Appendix A.

[70]. Ariz. Rev. Stat. Ann. § 15-341 (37) (2011); Kan. Stat. Ann. 72-8256 (2009); Mass. Gen. Laws ch. 71, § 37O (2011); Nev. Rev. Stat. § 388.133 (2010); N.H. Rev. Stat. Ann. § 193-F:4 (2011); Or. Rev. Stat. § 339.356 (2010).

[71]. Ala. Code § 16-28B-5 (2011); Alaska Stat. § 14.33.200 (2011); Cal. Educ. Code § 32282 (West 2011); Fla. Stat. § 1006.147 (2010); Ga. Code Ann. § 20-2-751.4 (2011); Idaho Code Ann. § 18-917A (2011); 105 Ill. Comp. Stat. 5/27-23.7 (2010); Ind. Code § 20-33-8-0.2 (2010); Iowa Code § 280.28 (2010); Kan. Stat. Ann. 72-8256 (2009); Md. Code Ann., Educ. § 7-424 (West 2010); Minn. Stat. § 121A.0695 (2010); Miss. Code. Ann. § 37-11-67 (2010); Nev. Rev. Stat. § 388.122 (2010); N.H. Rev. Stat. Ann. § 193-F:4 (2011); N.J. Stat. Ann. § 18A:37-14 (West 2011); N.M. Code R. § 6.12.7 (LexisNexis 2010); N.C. Gen. Stat. § 115C-407.15 (2010); Okla. Stat. tit. 70, § 24-100.4 (2011); Or. Rev. Stat. § 339.351 (2010) (Definitions); 24 Pa. Cons. Stat. § 13-1303.1-A (2010); R.I. Gen. Laws § 16-21-26 (2011); S.C. Code Ann. § 59-63-140 (2010); Va. Code Ann. § 22.1-279.6 (2011); Wash. Rev. Code § 28A.300.285 (2010); Wyo. Stat. Ann. § 21-4-314 (2011).

[72]. Those ten states are California, Delaware, Florida, Iowa, Oklahoma, Nebraska, New Jersey, Rhode Island, South Carolina, and Washington.  See infra Appendix A.

[73]. See supra Part I.A.

[74]. Sample Policy for Bullying Prevention, Cal. Dep’t of Educ., http://www.cde.ca.gov/ls/ss/se/samplepolicy.asp (last updated Oct. 25, 2010).

[75]. Safe Schools Guide: Selected Strategies and Resources, Okla. Dep’t of Educ. (2005), http://www.sde.state.ok.us/Schools/SafeHealthy/pdf
/SafeSchlGuide.pdf; Guidance on Developing Required Policies on Bullying, Rhode Island Dep’t of Educ., http://www.ride.ri.gov/psi/docs/child_family
/substance/bullying%20guidance%20and%20modelpolicy%2011-21-03.pdf (last visited Aug. 29, 2011).

[76]. Colorado Association of School Boards Sample Policy on Bullying Prevention and Education, Center for the Study and Prevention of Violence (2001), http://www.colorado.edu/cspv/safeschools/bullying_casbpolicy.html.

[77]. Delaware’s Model Bully Prevention Policy, Delaware Dep’t of Educ., http://www.doe.k12.de.us/infosuites/students_family/climate/files/Bully%20Prevention%20Policy%20Template.pdf (last visited Aug. 29, 2011); Model Policy Against Bullying and Harassment, Fla. Dep’t of Educ. (July 31, 2008), www.fldoe.org/safeschools/doc/modelpolicy.doc; Anti-Harassment, Anti-Intimidation and Anti-Bullying Policy,  Ohio Dep’t of Educ. Adm’r, http://www.ode.state.oh.us/GD/Templates/Pages/ODE/ODEDetail.aspx?page=3&TopicRelationID=1287&ContentID=29364&Content=109573 (last updated Aug. 4, 2011) (providing a variety of resources including an overview of the Model Policy); South Carolina—Self Control Addressing Bullying in Our Schools: A Bullying Prevention Model, S.C Dep’t of Educ. 31–36, http://www.itv.scetv.org/guides/sc2v2.pdf (last visited Sept. 24, 2011).

[78]. Shelton v. Tucker, 364 U.S. 479, 487 (1960).

[79]. J.S. ex rel. Snyder v. Blue Mountain Sch. Dist., No. 08-4138, 2011 WL 2305973, at *23 (3d Cir. June 13, 2011) (Fisher, J., dissenting) (citations omitted) (quoting Keyishian v. Bd. of Regents, 385 U.S. 589, 603 (1967)).

[80]. Tinker v. Des Moines Indep. Cmty. Sch. Dist., 393 U.S. 503, 506 (1969).

[81]. Bethel Sch. Dist. No. 403 v. Fraser, 478 U.S. 675, 682 (1986).

[82]. See, e.g., Hazelwood Sch. Dist. v. Kuhlmeier, 484 U.S. 260, 266 (1988) (pointing out that students’ First Amendment rights in public schools must be applied in light of the special characteristics of the school’s environment, and that a school does not need to tolerate student speech that is inconsistent with the school’s educational mission—even if the government would not be able to censor similar speech outside the school).

[83]. See e.g., Tinker, 393 U.S. at 506.

[84]. Id.

[85]. Id. at 507 (“[T]he Court has repeatedly emphasized the need for affirming the comprehensive authority of the States and of school officials, consistent with fundamental constitutional safeguards, to prescribe and control conduct in the schools.”).

[86]. See Morse v. Frederick, 551 U.S. 393, 418 (2007) (Thomas, J., concurring) (“I am afraid that our jurisprudence now says that students have a right to speak in schools except when they don’t.”); Tova Wolking, Comment, School Administrators as Cyber Censors: Cyber Speech and First Amendment Rights, 23 Berkeley Tech. L.J. 1507, 1529 (2008) (“The chilling effect of punishing student speech merely because it is unpleasant or disagreeable threatens the foundations of democracy. . . . It follows that discouraging students from engaging in discourse and critical thinking, even if it is juvenile or silly, is antithetical to a healthy democracy.”).

[87]. There are four seminal Supreme Court cases concerning student free speech.  Morse, 551 U.S. at 397 (holding that schools may regulate student speech that promotes illegal drug use and that takes place during a school-sponsored event); Hazelwood, 484 U.S. at 271 (holding that schools can regulate student speech which may be perceived to “bear the imprimatur of the school,” such as a school-sponsored newspaper); Bethel Sch. Dist. No. 403 v. Fraser, 478 U.S. 675, 683 (1986) (holding that lewd, vulgar, or plainly offensive speech that takes place on-campus is punishable); Tinker, 393 U.S. at 513 (holding that schools can regulate speech that “materially disrupts classwork or involves substantial disorder or invasion of the rights of others”).

[88]. Compare J.S. ex rel. Snyder v. Blue Mountain Sch. Dist., 593 F.3d 286 (3d Cir. 2010), rev’d en banc, No. 08–4138, 2011 WL 2305973, at *12 (3d Cir. June 13, 2011) (holding that the school could not discipline a student for speech created off-campus) with Wisniewski v. Bd. of Educ. of the Weedsport Cent. Sch. Dist., 494 F.3d 34, 40 (2d Cir. 2007) (holding that the school can regulate student speech created off-campus where it was reasonably foreseeable that it would reach the school campus).  See also infra Part II.A(1)-(2); David Kravets, Cyberbullying Bill Gets Chilly Reception, Wired.Com (Sept. 30, 2009), http://www.wired.com/threatlevel/2009/09/cyberbullyingbill/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+wired27b+%28Blog+‑+27B+Stroke+6+%28Threat+Level%29%29.  This article explains how Representative Sanchez proposed legislation, the “Megan Meier Cyberbullying Prevention Act,” which would make cyberbullying a federal offense. Id.  The legislation was criticized as being “unconstitutionally vague” and a “breach of free speech.”  Id.

[89]. Morse, 551 U.S. at 401.

[90]. Although courts do not systematically address these two inquires, as this Part will lay out, a survey of student speech precedent lends itself to this framework.

[91]. See Anti-Defamation League, supra note 10, at 5-6. The authors point out:

As a significant amount of cyberbullying is created on computers, cell phones and other devices that are not owned by the school, or are not located on school property, but still affect the school environment and the welfare of the students, it is important to ensure that schools are given adequate legal framework to address the issue.

Id.

[92]. Tinker, 393 U.S. at 513.  See infra Part II.A(2) (discussing the Tinker standard fully).

[93]. While this Part of the Article analyzes how public schools might have the right to regulate some off-campus speech, other scholars have argued that  “Tinker Stopped Itself at the Schoolhouse Gate.”  Aaron H. Caplan, Public School Discipline for Creating Uncensored Anonymous Internet Forums, 39 Willamette L. Rev. 93, 140 (2003).

[94]. Hazelwood Sch. Dist. v. Kuhlmeier, 484 U.S. 260, 270 (1988) (holding that schools can regulate student speech in school-sponsored newspapers); Bethel Sch. Dist. No. 403 v. Fraser, 478 U.S. 675, 683 (1986) (holding that lewd offensive speech given at a school assembly is punishable).

[95]. Morse, 551 U.S. at 401, 408 (explaining that a student “cannot stand in the midst of his fellow students, during school hours, at a school-sanctioned activity and claim he is not in school” and promote illegal drug use) (internal quotations omitted).

[96]. One scholar argues that Internet-speech cases might be most like underground newspaper cases.  Wolking, supra note 86, at 1516-19.  See also, e.g., Thomas v. Bd. of Educ., 607 F.2d 1043, 1049 (2d Cir. 1979) (holding that schools could not punish students who distributed the newspaper off-campus, and only minimally associated the newspaper to the school by keeping copies in a teacher’s office for storage).

[97]. Compare Doninger v. Niehoff, 527 F.3d 41, 43–44 (2d Cir. 2008) (ruling that the school had authority to take away a student’s right to participate in student government when the student posted online comments that substantially disrupted the school), Wisniewski v. Bd. of Educ., 494 F.3d 34, 40 (2d Cir. 2007) (holding that the school can regulate student speech where it was reasonably foreseeable that it would reach the school campus), J.S. ex rel. H.S. v. Bethlehem Area Sch. Dist., 807 A.2d 847, 869 (Pa. 2002) (finding that the school can regulate speech originating off-campus, but directed at the school), and Killion v. Franklin Reg’l Sch. Dist., 136 F. Supp. 2d 446, 459 (W.D. Pa. 2001) (allowing a school to regulate speech where the school disciplined a student for creating, and sharing with his friends via email, a website which was insulting and degrading to one of the teachers), with Beussink ex rel. Beussink v. Woodland R-IV Sch. Dist., 30 F. Supp. 2d 1175, 1180 (E.D. Mo. 1998) (finding that the decision to discipline a student for off-campus speech was unacceptable because it was based on the principal’s emotional reaction and not any real fear that the speech would cause material disruption), Emmett v. Kent Sch. Dist. No. 415, 92 F. Supp. 2d 1088, 1190 (W.D. Wash. 2000) (holding that because the speech was created off-campus, there was not enough of a connection to the school for the school to have jurisdiction over the speech), and J.C. ex rel. R.C. v. Beverly Hills Unified Sch. Dist., 711 F. Supp. 2d 1094, 1118 (C.D. Cal. 2010) (finding that the student speech originating off-campus did not substantially disrupt school activity and so the school had no authority to punish the student for that speech).

[98]. See, e.g., LaVine v. Blaine Sch. Dist., 257 F.3d 981, 991 (9th Cir. 2000) (finding school discipline constitutional, without any jurisdictional analysis, where the student wrote a violent poem off-campus but showed it to his teacher).

[99]. J.S. ex rel. Snyder v. Blue Mountain Sch. Dist., 593 F.3d 286 (3d Cir. 2010), vacated, rev’d en banc, No. 08–4138, 2011 WL 2305973, at *10 (3d Cir. June 13, 2011) (overturning the district court’s decision that stated Tinker did “not govern this case because no ‘substantial and material disruption’ occurred”).

[100]. See, e.g., Beverly Hills, 711 F. Supp. 2d at 1104 (conducting a jurisdictional analysis despite concluding that in the Ninth Circuit “the substantial weight of authority indicates that geographic boundaries generally carry little weight in the student-speech analysis”).

[101]. See, e.g., Wisniewski, 494 F.3d at 3840 (finding that the Tinker standard applied because it was reasonably foreseeable that the student speech would reach campus and because it did, in fact, reach the school campus).

[102]. See Evans v. Bayer, 684 F. Supp. 2d 1365, 1372 (S.D. Fla. 2010); Beverly Hills, 711 F. Supp. 2d at 1107; Bethlehem, 807 A.2d at 864 (holding that the threshold question is whether there was a sufficient nexus between the speech and the school campus).

[103]. Bethlehem, 807 A.2d at 847 (finding that there was a sufficient nexus between the speech and the school where a student created a website off-campus which was subsequently viewed by students on-campus); see also Wolking, supra note 86 (explaining courts’ decisions regarding off-campus speech).  However, while the intended audience may be a factor in deciding whether or not there was a sufficient nexus, it may not be enough on its own.  See Emmett v. Kent Sch. Dist. No. 415, 92 F. Supp. 2d 1088, 1090 (W.D. Wash. 2000) (“Although the intended audience was undoubtedly connected to Kentlake High School, the speech was entirely outside of the school’s supervision of control.”).

[104]. Killion v. Franklin Reg’l Sch. Dist., 136 F. Supp. 2d 446, 455 (W.D. Pa. 2001) (“Further, because the Bozzuto list was brought on-campus, albeit by an unknown person, Tinker applies.”); see also Bethlehem, 807 A.2d at 865 (holding that “where speech that is aimed at a specific school and/or its personnel is brought into the school campus or accessed at the school by its originator, the speech will be considered on-campus speech.”).

[105]. Evans, 684 F. Supp. 2d at 1375.  In Blue Mountain, Judge Chagares, in his dissent, points out that one factor in deciding a school’s jurisdictional reach is whether the student made the Internet site private or public.  J.S. ex rel. Snyder v. Blue Mountain Sch. Dist., 593 F.3d 286, 300 (3d Cir. 2010) (J. Chagares, dissenting), vacated, reh’g granted en banc, No. 08-4138, 2010 U.S. App. LEXIS 7342 (3d Cir. Apr. 9, 2010), rev’d en banc, No. 08-4138, 2011 WL 2305973 (3d Cir. June 13, 2011).

[106]. Some courts have looked at both whether it was “foreseeable” that the speech would reach campus and whether there was a “sufficient nexus.”  For example, after considering the many various rulings concerning student off-campus speech, the court in Beverly Hills analyzed both whether the conduct was foreseeable and whether there was a substantial nexus between the speech and the school.  Beverly Hills, 711 F. Supp. 2d at 1108.

[107]. Compare Flaherty v. Keystone Oaks Sch. Dist., 247 F. Supp. 2d 698, 705–06 (W.D. Pa. 2003) (holding school policy constitutionally overbroad where there were no “geographical limitations”), with Layshock, 496 F. Supp. 2d at 605 (upholding constitutionality of school policy over overbroad claim because policy set forth “geographical limitations”).

[108]. See infra Appendix B (setting forth a proposed Model Cyberbullying Policy for Public Schools).

[109]. Hazelwood Sch. Dist. v. Kuhlmeier, 484 U.S. 260, 271 (1988) (allowing the school to delete school newspaper articles discussing teen pregnancy and divorce from school-sponsored newspaper).

[110]. See Watts v. United States, 394 U.S. 705, 707-08 (1969) (holding that a “true threat” is not protected by the First Amendment); see also Wisniewski v. Bd. of Educ., 494 F.3d 34, 38 (2d Cir. 2007) (stating that schools have broader authority over student speech than allowed by the “true threats” standard in Watts).

[111]. Lovell ex rel. Lovell v. Poway Unified Sch. Dist., 90 F.3d 367, 372 (9th Cir. 1996).

[112]. See, e.g., LaVine v. Blaine Sch. Dist., 257 F.3d 981, 989 (9th Cir. 2000) (upholding, under the Tinker standard, the school’s emergency expulsion of a student who showed a teacher a poem, which the student had written while at home, that described the graphic killing of the student’s classmates).

[113]. It could be argued that under Fraser a school might have a third category of speech it can wholly regulate, namely lewd, vulgar, or plainly offensive speech.  In Fraser, a student gave an “elaborate, graphic, and explicit sexual metaphor” in a speech he gave at a school assembly.  Bethel Sch. Dist. No. 403 v. Fraser, 478 U.S. 675, 675 (1986).  The Court held that, as part of a school’s duty to teach “the essential lessons of civil, mature conduct,” the school could discipline the student.  Id. at 683.  In later interpreting Fraser, the Court, however, seems to limit its holding to speech that occurs only on-campus.  See Hazelwood, 484 U.S. at 266–67 (noting that under Fraser “the government could not censor similar speech outside the school”) (emphasis added); J.S. ex rel. Snyder v. Blue Mountain Sch. Dist., No. 08-4138, 2011 WL 2305973, at *12 (3d Cir. June 13, 2011) (en banc) (“Fraser’s ‘lewdness’ standard cannot be extended to justify a school’s punishment of J.S. for use of profane language outside the school, during non-school hours.”); Saxe v. State College Area Sch. Dist., 240 F.3d 200, 213 (3d. Cir. 2001) (“According to Fraser, then, there is no First Amendment Protection for . . . plainly offensive speech in school.”) (emphasis added).

[114]. Tinker v. Des Moines Indep. Cmty. Sch. Dist., 393 U.S. 503, 514 (1969).

[115]. Id. at 509.

[116]. Id. at 513.  Many courts that have analyzed the issue of off-campus student speech have applied the Tinker “material disruption” standard.  See, e.g., J.C. v. Beverly Hills Unified Sch. Dist., 711 F. Supp. 2d 1094, 1110 (C.D. Cal. 2010); Killion v. Franklin Reg’l Sch. Dist., 136 F. Supp. 2d 446, 455 (W.D. Pa. 2001); Beussink ex rel. Beussink v. Woodland R-IV Sch. Dist., 30 F. Supp. 2d 1175, 1178 (E.D. Mo. 1998)Often courts have taken the phrase “in class or out of it,” to mean that Tinker gave schools the right to regulate off-campus speech.  Beverly Hills, 711 F. Supp. 2d at 1103.  Note that the Third Circuit has left open the issue of whether Tinker should apply to off-campus speech at all.  See Blue Mountain, 2011 WL 2305973, at *7 (“The Supreme Court established a basic framework for assessing student free speech claims in Tinker, and we will assume, without deciding, that Tinker applies to J.S.’s speech in this case.”) (emphasis added).  In Blue Mountain, the concurrence observed:

I write separately to address a question that the majority opinion expressly leaves open: whether Tinker applies to off-campus speech in the first place. I would hold that it does not, and that the First Amendment protects students engaging in off-campus speech to the same extent it protects speech by citizens in the community at large.

Id. at *16 (Smith, J., concurring).

However, as set forth in this Part of the Article, except for the concurrence in Blue Mountain, scholars and other courts have collectively assumed, as did the majority in Blue Mountain, that the Tinker standard applies to all public school student speech whether originating on- or off-campus.  In addressing Blue Mountain, and a similar en banc Third Circuit case, Judge Jordan explains:

Our Court today issues en banc decisions in two cases with similar fact patterns. In both the case presently before us and in J.S. v. Blue Mountain School District . . . we are asked whether school administrators can, consistent with the First Amendment, discipline students for speech that occurs off campus. Unlike the fractured decision in J.S., we have reached a united resolution in this case, but there remains an issue of high importance on which we are evidently not agreed and which I note now, lest there be any misperception that it has been resolved by either J.S. or our decision here. The issue is whether the Supreme Court’s decision in [Tinker] can be applicable to off-campus speech. I believe it can, and no ruling coming out today is to the contrary.

Layshock v. Hermitage Sch. Dist., No. 07–4465, 2011 WL 2305970, at *12 (3d Cir. June 13, 2011) (en banc) (Jordan, J., concurring) (footnote omitted).

[117]. Furthermore, schools do not have to wait until the disruption has occurred.  Schools can proactively regulate student speech that “might reasonably [lead] school authorities to forecast substantial disruption of or material interference with school activities.”  Tinker, 393 U.S. at 514.  See, e.g., Saxe, 240 F.3d at 212 (explaining that if students in the past flew a Confederate flag causing material disruption, it would be reasonable for the school to believe there would be a material disruption if the Confederate flag was again displayed).

[118]. See infra Appendix B.

[119]. For example, in both Layshock and Bethlehem the issues revolved around whether a material disruption was caused by a fake MySpace profile of school officials.  Although both cases applied the “material disruption” Tinker standard, they came to opposite holdings.  Compare Layshock, 2011 WL 2305970, at *1, with J.S. ex rel. H.S. v. Bethlehem Area Sch. Dist., 807 A.2d 847, 868 (Pa. 2002).

[120]. See Doninger v. Niehoff, 527 F.3d 41, 50 (2d Cir. 2008) (holding that two administrators were disrupted when called away from scheduled meetings and school activities to deal with the influx of phone calls from the community that were in response to a student’s blog post).  But see Beverly Hills, 711 F. Supp. 2d at 1117 (stating that an administrator who was charged with student discipline was not disrupted from her regular activities when dealing with the consequences of a student video posting on YouTube).

[121]. Killion, 136 F. Supp. 2d at 456 (“We cannot accept, without more, that the childish and boorish antics of a minor could impair the administrators abilities to discipline students and maintain control.”).  See also Blue Mountain, 2011 WL 2305973, at *10 (finding no substantial disruption occurred where “beyond general rumblings” there was only “a few minutes of talking in class, and some officials rearrang[ed] their schedules . . . in dealing with the [fake, vulgar MySpace] profile [of the school principal]”).

[122]. In Emmett, the court reasoned that the suspension of a student who had created a derogatory comment about a teacher was improper in part because the speech did not contain any threats.  Emmett v. Kent Sch. Dist. No. 415, 92 F. Supp. 2d 1088, 1090 (W.D. Wash. 2000).

[123]. Blue Mountain, 2011 WL 2305973, at *10.  In this case, the court noted many cases where courts have held that a forecast of substantial and material disruption was reasonable.  Id.  See, e.g.,  Doninger v. Niehoff, 527 F.3d 41, 50–51 (2d Cir. 2008) (holding that punishment was justified, under Tinker, where a student’s derogatory blog about the school was “purposely designed by [the student]” to “encourage others to contact the administration,” and where the blog contained “at best misleading and at worst false information” that the school “need[ed] to correct”); Lowery v. Euverard, 497 F.3d 584, 596 (6th Cir. 2007) (holding that punishment was justified, under Tinker, where students circulated a petition to fellow football players calling for the ouster of their football coach, causing the school to have to call a team meeting to ensure “team unity,” and where not doing so “would have been a grave disservice to the other players on the team”); LaVine v. Blaine Sch. Dist., 257 F.3d 981, 989–90 (9th Cir. 2000) (holding that the school district did not violate a student’s First Amendment rights when it expelled him on an emergency basis in order to prevent “potential violence on campus” after the student showed a poem entitled “Last Words” to his English teacher, which was “filled with imagery of violent death and suicide” and could “be interpreted as a portent of future violence, of the shooting of  . . .  fellow students”).

[124]. Recent cases show a trend of finding that hurtful speech can cause a material disruption.  For example, in Emmett, the student speech was artistic in nature: the website was created as a satire of the school’s homepage and on it were ironic mock obituaries of the student’s friends.  Emmett, 92 F. Supp. 2d at 1090.  The court, noting that the student speech was much closer to political satire than violent threats, did not allow the school to discipline the student.  Id.  Contrastingly, in Wisniewski, the court noted that the student speech was not a sophisticated satire of school administrators but merely a violent depiction of the death of a teacher on a student’s icon for instant messaging.  Accordingly, the court found that the speech was threatening and violent and posed a real threat of material disruption to the school.  Wisniewski v. Bd. of Educ., 494 F.3d 34, 35–39 (2d Cir. 2007).  These two cases illustrate that courts are more likely to find that a student’s speech is not subject to school discipline if it is political or artistic in nature.  See also Bethlehem, 807 A.2d at 86566 (distinguishing bullying speech with the type of political speech addressed by Tinker).

[125]. Hinduja & Patchin, supra note 2.

[126]. The court in Beverly Hills stated:

[L]ower [c]ourts have not often applied the ‘rights of other’ prong from Tinker . . . the Court is not aware of any authority . . . that extends the Tinker rights of others prong so far as to hold that a school may regulate any speech that may cause some emotional harm to a student.  This Court declines to be the first.

J.C. ex rel. R.C. v. Beverly Hills Unified Sch. Dist., 711 F. Supp. 2d 1094, 1122–23 (C.D. Cal. 2010).  However, the Third Circuit has suggested that the Tinker right-of-others prong could be used to justify a school’s antiharassment policy.  Saxe v. State Coll. Area Sch. Dist., 240 F.3d 200, 217 (3d. Cir. 2001) (noting that while the precise scope of the rights-of-others prong is unclear, it might be applicable to a school’s defense of its policy).  The Eighth Circuit, however, has chosen only to apply the second prong of Tinker in cases where the student conduct could “result in tort liability.”  Bystrom ex rel. Bystrom v. Fridley High Sch., 822 F.2d 747, 752 (8th Cir. 1987).

[127]. See infra Appendix B.

[128]. See, e.g., Layshock v. Hermitage Sch. Dist., 496 F. Supp. 2d 587, 60406 (W.D. Pa. 2006) (cyberbullying case where plaintiff challenged school’s discipline of a student on grounds that the school policy was vague).

[129]. Sypniewski v. Warren Hills Reg’l Bd. of Educ., 307 F.3d 243, 266 (3d Cir. 2002) (internal quotation marks omitted).

[130]. Id. at 266 (citing Reno v. ACLU, 521 U.S. 844, 87172 (1997)).

[131]. Bethel Sch. Dist. No. 403 v. Fraser, 478 U.S. 675, 686 (1986).

[132]. See, e.g., Sypniewski, 307 F.3d at 26165 (finding that the school harassment policy was not overbroad except for the section which allowed for punishing students acting with “ill will,” where the term “ill will” was not defined); Saxe v. State Coll. Area Sch. Dist., 240 F.3d 200, 21517 (3d. Cir. 2001) (finding discipline stemming from school policy unconstitutional because policy’s terms were overbroad and vague); Killion v. Franklin Reg’l Sch. Dist., 136 F. Supp. 2d 446, 458–59 (W.D. Pa. 2001) (holding that because the policy did not contain a definition of “abuse” and because it did not provide further specifications or limitations, it was overbroad).

[133]. See infra Appendix B.

[134]. See Watts v. United States, 394 U.S. 705, 707–08 (1969).

[135]. Tinker v. Des Moines Indep. Cmty. Sch. Dist., 393 U.S. 503, 513 (1969).

[136]. Id. at 509.

[137]. Anti-Bullying/Anti-Harassment Policies, Iowa Dep’t of Educ., http://educateiowa.gov/index.php?option=com_content&view=article&id=1154:anti-bullyinganti-harassment-policies&catid=411:legal-lessons&Itemid=2656 (last visited Aug. 29, 2011).

[138]. Id.

[139]. Id.  Policies enacted in Iowa, Maine, and Vermont, as well as Michigan’s pending policy, have similar language in their model policies.  Maine School Management Association Sample Policy, Me. Dep’t of Educ., http://www.maine.gov/education/management.htm (last visited Aug. 29, 2011); Model Bullying Prevention Plan, Vt. Dep’t of Educ. http://education.vermont.gov/new/pdfdoc/pgm_safeschools/pubs/bullying_prevention_04.pdf (last visited Aug. 29, 2011); Model Anti-Bullying Act, Mich. State Bd. of Educ., http://www.michigan.gov/documents/mde/SBE_Model
_AntiBullying_Policy_Revised_9.8_172355_7.pdf (last visited Aug. 29, 2011).

[140]. Anti-Defamation League, supra note 10, at 1112; Model Policy Against Bullying and Harassment, Fla. Dep’t of Educ., 8 (July 31, 2008), www.fldoe.org/safeschools/doc/modelpolicy.doc.

[141]. Romer v. Evans, 517 U.S. 620, 628 (1996).

[142]. See, e.g., Latest Hate Crime Statistics, FBI (Nov. 22, 2010), http://www.fbi.gov/news/stories/2010/november/hate_112210/hate_112210 (listing statistics for specific groups covered by hate crime laws).

[143]. See, e.g., Safe Schools Improvement Act of 2010, S. 3739, 111th Cong., § 2(g)(1) (2010); Anti-Defamation League, supra note 10, at 11 (setting forth a model bullying statute prohibiting bullying based on enumerated grounds); Model Policy Against Bullying and Harassment, supra note 140, at 2 (stating that school districts may add “additional specific categories of students to which bullying and harassment is prohibited in excess of what is listed” such as sex, race, color, religion, national origin, age, disability, etc.).

[144]. Harris Interactive, From Teasing to Torment: School Climate in America 9 (2005), available at http://www.glsen.org/binary-data/GLSEN
_ATTACHMENTS/file/499-1.pdf.

[145]. For example, the cyberbullying policy can simply state that students are prohibited from cyberbullying other students “including, but not limited to [list enumerated categories].” Anti-Defamation League, supra note 10, at 11 (emphasis added).

[146]. J.C. v. Beverly Hills Unified Sch. Dist., No. CV 08-3824 SVW, at *14 (C.D. Cal. 2009), available at www.lawyersusaonline.com/wp-files/pdfs/jc-v-beverly-hills.pdf (order granting plaintiff’s summary adjudication motion on third cause of action).  In Beverly Hills, a case extensively cited in Part II.A supra, the published portion of the court’s opinion only ruled on the first two causes of action concerning the First Amendment issue and qualified immunity.  J.C. ex rel. R.C. v. Beverly Hills Unified Sch. Dist., 711 F. Supp. 2d 1094, 1097 (C.D. Cal. 2010) (“An order regarding Plaintiff’s due process claim, the Third Cause of Action, will follow shortly.”).  For plaintiff’s third cause of action, that the school cyberbullying policy violated due process, the court wrote a separate, unpublished order.  See J.C. v. Beverly Hills Unified Sch. Dist., No. CV 08-3824 SVW, at *14 (C.D. Cal. 2009), available at www.lawyersusaonline.com/wp
-files/pdfs/jc-v-beverly-hills.pdf
.

[147]. J.C. ex rel. R.C. v. Beverly Hills Unified Sch. Dist., No. CV 08-3824 SVW, at *14 (C.D. Cal. 2009), available at www.lawyersusaonline.com/wp
-files/pdfs/jc-v-beverly-hills.pdf.

[148]. For example, New Hampshire’s bullying prevention statute allows for the school to take action if bullying or cyberbullying “[o]ccurs off of school property or outside of a school-sponsored activity or event, if the conduct interferes with a pupil’s educational opportunities or substantially disrupts the orderly operations of the school or school-sponsored activity or event.”  N.H. Rev. Stat. Ann. § 193-F:4 (2011).  See also Anti-Defamation League, supra note 10, at 13 (adopting similar language).

[149]. Darryn Cathryn Beckstrom, State Legislation Mandating School Cyberbullying Policies and the Potential Threat to Students’ Free Speech Rights, 33 Vt. L. Rev. 283, 315 (2008).

[150]. Model Policy Against Bullying and Harassment, supra note 140, at 8 (also suggesting that posters, signs, or other reminders of the policy be displayed around the school and on the school’s buses).  The Anti-Defamation League maintains that the cyberbullying policy should be broadly publicized throughout the school, and given to the students’ parents via the conduct code, student handbook on school bulletin boards, and on the school website.  See Anti-Defamation League, supra note 10, at 7 (explaining that this “notice will send a message to students, teachers, and parents that the school is taking this issue seriously and does not accept inappropriate conduct”).

[151]. The Anti-Defamation League drafted a model acceptable use policy, adapted from a U.S. Department of Justice model policy.  See Anti-Defamation League, supra note 10, at 2122.  Scholars also suggest that schools display signs or posters in the school’s computer lab, to remind students of the acceptable “use policy.”  Sameer Hinduja & Justin W. Patchin, Preventing Cyberbullying: Top Ten Tips for Educators, Cyberbullying Research Center (2009), www.cyberbullying.us/Top_Ten_Tips_Educators_Cyberbullying_Prevention.pdf (recommending that a “use policy” be drafted in contract form).

[152]. Conn. Gen. Stat. § 10-222d (2010); Del. Code Ann. tit. 14, § 4112D (b)(2)(j) (2011); Fla. Stat. § 1006.147 (2010); Ga. Code Ann. § 20-2-751.4 (2011); Mass. Gen. Laws ch. 71 § 37O(d)(viii) (2011); N.H. Rev. Stat. Ann. § 193-F:4 (2011); N.Y. Educ. Law § 2801-a (McKinney 2009); Ohio Rev. Code Ann. § 3313.666 (West 2011); Tex. Educ. Code Ann. § 37.001(a)(6) (West 2009); Utah Code Ann. 1953 § 53A-11a-301 (West 2011); W. Va. Code Ann. § 18-2C-3 (2011).

[153]. W. Va. Code Ann. § 18-2C-3(b)(5) (2011).

[154]. See, e.g., Sameer Hinduja & Justin W. Patchin, Sexting: A Brief Guide for Educators and Parents, Cyberbullying Research Center, 3 (2010), http://www.cyberbullying.us/Sexting_Fact_Sheet.pdf [hereinafter Sexting].

[155]. Cal. Sch. Bd. Ass’n, Cyberbullying: Policy Considerations for Boards, Governance and Policy Services: Policy Briefs, 5 (July 2007), www.csba.org/Services/Services/PolicyServices/~/media/Files/Services/PolicyServices/SamplePolicies/Cyberbullying.ashx.

[156]. U.S. Const. amend. IV; New Jersey v. T.L.O, 469 U.S. 325, 333 (1985) (holding that the Fourth Amendment’s “prohibition on unreasonable searches and seizures applies to searches conducted by public school officials”).

[157]. See supra Part I.B.  None of the states with model bullying policies address the scope of reasonable searches.  See infra Appendix A.  Indeed, state legislatures are unclear how the Fourth Amendment applies to reported cyberbullying incidents.  For example, in November 2010, a member of the Virginia House of Delegates asked the Attorney General of Virginia to look at the question of whether school officials may search students’ cellular phones and laptops when a student reports another student is violating the school’s bullying policy.  Advisory Op., No 10-105, 2010 WL 4909931, at *2 (Va. Att’y Gen. Nov. 24, 2010) (“[r]ecognizing that no court has considered the matter”).

[158]. New Jersey v. T.L.O., 469 U.S. 325 (1985).

[159]. Id. at 328.

[160]. Id.

[161]. Id.

[162]. Id. at 329.

[163]. Id. at 338.

[164]. Id. at 339.  In determining a balance between the two interests, the Supreme Court stated that “[i]t is evident that the school setting requires some easing of restrictions to which searches by public authorities are ordinarily subject.  The warrant requirement, in particular, is unsuited to the school environment . . . [as it would] unduly interfere with the maintenance of the swift and informal disciplinary procedures needed in the school.”  Id. at 340.

[165]. Id. at 341.

[166]. Id. at 342.  Note that the Court declined to rule on whether “individualized suspicion is an essential element of the reasonableness standard . . . adopt[ed] for searches by school authorities.”  Id. at 342 n.8.

[167]. Id. at 342.  The Court explained that the reasonableness standard saves teachers and administrators from being responsible for understanding the legal definition and “niceties” of probable cause while also ensuring that the students’ right to privacy is not invaded any further than is necessary.  Id. at 343.

[168]. Id. at 347.

[169]. Id. at 34142.

[170]. Klump v. Nazareth Area Sch. Dist., 425 F. Supp. 2d 622, 627 (E.D. Penn. 2006).

[171]. Id. at 630.

[172]. Id.

[173]. Id.

[174]. Id. at 631.

[175]. Id. at 64546.

[176]. Id. at 64041.

[177]. Id. at 640.

[178]. Id.

[179]. J.W. v. Desoto Cnty. Sch. Dist., No. 2:09-cv-00155-MPM-DAS, 2010 WL 4394059, at *1-2 (N.D. Miss. 2010).

[180]. Id. at *1.

[181]. Id.

[182]. Id.

[183]. Id.

[184]. Id. at *2.

[185]. Id. at *4.

[186]. Id.

[187]. Id.

[188]. Id. at *5.

[189]. Id.

[190]. Klump vs. Nazareth Area Sch. Dist. 425 F. Supp. 2d 622, 630 (E.D. Penn. 2006).

[191]. Desoto, 2010 WL 4394059, at *5.

[192]. See, e.g., infra Appendix B.

[193]. Schools may be concerned that a search conducted by a school resource officer, a police officer trained in the Fourth Amendment and employed by the city on assignment to the school, may be governed by a heightened probable-cause standard. However, one court has held that the reasonable suspicion standard that applies to school officials also applies to the school resource officer.  See In re William V, 4 Cal. Rptr. 3d 695, 699 (Cal. Ct. App. 2003).  In William, the court reasoned that the balance of the importance of the educational environment with the privacy interest of the students determined in T.L.O. is the same whether the search is being done by a school official or a school resource officer.  IdBut see Advisory Op., No 10-105, 2010 WL 4909931, at *3 n.15 (Va. Att’y Gen. Nov. 24, 2010) (“It should be noted that, if the search is being conducted by a school security officer, it may be governed by the heightened probable-cause standard.”).

[194]. Klump, 425 F. Supp. 2d at 640.

[195]. In Desoto, the school official was allowed to search a cell phone the student had used while on-campus, whereas in Klump mere possession (not use) of a cell phone, in violation of school rules, would only allow seizure and not a search.  Compare Desoto, 2010 WL 4394059, at *5, with Klump, 425 F. Supp. 2d at 640.

[196]. If the victim or student reporting the bullying is willing, schools should initiate an interview to determine the nature of the bullying, the name of the participants, the location and the manner in which the information is being sent, and the distance that the images or messages have spread.  See Nancy Willard, Educator’s Guide to Cyberbullying, Cyberthreats & Sexting, Ctr. for Safe and Responsible Use of the Internet, 9 (2005), http://www.cyberbully.org/cyberbully/documents/educatorsguide.pdf.  Policies should mandate all evidence be preserved.  Id. at 8.  This requires that any messages received by the victim (cell phone text messages and voicemails) should not be deleted, emails should be saved and printed, and posts should be printed before removal is requested.  Id.  Additionally, any information found through the school district’s investigation should be saved and documented.  Id.  One state’s department of education has endorsed a policy that requires perpetrators, victims, witnesses, teachers, and staff members to be interviewed.  Policy for Prohibiting Bullying, Harassment and Intimidation, Ga. Dep’t of Educ., 6 (Sept. 9, 2010), http://www.toombs.k12.ga.us/system/policies/bullying
_policy.pdf (last updated Mar. 31, 2011).

[197]. New Jersey v. T.L.O, 469 U.S. 325, 341 (1985).

[198]. Id. at 343.

[199]. See, e.g., Sexting, supra note 154, at 3.

[200]. Klump, 425 F. Supp. 2d at 640.

[201]. Sexting, supra note 154, at 1.

[202]. Id.  The study explains:

[T]he National Campaign to Prevent Teen and Unplanned Pregnancy released data from late September and early October of 2008 which identified that 19% of teens (aged 13 to 19) had sent a sexually-suggestive picture or video of themselves to someone via email, cell phone, or through another form of online interaction, while 31% had received a nude or semi-nude picture from someone else.

Id.

[203]. See, e.g., Jan Hoffman, A Girl’s Nude Photo, and Altered Lives, N.Y. Times, Mar. 26, 2011, http://www.nytimes.com/2011/03/27/us/27sexting.html?_r
=1&partner=rss&emc=rss&pagewanted=all (explaining how a middle school girl sent a nude photo of herself to another middle school student, a soon-to-be ex-boyfriend, who then forwarded it to another young girl, who then forwarded the photo to all contacts in her cell phone).  The article explains: “In less than 24 hours, the effect was as if Margarite, 14, had sauntered naked down the hallways of the four middle schools [in her town] . . . .  Hundreds, possibly thousands, of students had received her photo and forwarded it.  Id.

[204]. See, e.g., id.  The county prosecutor decided against charging Margarite, the middle-school girl who had sexted a nude photo of herself to a classmate.  Id.  But the prosecutor did “charge three students with dissemination of child pornography, a Class C felony, because they had set off the viral outbreak” by forwarding the nude photo to others.  IdSee also A.H. v. State, 949 So. 2d 234, 235 (Fla. Ct. App. 2007).  In A.H., a sixteen-year-old girl was criminally prosecuted for sending nude pictures of herself to her seventeen-year-old boyfriend.  Id.  The boy was also criminally charged with producing, directing, and promoting child pornography.  Id.  See also Riva Richmond, Sexting May Place Teens at Legal Risk, N.Y. Times (Mar. 26, 2009, 12:00 PM), http://gadgetwise.blogs.nytimes.com/2009/03/26/sexting‑may‑place‑teens‑at‑legal-risk/.

[205]. See, e.g., 18 U.S.C.A. § 2252A (West 2010) (prohibiting under federal criminal law the distribution of child pornography with no exception for school officials investigating sexting or cyberbullying).

[206]. Sexting, supra note 154, at 3.

[207]. Joe Elias & Daniel Victor, Sequenita High School Officials Being Investigated for Handling of Images in ‘Sexting’ Case, The Patriot News (Apr. 15, 2010), http://www.pennlive.com/midstate/index.ssf/2010/04/susquenita_high
_school_officia.html.

[208]. Am. Civ. Liberties Union of Pa., ACLU of PA Sues School District for Illegally Searching Student’s Cell Phone: School Turned Over Girl’s Private Nude Photos to Law Enforcement (May 20, 2010), http://www.aclupa.org
/pressroom/acluofpasuesschooldistrict.htm.

[209]. Id.

[210]. Id.

[211]. Id.

[212]. Id.

[213]. See, e.g., Beard v. Whitmore Lake Sch. Dist., 402 F. 3d 598, 603 (6th Cir. 2005) (holding students’ constitutional rights were violated after school officials strip searched students to search for stolen money).  The court explained: “Students . . . have a significant privacy interest in their unclothed bodies.”  Id. at 604.

[214]. Sexting, supra note 154, at 3 (“[I]t should be made very clear that administrators and educators should never forward, copy, transmit, download . . . or show any non-law enforcement personnel any evidence collected from [a] personal digital device . . . after the initial discovery . . . at any other time during the investigation.”).

[215]. See infra Appendix B.

[216]. See, e.g., Anti-Defamation League, supra note 10, at 4-7.  Although this is a model statute for state legislatures to enact, instead of a cyberbullying policy for schools to adopt, this model statute gives guidance because it suggests that school bullying policies should address reporting, remedies, and education.  Id.

[217]. See supra Parts II.A–C.

[218]. See supra Part II.B.

[219]. See, e.g., N.J. Stat. Ann. § 18A:37-15(b)(5) (West 2011) (requiring schools to have a bullying policy with “a procedure for reporting an act of harassment, intimidation or bullying”).

[220]. See Anti-Defamation League, supra note 10, at 14, § B(3)(b)(ii); Lisa Madigan, Cyberbullying: A Student Perspective, 8 http://www.illinoisattorneygeneral.gov/children/cyberbullying_focus_report0610.pdf  (last visited Aug. 29, 2011); Susan P. Limber & Marlene Snyder, What Works—and Doesn’t Work—in Bullying Prevention and Intervention, The State Educ. Standard 24, 27 (July 2006), http://www.yaleruddcenter.org/resources
/upload/docs/what/bias/NASBEbullyingarticle.pdf.

[221]. Dianne L. Hoff & Sidney N. Mitchell, Cyberbullying: Causes, Effects, and Remedies, 47 J. Educ. Admin. 652, 663 (2009).

[222]. Madigan, supra note 220, at 9.

[223]. See, e.g., N.J. Stat. Ann. § 18A:37-15(b)(5) (West 2011) (allowing “a person to report an act of harassment, intimidation or bullying anonymously”).

[224]. See id. (prohibiting “formal disciplinary action solely on the basis of an anonymous report”).

[225]. As set forth in Part II.C, a school official must have “reasonable grounds” based on a specific fact inquiry before conducting a search of a student’s personal property.  New Jersey v. T.L.O, 469 U.S. 325, 342 (1985).  It is doubtful that anonymous reports alone would satisfy this requirement since school officials would be unable to determine the credibility of the reports.

[226]. See, e.g., Utah Code Ann. § 53A-11a-301(2)(e) (West 2011) (requiring schools to have “procedures for promptly reporting to law enforcement all acts of bullying, hazing, or retaliation that constitute criminal activity”); see also Cyberbullying: Policy Considerations for Boards, supra note 155, at 5 (“[California school] responses might include . . . contacting law enforcement if the behavior involves [a possible crime].  The student perpetrator and his or her parents should be informed of the potential consequences to which they may be subjected, including potential civil law liabilities.”).

[227]. See, e.g., Megan Meir Cyberbullying Prevention Act, H.R. 1966, 111th Cong. (2009) (proposing that “whoever . . . use[s] electronic means to support severe, repeated, and hostile behavior, shall be fined under this title or imprisoned not more than two years, or both); S.B. 2094, S. 25th Leg., Reg. Sess. (Haw. 2010) (“If any child of school age engages in bullying or cyberbullying, the child, and the father, mother, or legal guardian, shall be fined not more than $100 for each separate offense.”); Jared’s Law, H.B. 750, 58th Leg., Reg. Sess. (Idaho 2006) (“A student who personally violates any provision of this section shall be guilty of an infraction.”).

[228]. Cyberbullying: Policy Considerations for Boards, supra note 155, at 5 (“Existing school rules pertaining to student discipline may be used in the event that a student is found to have engaged in cyberbullying, or the district may decide that other actions are needed on a case-by-case basis.”).

[229]. See, e.g., Ga. Code Ann. § 20-2-751.5(d) (2011) (“[I]t is preferable to reassign disruptive students to alternative educational settings rather than to suspend or expel such students from school.”).

[230]. See, e.g., Kan. Stat. Ann. 72-8205(e)(1) (2011) (“The board may transact all school district business and adopt policies that the board deems appropriate to perform its constitutional duty to maintain, develop and operate local public schools.”).

[231]. Wisniewski ex rel. Wisniewski v. Bd. of Educ., 494 F.3d 34, 40 (2d Cir. 2007) (citing Wood v. Strickland, 420 U.S. 308, 326 (1975)) (recognizing that it is not the place of federal courts to set aside school administrators’ decisions on such matters as the extent of a student’s punishment, but not directly ruling on whether the extent of the punishment was constitutional).  But see Doninger v. Niehoff, 527 F.3d 41, 53 (2d Cir. 2008) (suggesting that if the student’s punishment had been more extreme than prohibiting her participation in student council, that punishment may have been in violation of her constitutional rights).

[232]. See, e.g., O.Z. ex rel. v. Bd. of Trs. of the Long Beach Unified Sch. Dist., 2008 U.S. Dist. LEXIS 110409, at *17 (C.D. Cal. Sept. 9, 2008) (holding that a school has an interest in being able to transfer a student who has shown violent tendencies toward a teacher).

[233]. Wisniewski, 494 F.3d at 40 (alteration in original) (quoting Strickland, 420 U.S. at 326).

[234]. RI Task Force Takes on Cyberbullying, Sexting, Boston Globe (Mar. 15, 2011), http://www.boston.com/news/local/rhode_island/articles/2011/03/15/ri
_task_force_readies_new_policy_for_cyberbullying/ (“One proposal from the task force would create a statewide education policy on cyberbullying for schools . . . A single, statewide policy would help teachers know what to do when they hear a student is being bullied . . . .”).

[235]. Lorraine Adams & Dale Russakoff, Dissecting Columbine’s Cult of the Athlete, Washington Post, June 12, 1999, http://www.washingtonpost.com/wp
-srv/national/daily/june99/columbine12.htm (explaining schools should not give the appearance that popular student athletes receive special treatment because of their abilities or social status).

[236]. See, e.g., Doninger, 527 F.3d at 54; J.S. ex rel. H.S. v. Bethlehem Area Sch. Dist., 807 A.2d 847, 868 (Pa. 2002); O.Z., 2008 U.S. Dist. LEXIS 110409, at *13; Cyberbullying: Policy Considerations for Boards, supra note 155, at 5 (authorizing the suspension or expulsion of a student who engages in harassment or bullying by electronic means).

[237]. See Todd D. Erb, Comment, A Case for Strengthening School District Jurisdiction to Punish Off-Campus Incidents of Cyberbullying, 40 Ariz. St. L.J. 257, 275 (2008).

[238]. See, e.g., N.J. Stat. Ann. § 18A:37-15(b)(9) (West 2011) (allowing for “consequences and appropriate remedial action for a person found to have falsely accused another as a means of retaliation or as a means of harassment, intimidation or bullying”); Model Policy Against Bullying and Harassment, supra note 140, at 1 (explaining that a school policy against bullying and harassment should include a statement that “bullying” and “harassment” include “[r]etaliation against a student or school employee by another student or school employee for asserting or alleging an act of bullying or harassment” and also that “[r]eporting an act of bullying or harassment that is not made in good faith is considered retaliation”).

[239]. See Model Policy Against Bullying and Harassment, supra note 140, at 2–3; see also Limber & Snyder, supra note 220, at 24, 27 (explaining how one antibullying program recommends that schools adopt four straight-forward rules about bullying: “we will not bully others; we will try to help students who are bullied; we will make it a point to include students who are easily left out; if we know someone is being bullied, we will tell an adult at school and an adult at home”).

[240]. Limber & Snyder, supra note 220, at 27.

[241]. See, e.g., Fla. Stat. § 1006.147 (4)(j) (2008) (requiring school bullying policies provide “a procedure to refer victims and perpetrators of bullying or harassment for counseling”); Cyberbullying: Policy Considerations for Boards, supra note 155, at 5 (“[T]he district should consider ways it can provide support to the victim through counseling or referral to mental health services.”).

[242]. See, e.g., Santa Barbara School Districts Board Policy, 4, http://www.sbsdk12.org/board/policies/5000/BP5131.pdf (last updated Dec. 14, 2010) (“If the [cyberbully] is using a social networking site or service that has terms of use that prohibit posting of harmful material, the Superintendent or designee also may file a complaint with the Internet site or service to have the material removed.”).

[243]. Model Policy Against Bullying and Harassment, supra note 140, at 8.

[244]. Fla. Stat. § 1006.147(4)(l) (2010) (requiring “a procedure for providing instruction to students, parents, teachers, school administrators, counseling staff, and school volunteers on identifying, preventing, and responding to bullying or harassment”).

[245]. The Model Cyberbullying Policy in Appendix B of this Article gives an example of an educational program.  Like Florida, Illinois also requires schools to implement antibullying training.  105 Ill. Comp. Stat. 5/27-13.3 (2010).  Although Illinois does not provide a model cyberbullying policy, the Illinois Attorney General’s Office has prepared a webinar and training modules to give some guidance to schools.  The educational material includes statistics, anecdotes, and discussion of cyberbullying and sexting.  The training modules are modified to be grade-appropriate for elementary school, middle school, and high school.  See Office of the Ill. Att’y Gen., Attorney General’s Internet Safety Training Modules (2010), www.isbe.state.il.us/curriculum/ppt/internet_safety
_webinar.ppt
(last visited Sept. 20, 2011).

[246]. Hoff & Mitchell, supra note 221, at 663 (setting forth a study that students reported incidents of cyberbullying occurring when they were as young as ten years old and up through their high-school years).

[247]. Willard, supra note 196, at 7.  See also Hinduja & Patchin, supra note 151, at 1 (stating that certain cyberbullying behaviors are encompassed in existing criminal legislation, such as: harassment, stalking, felonious assault, certain acts of hate or bias).

[248]. Hoff & Mitchell, supra note 221, at 663; see also Limber & Snyder, supra note 220, at 27 (stating that students should be taught to be good citizens, rather than passive bystanders, when they witness bullying).

[249]. Willard, supra note 196, at 6.

[250]. Hoff & Mitchell, supra note 221, at 663 (explaining that student input would be valuable because “they are the group who understands this phenomenon best”).  See also Madigan, supra note 220, at 8 (explaining how students suggested peer-to-peer mentoring and mediation programs).

[251]. Md. Code Ann., Educ. § 7-424.1(g)(1) (West 2010) (requiring schools to develop an antibullying educational program for “staff, volunteers, and parents”).

[252]. See Model Policy Against Bullying and Harassment, supra note 140, at 4; Hoff & Mitchell, supra note 221, at 663.

[253]. Madigan, supra note 220, at 8.

[254]. See id.; Anti-Defamation League, supra note 10, at 15.

[255]. See Model Policy Against Bullying and Harassment, supra note 140, at 8.

[256]. Willard, supra note 196, at 10.

[257]. Also referred to as the Student Harassment Prevention Act.

[258]. Ala. Code § 16-28B-6 (2011).

[259]. Id. § 16-28B-3 (defining harassment as not limited to, written electronic, verbal or physical acts).

[260]. Alaska Stat. § 14.33.200(a) (2011).

[261]. Sample Issues and Areas to Consider When Developing Local Policies for Harassment, Intimidation, and Bullying, Alaska Dep’t. of Educ. and Early Dev., http://eed.state.ak.us/tls/SchoolSafety/Docs/Sample_Issues_and_Areas.pdf (last visited Sept. 20, 2011).

[262]. Ariz. Rev. Stat. Ann. § 15-341(37) (2011).

[263]. Ark. Code Ann. § 6-18-514 (a)(2) (2010).

[264]. Id. § 6-18-514 (a)(3)(B) (defining “Electronic Act”).

[265]. Cal. Educ. Code § 32282(a)(1)(E) (West 2011).

[266]. Id. § 32261(d) (bullying includes acts committed personally or by means of an electronic act).

[267]. Sample Policy for Bullying Prevention, Cal. Dep’t of Educ., (2010), available at http://www.cde.ca.gov/ls/ss/se/samplepolicy.asp.

[268]. Colo. Rev. Stat. Ann § 22-32-109.1(2)(a) (West 2010).

[269]. Colorado Association of School Boards Sample Policy on Bullying Prevention and Education, Ctr. for the Study and Prevention of Violence, (2001), http://www.colorado.edu/cspv/safeschools/bullying_casbpolicy.html.

[270]. Conn. Gen. Stat. § 10-222d (2010).

[271]. Id. § 10-222d(7) (2010) (requiring each school to notify parents or guardians of both the students who commit any verified acts of bullying and the students against whom such acts were directed).

[272]. The District of Columbia is considering a proposed bill that would require schools to implement antibullying policies, including bullying using “electronic communications.”  The bill also proposes that a model policy be developed.  Council of D.C., Bullying Prevention Act of 2010, B18-0770 (D.C. 2010) available at http://www.dccouncil.washington.dc.us/images/00001
/20100506090826.pdf.

[273]. Id.

[274]. Id.

[275]. Del. Code Ann. tit. 14, § 4112D(b)(1) (2011).

[276]. Id. 14 § 4112D(a) (bullying includes electronic acts).

[277]. Delaware’s Model Bully Prevention Policy, Del. Dep’t of Educ., http://www.doe.k12.de.us/infosuites/students_family/climate/files/Bully%20Prevention%20Policy%20Template.pdf (last visited Sept. 19, 2011).

[278]. Del. Code Ann. tit. 14, § 4112D(b)(2)(j) (2011) (requiring notification of a parent, guardian, relative caregivers, or legal guardian of any target of bullying or person who bullies another).

[279]. Fla. Stat. § 1006.147(2) (2010).

[280]. Id. § 1006.147(3)(b) (defining harassment to include use of data or computer software).

[281]. Model Policy Against Bullying and Harassment, supra note 140.

[282]. Fla. Stat. § 1006.147(4)(i) (2010) (requiring a procedure for immediate notification to the parents of a victim and the parents of the perpetrator of an act).

[283]. Ga. Code Ann. § 20-2-751.4(b)(1) (2011).

[284]. Id. § 20-2-751.4(a) (stating that bullying includes use of data or software that is accessed through a computer, computer system, computer network or other electronic technology of local school system).

[285]. Id. § 20-2-751.4(b)(3) (requiring that a method be developed “to notify the parent, guardian, or other person who has control or charge of a student upon a finding . . . that such student has committed an offense of bullying or is a victim of bullying”).

[286]. But see Haw. Rev. Stat. Ann. § 302A-1002 (2009) (requiring schools to report crime-related incidents, but no mention of bullying or cyberbullying).

[287]. S.B. 2094, 25th Leg., Reg. Sess. (Haw. 2010).

[288]. Idaho Code Ann. § 33-512(6) (2011).

[289]. Id. § 18-917A(2)(b) (“[H]arassment . . . may also be committed through use of a land line, care phone, or wireless telephone, or through the use of data or computer software that is accessed through a computer, computer system or computer network.”).

[290]. 105 Ill. Comp. Stat. 5/27-23.7(d) (2010).

[291]. Id. at 5/27-23.7(b).

[292]. Ind. Code § 20-33-8-12(1) (2011).

[293]. Iowa  Code § 280.28 (3) (2011).

[294]. Id. § 280.28 (2)(a) (2011).

[295]. Anti-Bullying/Anti-Harassment Policies, supra note 137.

[296]. Kan. Stat. Ann. § 72-8256(b) (2009).

[297]. Kan. Stat. Ann. § 72-8256(a)(1)(B) (2009).

[298]. Ky. Rev. Stat. Ann. § 158.148(1) (West 2011).

[299]. La. Rev. Stat. Ann § 17:416.13(B)(1) (2011).

[300]. Id. § 17:416.13(C)(2) (defining “cyberbullying”).

[301]. Me. Rev. Stat. Ann. tit. 20, § 1001(15)(H) (2010).

[302]. Maine School Management Association Sample Policy, supra note 139.

[303]. Md. Code Ann., Educ. § 7-424.1(c)(1) (West 2010).

[304]. Id. § 7-424.1(a)(2) (stating that bullying, harassment or intimidation includes an intentional electronic communication).

[305]. Mass. Gen. Laws ch. 71 § 37O(c) (2011).

[306]. Id. § 37O(a).

[307]. Id. § 37O(d)(viii) (setting forth procedures for notifying parents or guardians of a victim and perpetrator).

[308]. Matt’s Safe School Law, supra note 66.

[309]. Model Anti-Bullying Act, supra note 139.  While this policy is not mandated by law, it was developed by the Michigan Department of Education based on the antibullying bills pending in the Michigan state legislature.  See Matt’s Safe School Law, supra note 66.

[310]. Minn. Stat. § 121A.0695 (2010).

[311]. Id.

[312]. Miss. Code. Ann. § 37-11-67(2) (2010).

[313]. Id. § 37-11-67(1).

[314]. Mo. Rev. Stat. § 160.775(1) (2011).

[315]. Id. § 160.775(2).

[316]. Neb. Rev. Stat. §§ 79-2, 137(3) (2010).

[317]. Id. § 79-2, 137(2).

[318]. Considerations for Policy Development, Neb. Dep’t of Educ., http://www.education.ne.gov/safety/Bullying_Prevention/Bullying_Prevention_Policy_Dev.html (last visited Sept. 20, 2011).

[319]. Nev. Rev. Stat. § 388.133 (2010).

[320]. Id. at § 388.123.

[321]. N.H. Rev. Stat. Ann. § 193-F:4(II) (2011).

[322]. Id. §§ 193-F:3(II), (III).

[323]. Id. § 193-F:4(II)(h) (describing a procedure for notification within forty-eight hours of the reported incident to both the parents or guardian of victim and the parents or guardian of the perpetrator of bullying or cyberbullying).

[324]. N.J. Stat. Ann. § 18A:37-15(a) (West 2011).

[325]. Id. § 18A:37-14 (defining electronic communication).

[326]. Model Policy and Guidance for Prohibiting Harassment, Intimidation and Bullying on School Property, at School-Sponsored Functions and on School Buses, State of N.J. Dep’t of Educ., http://www.state.nj.us/education/parents
/bully.pdf (last updated Apr. 2011).

[327]. N.M. Code R. § 6.12.7.8(B) (LexisNexis 2010).

[328]. Id. § 6.12.7.7(A).

[329]. N.Y. Educ. Law § 2801-a(1) (McKinney 2000) (requiring school safety plan).

[330]. Id. § 2801-a(2)(e) (requiring policies for contacting parents, guardians and persons in parental relation to students in the event of a violent incident).

[331]. N.C. Gen. Stat. § 115C-407.16 (2010).

[332]. Id. § 115C-407.15(a) (defining bullying to include electronic communication).

[333]. Ohio Rev. Code Ann. § 3313.666(B) (West 2011).

[334]. Anti-Harassment, Anti-Intimidation or Anti-Bullying Model Policy, Ohio Dep’t of Educ. Adm’r, http://education.ohio.gov/GD/Templates/Pages/ODE
/ODEDetail.aspx?Page=3&TopicRelationID=435&Content=106473 (last modified June 3, 2011).

[335]. Ohio Rev. Code Ann. § 3313.666(B)(5) (West 2011) (requiring parents or guardians of any student involved in incident be notified and have access to any written reports pertaining to the incident).

[336]. Okla. Stat. tit.70, § 24-100.4(A) (2011).

[337]. Id. (prohibiting bullying by electronic communication specifically).

[338]. Safe Schools Guide, Okla. Dep’t of Educ., 75 (2005), http://www.sde.state.ok.us/Schools/SafeHealthy/pdf/SafeSchlGuide.pdf.

[339]. Or. Rev. Stat. § 339.356(1) (2010).

[340]. Id. § 339.351(1) (defining cyberbullying).

[341]. 24 Pa. Cons. Stat. § 13-1303.1-A(a) (2010).

[342]. Id. § 13-1303.1-A(e) (stating that bullying includes intentional electronic acts).

[343]. R.I. Gen. Laws § 16-21-26(b) (2011).

[344]. Id. § 16-21-26(a)(3) (defining electronic communications).

[345]. Guidance on Developing Required Policies Against Bullying, http://www.ride.ri.gov/psi/docs/child_family/substance/bullying%20guidance%20and%20modelpolicy%2011-21-03.pdf (last visited Sept. 16, 2011).

[346]. S.C. Code Ann. § 59-63-140(A) (2010).

[347]. Id. § 59-63-120(1) (stating that harassment, intimidation, and bullying includes electronic communication).

[348]. South Carolina—Self Control Addressing Bullying in Our Schools: A Bullying Prevention Model, S.C Dep’t of Educ. 31–36, http://www.itv.scetv.org
/guides/sc2v2.pdf (last visited Sept. 24, 2011).

[349]. Tenn. Code Ann. § 49-6-1016(a) (2011).

[350]. Tex. Educ. Code Ann. § 37.001(a) (West 2009).

[351]. Id. § 37.001(a)(6).

[352]. Utah Code Ann. § 53A-11a-301(1) (West 2011).

[353]. Id. § 53A-11a-301(3)(j).

[354]. Vt. Stat. Ann. tit. 16, § 565 (2011).

[355]. Model Bullying Prevention Plan, supra note 139.

[356]. Va. Code Ann. § 22.1-279.6(A) (2011).

[357]. Id. (explaining that model policies should address the use of electronic means for purposes of bullying, harassment, and intimidation).

[358]. Wash. Rev. Code § 28A.300.285(1) (2010).

[359]. Id.at § 28A.300.285(2).

[360]. Prohibition of Harassment, Intimidation and Bullying, State of Wash. Office of Superintendent of Pub. Instruction (Apr. 2008), http://www.k12.wa.us/SafetyCenter/Guidance/pubdocs/Anti‑BullyingPolicyFinal.pdf.

[361]. W. Va. Code Ann. § 18-2C-3(a) (West 2011).

[362]. Student Code of Conduct, W. Va. Dep’t of Educ. (July 1, 2003), http://wvde.state.wv.us/policies/p4373.html.

[363]. W. Va. Code Ann. § 18-2C-3 (b)(5) (West 2011).

[364]. Wis. Stat. § 118.46(1)(a) (2010).

[365]. Bullying Prevention Policy Guidelines, Dep’t of Pub. Instruction (Mar. 2007), http://www.dpi.state.wi.us/sspw/pdf/bullyingguide.pdf.

[366]. Wyo. Stat. Ann. § 21-4-314(a) (2011).

[367]. Id. § 21-4-312.

[368]. Safe School Improvement Act of 2010, S. 3739, 111th Cong. (2010) (allowing for federal funding for schools that have bullying prevention programs).  See also Megan Meir Cyberbullying Prevention Act, H.R. 1966, 111th Cong. (2010).

[369]. Megan Meir Cyberbullying Prevention Act, H.R. 1966, 111th Cong. (2010).

[370]. This Model Cyberbullying Policy is limited only to cyberbullying.  In addition to cyberbullying, schools should adopt policies that are inclusive of off-line bullying and harassment (both of which are beyond the scope of this Article).  This Policy is based on Part III of this Article and also the pending Safe Schools Improvement Act of 2010, the “Florida Department of Education Model Policy Against Bullying and Harassment,” and the Anti-Defamation League “Model Statute.”  See Safe School Improvement Act of 2010, S. 3739, 111th Cong. (2010); Model Policy Against Bullying and Harassment, supra note 140; Anti-Defamation League, supra note 10.

[371]. See supra Part II.A(2) of this Article.

[372]. See supra Parts II.A(2)-B(1) of this Article.

[373]. See supra Parts II.A(2)-B(1) of this Article.

[374]. See supra Parts II.A(2)-B(1) of this Article.

[375]. See supra Part II.B(1) of this Article.

[376]. See supra Part II.B(1) of this Article.

[377]. See supra Part II.A(1) of this Article.

[378]. See supra Part II.A of this Article.

[379]. See supra Part II.B(2) of this Article.

[380]. The Anti-Defamation League drafted a model acceptable use policy, adapted from a U.S. Department of Justice model policy.  Anti-Defamation League, supra note 10, at 21.

[381]. See supra Part II.B(2) of this Article.

[382]. See supra Part II.C(1) of this Article.

[383]. See supra Part II.C(1) of this Article.

[384]. See supra Part II.C(1) of this Article.

[385]. See supra Part II.C(1) of this Article.

[386]. See supra Part II.C(2) of this Article.

[387]. See supra Part III(A) of this Article.

[388]. See supra Part III(B) of this Article.

[389]. See supra Part III(C) of this Article.

Article in PDF Form