Tech­nol­o­gy facil­i­tat­ed vio­lence and abuse is a seri­ous issue. When peo­ple sep­a­rate it is not uncom­mon for a dis­grun­tled spouse to turn to social media such as Face­book to vent their unhap­pi­ness. But when does the use of social media in this man­ner become some­thing more?

In this pub­li­ca­tion, we dis­cuss Cyber Abuse and pro­vide help­ful tips for col­lect­ing and stor­ing evi­dence safely. 

What is Cyber Abuse?

A help­ful def­i­n­i­tion of Cyber abuse’ can be found on the eSafe­ty Com­mis­sion­ers web­site. Cyber abuse is defined as online behav­iour which is rea­son­ably like­ly to have a seri­ous­ly threat­en­ing, intim­i­dat­ing, harass­ing or humil­i­at­ing effect on a per­son. It is behav­iour that threat­ens to hurt a per­son social­ly, psy­cho­log­i­cal­ly or even physically.’

Cyber abuse can occur through a range of plat­forms includ­ing social media (such as Face­book, Insta­gram, Twit­ter), games or oth­er online forums to make:

  • abu­sive, degrad­ing or hate­ful com­ments about a person;
  • threats of phys­i­cal or sex­u­al vio­lence to a per­son; or
  • repeat­ed or unwant­ed sex­u­al requests to a person.

Behav­iours that may also con­sti­tute abuse include:

  • Shar­ing, or threat­en­ing to share, inti­mate or sex­u­al pho­tos or videos of a per­son online with­out their consent.
  • Encour­ag­ing vul­ner­a­ble peo­ple to self harm.
  • Stalk­ing a per­son online — reg­u­lar­ly check­ing a per­son­’s social media activ­i­ty such as Face­book, Insta­gram etc.
  • Hack­ing into a person’s email or social media account to imper­son­ate them.
  • Cre­at­ing fake social media accounts. For exam­ple, cre­at­ing a Face­book account in anoth­er person’s name using some­one else’s pic­ture. Many peo­ple know this as cat­fish­ing”.
  • Spread­ing lies or mali­cious rumours about a person.
  • Threat­ing vio­lence or incit­ing oth­ers to do the same.
  • Repeat­ed­ly mak­ing unwant­ed con­tact with a per­son by call­ing, email­ing, tex­ting, mes­sag­ing, or send­ing obscene material.
  • Mon­i­tor­ing anoth­er person’s move­ments using GPS, track­ing apps or spyware.

Prov­ing online abuse

While there are laws that can help with this, with­out evi­dence it will be dif­fi­cult to prove to Police and the Courts that this is happening.

There are a num­ber of ways you can col­lect evi­dence of cyber abuse how­ev­er you must only do so if it is safe to.

Here are some help­ful tips when col­lect­ing evidence:

  • Always seek legal advice first (if you can). Your lawyer is the best per­son to tell you what evi­dence may be required in your case.
  • Take screen shots of abu­sive posts, texts or emails. If you don’t know how to do this ask some­body you trust to show you.
  • Save or copy voice mail mes­sages. You can do this by record­ing the mes­sage on a sep­a­rate device or a Dic­ta­phone. Make sure that your abuser can’t find the device con­tain­ing the recording.
  • Keep a copy of all emails, let­ters and fax­es sent to you.
  • Save your evi­dence some­where the abuser can’t find it. A good idea is to save your evi­dence on two USBs. You keep one and secret­ly give the oth­er to a friend. If your abuser finds your USB, you have not lost your evidence.

About eSafe­ty Women

eSafe­ty Women is an ini­tia­tive of the Office of the Children’s eSafe­ty Com­mis­sion­er which forms part of the Aus­tralian Government’s Women’s Safe­ty Pack­age to Stop the Vio­lence. It aims to help women man­age tech­nol­o­gy risks and abuse by giv­ing women the tools they need to be con­fi­dent when online.

The eSafe­ty web­site is packed full of help­ful resources to assist women stay con­nect­ed safely.

Need Help?

If you feel as though you are being sub­ject to, or at risk of tech­nol­o­gy facil­i­tat­ed vio­lence or abuse, please con­tact our Fam­i­ly Lawyers today.

If you would like to repub­lish this arti­cle, it is gen­er­al­ly approved, but pri­or to doing so please con­tact the Mar­ket­ing team at marketing@​swaab.​com.​au. This arti­cle is not legal advice and the views and com­ments are of a gen­er­al nature only. This arti­cle is not to be relied upon in sub­sti­tu­tion for detailed legal advice.

Publications

Copy­right and Gen­er­a­tive AI: what Aus­tralia can learn from the Meta and Anthrop­ic Rulings

In 2025, two U.S. court deci­sions, Kadrey v. Meta and Bartz v. Anthrop­ic, have pro­vid­ed the first real judi­cial answers…

Fed­er­al Court Deci­sion Lim­its Effec­tive Use of Set-Off in Con­trac­tu­al Annu­al Salary Arrangements

The Deci­sionIn a recent Fed­er­al Court deci­sion*, Jus­tice Per­ram held that while con­trac­tu­al set-off claus­es in an annu­al salary arrange­ment can…

Pro­tect­ing your tomor­row, today: The impor­tance of an endur­ing pow­er of attorney

We often talk about the impor­tance of draft­ing your estate plan­ning doc­u­ments, includ­ing how draft­ing your will can ensure your…

In the News

Sarah Heuv­el pro­vides insight into get­ting Rent Roll Trans­ac­tions Com­pli­ance Compliant

Sarah Heuv­el in an inter­view with Matthew Cial­lel­la of MC Broking & Advi­so­ry, dis­cuss rent roll trans­ac­tions and the three key…

Michael Byrnes appeared on Mon­ey News with Evan Lucas on 2GB on 8 Sep­tem­ber 2025 to dis­cuss the recent Fed­er­al Court deci­sion relat­ing to salary arrange­ments, set-off claus­es and award compliance

Michael Byrnes appeared on Mon­ey News with Evan Lucas on 2GB on 8 Sep­tem­ber 2025 to dis­cuss the recent Fed­er­al Court…

Michael Byrnes has pub­lished an arti­cle titled Use of AI Crit­i­cised by FWC” in HR Leader on 2 Sep­tem­ber 2025.

Michael Byrnes has pub­lished an arti­cle titled ​“Use of AI Crit­i­cised by FWC” in HR Leader on 2 Sep­tem­ber 2025.To read the…

Sign up for our Newsletter

*Mandatory information