Tech­nol­o­gy facil­i­tat­ed vio­lence and abuse is a seri­ous issue. When peo­ple sep­a­rate it is not uncom­mon for a dis­grun­tled spouse to turn to social media such as Face­book to vent their unhap­pi­ness. But when does the use of social media in this man­ner become some­thing more?

In this pub­li­ca­tion, we dis­cuss Cyber Abuse and pro­vide help­ful tips for col­lect­ing and stor­ing evi­dence safely. 

What is Cyber Abuse?

A help­ful def­i­n­i­tion of Cyber abuse’ can be found on the eSafe­ty Com­mis­sion­ers web­site. Cyber abuse is defined as online behav­iour which is rea­son­ably like­ly to have a seri­ous­ly threat­en­ing, intim­i­dat­ing, harass­ing or humil­i­at­ing effect on a per­son. It is behav­iour that threat­ens to hurt a per­son social­ly, psy­cho­log­i­cal­ly or even physically.’

Cyber abuse can occur through a range of plat­forms includ­ing social media (such as Face­book, Insta­gram, Twit­ter), games or oth­er online forums to make:

  • abu­sive, degrad­ing or hate­ful com­ments about a person;
  • threats of phys­i­cal or sex­u­al vio­lence to a per­son; or
  • repeat­ed or unwant­ed sex­u­al requests to a person.

Behav­iours that may also con­sti­tute abuse include:

  • Shar­ing, or threat­en­ing to share, inti­mate or sex­u­al pho­tos or videos of a per­son online with­out their consent.
  • Encour­ag­ing vul­ner­a­ble peo­ple to self harm.
  • Stalk­ing a per­son online — reg­u­lar­ly check­ing a per­son­’s social media activ­i­ty such as Face­book, Insta­gram etc.
  • Hack­ing into a person’s email or social media account to imper­son­ate them.
  • Cre­at­ing fake social media accounts. For exam­ple, cre­at­ing a Face­book account in anoth­er person’s name using some­one else’s pic­ture. Many peo­ple know this as cat­fish­ing”.
  • Spread­ing lies or mali­cious rumours about a person.
  • Threat­ing vio­lence or incit­ing oth­ers to do the same.
  • Repeat­ed­ly mak­ing unwant­ed con­tact with a per­son by call­ing, email­ing, tex­ting, mes­sag­ing, or send­ing obscene material.
  • Mon­i­tor­ing anoth­er person’s move­ments using GPS, track­ing apps or spyware.

Prov­ing online abuse

While there are laws that can help with this, with­out evi­dence it will be dif­fi­cult to prove to Police and the Courts that this is happening.

There are a num­ber of ways you can col­lect evi­dence of cyber abuse how­ev­er you must only do so if it is safe to.

Here are some help­ful tips when col­lect­ing evidence:

  • Always seek legal advice first (if you can). Your lawyer is the best per­son to tell you what evi­dence may be required in your case.
  • Take screen shots of abu­sive posts, texts or emails. If you don’t know how to do this ask some­body you trust to show you.
  • Save or copy voice mail mes­sages. You can do this by record­ing the mes­sage on a sep­a­rate device or a Dic­ta­phone. Make sure that your abuser can’t find the device con­tain­ing the recording.
  • Keep a copy of all emails, let­ters and fax­es sent to you.
  • Save your evi­dence some­where the abuser can’t find it. A good idea is to save your evi­dence on two USBs. You keep one and secret­ly give the oth­er to a friend. If your abuser finds your USB, you have not lost your evidence.

About eSafe­ty Women

eSafe­ty Women is an ini­tia­tive of the Office of the Children’s eSafe­ty Com­mis­sion­er which forms part of the Aus­tralian Government’s Women’s Safe­ty Pack­age to Stop the Vio­lence. It aims to help women man­age tech­nol­o­gy risks and abuse by giv­ing women the tools they need to be con­fi­dent when online.

The eSafe­ty web­site is packed full of help­ful resources to assist women stay con­nect­ed safely.

Need Help?

If you feel as though you are being sub­ject to, or at risk of tech­nol­o­gy facil­i­tat­ed vio­lence or abuse, please con­tact our Fam­i­ly Lawyers today.

If you would like to repub­lish this arti­cle, it is gen­er­al­ly approved, but pri­or to doing so please con­tact the Mar­ket­ing team at marketing@​swaab.​com.​au. This arti­cle is not legal advice and the views and com­ments are of a gen­er­al nature only. This arti­cle is not to be relied upon in sub­sti­tu­tion for detailed legal advice.

Publications

The Employ­ment Real­i­ty of TV Fame (2025 Edition)

Real­i­ty tele­vi­sion shows thrive on intrigue and dra­ma. A key com­po­nent of suc­cess­ful real­i­ty TV shows is the con­tes­tant view­ers love…

Aus­tralia Day Sub­sti­tu­tion: The Legal Issues (2025 Edition)

It has been report­ed that some of the largest employ­ers in Aus­tralia, includ­ing Tel­stra, Com­mon­wealth Bank and Aus­tralian­Su­per, are giv­ing…

Valid­i­ty, void­abil­i­ty and unen­force­abil­i­ty in con­tract law

If you have entered into a con­tract, you or the oth­er par­ty have draft­ed with­out legal assis­tance, you should con­sid­er some…

In the News

Hap­py 2025 Lunar New Year

The Snake sym­bol­is­es wis­dom, intu­ition, and trans­for­ma­tion. It’s a time for strate­gic think­ing, embrac­ing change, and achiev­ing per­son­al growth. May this…

Pro­tect­ed Indus­tri­al Action and the NSW Rail dis­pute before the FWC, Michael Byrnes appeared on Sum­mer Break­fast with John Stan­ley on 2GB on 24 December

Michale Byrnes appeared on Sum­mer Break­fast with John Stan­ley on 2GB on 24 Decem­ber 2024 to dis­cuss pro­tect­ed indus­tri­al action…

Hol­i­day Office Clo­sure — 2024

The Swaab office will be unat­tend­ed over the hol­i­day and new year peri­od from mid­day Tues­day 24 Decem­ber 2024 re-open­ing…

Sign up for our Newsletter

*Mandatory information