ARTICLE
14 December 2019

Cyber or online abuse during and after separation, and other helpful tips

S
Swaab

Contributor

Swaab, established in 1981 in Sydney, Australia, is a law firm that focuses on solving problems and maximizing opportunities for various clients, including entrepreneurs, family businesses, corporations, and high-net-worth individuals. The firm's core values include commitment, integrity, excellence, generosity of spirit, unity, and innovation. Swaab's lawyers have diverse expertise and prioritize building long-term client relationships based on service and empathy.
eSafety Women will help women manage technology risks and abuse by giving them tools they need to be confident online.
Australia Family and Matrimonial
To print this article, all you need is to be registered or login on Mondaq.com.

Technology facilitated violence and abuse is a serious issue. When people separate it is not uncommon for a disgruntled spouse to turn to social media such as Facebook to vent their unhappiness. But when does the use of social media in this manner become something more?

In this publication, we discuss Cyber Abuse and provide helpful tips for collecting and storing evidence safely.

What is Cyber Abuse?

A helpful definition of 'Cyber abuse' can be found on the eSafety Commissioners website. Cyber abuse is defined as 'online behaviour which is reasonably likely to have a seriously threatening, intimidating, harassing or humiliating effect on a person. It is behaviour that threatens to hurt a person socially, psychologically or even physically.'

Cyber abuse can occur through a range of platforms including social media (such as Facebook, Instagram, Twitter), games or other online forums to make:

  • abusive, degrading or hateful comments about a person;
  • threats of physical or sexual violence to a person; or
  • repeated or unwanted sexual requests to a person.

Behaviours that may also constitute abuse include:

  • Sharing, or threatening to share, intimate or sexual photos or videos of a person online without their consent.
  • Encouraging vulnerable people to self harm.
  • Stalking a person online-regularly checking a person's social media activity such as Facebook, Instagram etc.
  • Hacking into a person's email or social media account to impersonate them.
  • Creating fake social media accounts. For example, creating a Facebook account in another person's name using someone else's picture. Many people know this as "catfishing".
  • Spreading lies or malicious rumours about a person.
  • Threating violence or inciting others to do the same.
  • Repeatedly making unwanted contact with a person by calling, emailing, texting, messaging, or sending obscene material.
  • Monitoring another person's movements using GPS, tracking apps or spyware.
  • Always seek legal advice first (if you can). Your lawyer is the best person to tell you what evidence may be required in your case.
  • Take screen shots of abusive posts, texts or emails. If you don't know how to do this ask somebody you trust to show you.
  • Save or copy voice mail messages. You can do this by recording the message on a separate device or a Dictaphone. Make sure that your abuser can't find the device containing the recording.
  • Keep a copy of all emails, letters and faxes sent to you.
  • Save your evidence somewhere the abuser can't find it. A good idea is to save your evidence on two USBs. You keep one and secretly give the other to a friend. If your abuser finds your USB, you have not lost your evidence.

Proving online abuse

While there are laws that can help with this, without evidence it will be difficult to prove to Police and the Courts that this is happening.

There are a number of ways you can collect evidence of cyber abuse however you must only do so if it is safe to.

Here are some helpful tips when collecting evidence:

  • Always seek legal advice first (if you can). Your lawyer is the best person to tell you what evidence may be required in your case.
  • Take screen shots of abusive posts, texts or emails. If you don't know how to do this ask somebody you trust to show you.
  • Save or copy voice mail messages. You can do this by recording the message on a separate device or a Dictaphone. Make sure that your abuser can't find the device containing the recording.
  • Keep a copy of all emails, letters and faxes sent to you.
  • Save your evidence somewhere the abuser can't find it. A good idea is to save your evidence on two USBs. You keep one and secretly give the other to a friend. If your abuser finds your USB, you have not lost your evidence.

About eSafety Women

eSafety Women is an initiative of the Office of the Children's eSafety Commissioner which forms part of the Australian Government's Women's Safety Package to Stop the Violence. It aims to help women manage technology risks and abuse by giving women the tools they need to be confident when online.

The eSafety website is packed full of helpful resources to assist women stay connected safely.

For further information please contact:

Monique Loveday, Senior Associate
Phone: +61 2 9777 8347
Email: mxl@swaab.com.au

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

ARTICLE
14 December 2019

Cyber or online abuse during and after separation, and other helpful tips

Australia Family and Matrimonial

Contributor

Swaab, established in 1981 in Sydney, Australia, is a law firm that focuses on solving problems and maximizing opportunities for various clients, including entrepreneurs, family businesses, corporations, and high-net-worth individuals. The firm's core values include commitment, integrity, excellence, generosity of spirit, unity, and innovation. Swaab's lawyers have diverse expertise and prioritize building long-term client relationships based on service and empathy.
See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More