capital punishment good or bad essay great writing 4 great essays little red pill for erectile dysfunction https://samponline.org/blacklives/essay-written-in-urdu/27/ female viagra canadian https://awakenedhospitality.com/buy/is-there-a-generic-form-of-nexium/30/ go site originele viagra kopen entrance essay medical school tubastatin and nexium https://mainejournal.umaine.edu/wp-content/uploads/index.php?generic=sent-viagra-ad-my-email bactrim prophylaxis patient information viagra ideal student essay in sanskrit solutions for homelessness essays free essays on the things they carried original viagra 0.25mg should abortions be legal essay essay about effects of stress example common app transfer essay endometriosis and provera prednisone non prescription why cant i import kamagra to canada drugs and surgery used to fight obesity essay go here get link viagra aus indien erfahrungen essay postmodernism art source site comprar cialis generico pago paypal "Technology-facilitated abuse is a form of controlling behaviour that involves the use of technology as a means to coerce, stalk or harass another person" (safesteps.org. In this day and age of technological advancements, technological abuse is becoming more prevelant and commonplace than ever. Please take advantage of our statistics and technology support tools below.
What is technological abuse?

Technological abuse can come in the form of...
- Sending abusive texts, emails or messages via social media
- Making continuous controlling or threatening phone calls
- Making someone prove where they are by sending photos of their location
- Checking someones text messages, social media activity or internet activity
- Forbidding someone from having a phone or limiting who they can contact via phone or internet
- Spying on, monitoring or stalking someone through any type of surveillance device (such as a tracking system or spyware)
- Sharing intimate photos of someone without their consent (sometimes called revenge porn) (safesteps.org)
statistics
"Abusers in intimate partner violence misuse technology in many ways: to stalk and monitor victims, to harass victims through the “anonymity” of the technology, and to impersonate victims through technology, such as creating false social media accounts. The survey found that 79 percent of programs reported that abusers monitor survivors’ social media accounts, 74 percent report that abusers check victims by text messages, and 71 percent report that abusers scrutinize survivors’ computer activities" (techsafety.org)



resources
Provides trainings to college campuses, parents, youth, communitites and conferences to empower others to address and prevent the way people are harmed online and via their devices.
Make sure that every person impacted by domestic violence has the resources, information, and confidence that they need to leave their abuser and stay safe once they do.