What is technological abuse?

Untitled design (1)

Technological abuse can come in the form of...

  • Sending abusive texts, emails or messages via social media
  • Making continuous controlling or threatening phone calls
  • Making someone prove where they are by sending photos of their location
  • Checking someones text messages, social media activity or internet activity
  • Forbidding someone from having a phone or limiting who they can contact via phone or internet
  • Spying on, monitoring or stalking someone through any type of surveillance device (such as a tracking system or spyware)
  • Sharing intimate photos of someone without their consent (sometimes called revenge porn) (safesteps.org)

statistics

"Abusers in intimate partner violence misuse technology in many ways: to stalk and monitor victims, to harass victims through the “anonymity” of the technology, and to impersonate victims through technology, such as creating false social media accounts. The survey found that 79 percent of programs reported that abusers monitor survivors’ social media accounts, 74 percent report that abusers check victims by text messages, and 71 percent report that abusers scrutinize survivors’ computer activities" (techsafety.org)

Abusive+Online+Content
Text+Messaging+Harassment
Tech+Abuse+Stat

resources

EndTab

Provides trainings to college campuses, parents, youth, communitites and conferences to empower others to address and prevent the way people are harmed online and via their devices.

Operation Safe Escape

Make sure that every person impacted by domestic violence has the resources, information, and confidence that they need to leave their abuser and stay safe once they do.