Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Technology-enabled abuse is when someone uses technology to bully, harass, stalk, intimidate or gain control over others. Preventing this kind of abuse starts with the ability to recognize it.

Nothing is too small to report if it makes you feel uncomfortable.

Table of Contents

Bullying and harassment

This form of abuse can include threatening messages or insulting or humiliating posts, including unflattering photos or videos shared without your consent.

Coercion

Asking or pressuring you to send explicit photos and videos, or sexual and compromising messages, is an abusive and controlling act. So is sending you similar, unwanted content.

Intimidation

Abuse is about power and control. Abusers may steal or demand your account passwords, tell you who you can and can’t friend/follow on social media, or look through the photos, videos, texts, and calls on your phone.

Monitoring and stalking

Spyware is software, including apps or devices, that enable an abuser to secretly monitor or record another person’s activity. Spyware enables remote monitoring to facilitate surveillance, harassment, abuse, stalking, and/or violence.

...

Using the GPS enabled in a car, phone, other technology (e.g., smart home devices, airtags, video-monitoring doorbells), or social media apps (e.g., “Find My,” Snapchat) are among the common tools that abusers use to track your movements and monitor your activities.

Trolling

This is when someone posts or comments as a way to deliberately “bait” a response and provoke an argument or emotional reaction.

Examples of trolling is commenting on Instagram posts or subtweeting to incite a response or to get others to join in on the attack. This behavior is harassment even if the comment is not made on your post and even if you are not tagged in the post or tweet.

Catfishing/Doxing

Catfishing is when someone creates a fake online identity using another person’s images and information. This may be done to lure someone into a false relationship or to victimize an unknowing target (e.g., using someone’s images from Instagram to make a dating profile).

Doxing is when someone isolates or embarrasses a victim. Abusers may create fake social media profiles with a victim’s name and image or use their phone or email to impersonate and reveal private information.

Examples of catfishing and doxing is using your pictures to create a fake dating profile. This behavior is harassment whether or not the perpetrator intended to victimize you or whether they chose your pictures at random.

  • Posting sexual images (real or fake)

  • Online impersonation

  • Use of hidden cameras

  • Sending too many, unwanted, or threatening messages

  • Hacking into accounts

Examples

  • Posting images: I.

  • Unwanted or repeated messages: If someone messages you even after you ask them to stop, it is harassment. If you block someone and they contact you through another person or through another form of technology, it is harassment.

  • f someone posts your pictures without consent or photoshops pictures of you that make you uncomfortable, you may be suffering from technology-based abuse

...