
Because “Just Block Them” is not a safety plan.
In 2026, high school bullying in Aotearoa has moved beyond the playground. It is now a 24/7 digital web of Social Entrapment. Between AI-generated deepfakes, “ghost” location tracking, and group chat isolation, our teens are navigating a world their school counselors aren’t always equipped to fix.
At Staying Safe and Sane, we believe the most effective protector is an informed parent. We don’t just offer vague advice; we provide the Safe Harbor Manual—a forensic-grade, trauma-informed “Battle Plan” that empowers you to audit your teen’s digital world, find the leaks, and reclaim their peace of mind.
The Safe Harbor Manual: Your 5-Phase Audit
This isn’t just a book; it’s a step-by-step technical workshop for your kitchen table. Our process is designed to be collaborative. You work with your teen to turn their device from a tracking tool into a Safe Harbor.ng tool into a “Safe Harbor.”
| Phase | Your Action | The Outcome |
| 1. The Footprint Map | Evict “ghost” logins on old school iPads or shared computers. | Total Sovereignty: You know exactly who is “watching.” |
| 2. Location Hardening | Neutralize GPS leaks in Snapchat, “Find My,” and photo metadata. | Physical Privacy: No more “bus stop” ambushes. |
| 3. Social Filtering | Shrink the bully’s line of sight using “Restrict” and “Family Pairing.” | Digital Silence: Breaking the cycle of hyper-vigilance. |
| 4. The Evidence Vault | Build a “court-ready” portfolio (timestamps/Handle logs). | Legal Leverage: A solid case for Netsafe or Police. |
| 5. Autonomy Handover | Set up the “Safety Passport” and “Emergency Bypass.” | Restored Trust: Empowerment for them, sleep for you. |
Beyond the Screen: From Technical Audit to Total Advocacy
Securing a phone stops the immediate “leak,” but it doesn’t stop the social pressure at the school gate.
The Safe Harbor Manual is uniquely integrated. It doesn’t just show you which buttons to slide; it shows you how to use that data to hold the system accountable.
- Evidence Meets Strategy: The data you uncover in Phase 4 (The Evidence Vault) is formatted to fit our Section 127 “Duty of Care” Checklist. We turn screenshots into legal leverage for your meetings with the Principal.
- The Power Script Library: We provide the exact words to say when a school claims they “can’t intervene” in off-campus bullying.
- Forensic Trails for ACC: If you are pursuing an ACC Mental Injury claim, our manual provides the documentation structure required by NZ authorities to prove a “timeline of harm.”
Get the Manual. Get the Map. Get Sanity.
Stop feeling “out of the loop.” Our manual ensures you never walk into a school meeting or a police station without a forensic trail.
Includes the 5-Phase Audit, The Advocacy Roadmap, and the Full Appendix of Legal Templates.
Need More Support?
If the situation is high-conflict or involves criminal harassment, we offer a 15-minute Confidential Discovery Call. We can discuss a Practitioner-Led Audit where we facilitate the 5-Phase process with you and your teen personally.
For the Parents: Regaining “Sanity”
Watching your child suffer is exhausting. We provide you with the systemic map to support them effectively within the New Zealand environment:
- The Legal Framework: Understanding a school’s “Duty of Care” under NZ Education law.
- Specialist Pathways: Guidance on accessing ACC Sensitive Claims for mental injury caused by severe bullying.
- The Harmful Digital Communications Act: A plain-English guide to your legal options in NZ.
The “Next Step” Link
A Note from our Founder “At Staying Safe and Sane, our services are culturally safe and inclusive of all whānau. As a mother who has navigated the complexities of bullying with my own sons and daughter, I know the ‘powerlessness’ that parents feel. I founded this service to ensure no other family has to walk that path without a map. We combine lived experience with professional expertise to protect what matters most: our children.”
[FREE DOWNLOAD] The 5-Minute Digital Privacy Checklist for NZ Parents
A “Sane” guide to securing your teen’s digital world in 2026.
When bullying or harassment moves online, your teen’s phone can feel like a tracking device. Use this checklist to immediately “harden” their privacy and stop the digital trail.
1. The “Ghost” Device Audit
Bullies or ex-partners often stay logged into accounts on old devices.
- [ ] Google/Gmail: Go to Manage your Google Account > Security > Your Devices. Sign out of anything you don’t recognize or no longer use.
- [ ] iCloud/Apple ID: Go to Settings > [Name] > Scroll down to the device list. Remove any old iPads, MacBooks, or phones.
- [ ] Meta (Instagram/FB): Go to Accounts Center > Password and Security > Where you’re logged in.
2. Neutralizing “Live” Tracking
In 2026, real-time location is the #1 tool for physical harassment.
- [ ] Snapchat “Ghost Mode”: Open Snap Maps > Settings > Enable Ghost Mode.
- [ ] Photo Metadata: On iPhone/Android, go to Settings > Privacy > Location Services > Camera. Set to “Never” or “Ask Next Time” to stop GPS coordinates from being attached to photos they send.
- [ ] Find My Sharing: Check Find My (Apple) or Google Location Sharing. Ensure they aren’t accidentally sharing their live move-to-move location with a “friend” who might be compromised.
3. Evidence Preservation (Don’t just delete!)
To use the Harmful Digital Communications Act (HDCA), you need proof.
- [ ] Capture the “Full Story”: Don’t just crop the text. Take a full-screen shot that shows the Date, Time, and Username.
- [ ] URL Logging: If the abuse is on a website or public profile, copy the full URL (e.g.,
www.instagram.com/user_name). - [ ] The “Vault”: Create a hidden, password-protected folder on a computer (not the phone) to save these files so they aren’t accidentally deleted in a moment of distress.
4. The “Safe Harbor” Communication Settings
- [ ] Emergency Bypass: Go to Contacts > Parent/Safe Adult > Edit > Ringtone. Turn on Emergency Bypass. This ensures your teen can always hear your call, even if their phone is on “Silent” to avoid bullies.
- [ ] Silence Unknown Callers: In Phone Settings, toggle this ON to filter out no-caller-ID harassment.
Next Steps for Your Whānau
If you’ve ticked these boxes and the harassment is still continuing, it’s time for a professional Digital Autonomy Audit.
We help you navigate the Netsafe reporting process, identify “Deepfake” digital harm, and build a case for school intervention under the Education and Training Act 2020.
