WomensLaw serves and supports all survivors.

About Abuse

Abuse Using Technology

View by section

Abuse Using Technology

Ways Survivors Use and Abusers Misuse Technology

Abuse Involving Connected Devices

What are connected devices and how are they used?

“Connected devices,” also known as smart devices, are physical objects that can connect with other systems via the internet or a data network. This lets you control them remotely through apps or a web browser. They may be programmed to turn on and off at certain pre-set times or they may be voice-controlled to complete activities on command. Some examples of connected devices include:

  • location tracker accessories, such as AirTags and Tiles;
  • smart speakers, such as the Amazon Echo;
  • connected cars;
  • thermostats;
  • smart electrical outlets with lights or other devices plugged into them;
  • entertainment systems, such as a stereo, TV, etc.;
  • security cameras and motion detectors;
  • smoke detectors;
  • video doorbells;
  • smart locks;
  • smart appliances, such as a refrigerator, vacuum, etc.;
  • “nanny cameras;”
  • pet feeders, pet cameras, pet toys, and pet trackers; and
  • smart toys.

You can use connected devices to help you in your daily life to do things like:

  • control devices in your home remotely, such as the television, air conditioning, heating system, or the alarm system;
  • install a security camera feature at your home that you can monitor remotely;
  • use devices that allow you to control your car’s GPS device, locking mechanism, sound system, or allow you to start your car remotely; or
  • use fitness watches to connect to a network to monitor your own movement and goals.

How might an abuser misuse connected devices?

An abuser could misuse connected devices, also known as smart devices, to monitor, harass, isolate, or otherwise harm you.  An abuser could hack into these systems with a device connected to the network in order to control your devices or access your personal information. An abuser who uses your tech to track your actions may do so secretly or out in the open as a way to control your behavior by:

  • taking pictures or video of you;
  • keeping logs of your activity like those from a fitness tracker or your car’s GPS. These could reveal if you left the home to seek court protection, for example;
  • eavesdropping on you; and
  • gaining access to your email or other accounts linked to the smart devices.

An abuser could specifically misuse connected devices that you use to control your home by:

  • turning lights and appliances on or off in your home;
  • adjusting the temperature to uncomfortable levels;
  • playing unwanted music or adjusting the volume;
  • triggering home invasion and smoke alarms; and
  • locking or unlocking doors.

Abusers can misuse features of connected cars, too, by controlling features remotely, such as heated seats, emergency braking, or remote steering technology. If an abuser with access to these features figures out how to control the speed or brakes of your car, this could put you in serious danger.

Note: Without access to your passwords, gaining control over your smart devices may require more tech savvy than most people have. However, other information could be easier for a non-tech-savvy abuser to access. When devices are connected through a data network or the internet, for example, an abuser may be able to log into that system to get information about how those devices were used. This information could include when you come and go from your home or where you drive your car.

What effects could an abuser’s misuse of tech have on a victim of abuse?

The misuse of technology described in How might an abuser misuse connected devices? can affect each individual victim differently. Some common effects of this sort of abusive behavior are that it could make you feel uncomfortable, scared, helpless, confused, or unstable.

An abuser could misuse this tech specifically to isolate you from others by threatening visitors and blocking physical access. For example, an abuser could remotely control the smart locks on your home to limit your ability to leave or return when you want to. A video doorbell could be used to monitor who comes to the door or harass your visitors remotely. In combination with a smart lock, a video doorbell could be used to prevent people from entering your home.

What laws protect me from abuse using connected devices?

Laws that apply to electronic surveillance could apply if the abuser is using connected devices to watch (surveil) you or otherwise abuse you. 

If the abuser is…

These laws may apply…

  • Accessing devices on your network to listen to your conversations…
  • Watching or recording you through your devices…
  • Accessing your devices as part of a pattern of actions to cause you distress or fear…

What can I do to protect my safety if I use connected devices?

For safer use of connected devices, it can be helpful to know:

  • exactly how your devices connect to one another;
  • what information is available remotely; and
  • what security and privacy features exist for your tech.

With this information, if a device begins operating in a way that you know you are not controlling, you may want to disconnect that device or remove it from the network. If you do not know how, try reading the device’s manual or speaking to tech support. NNEDV’s Safety Net Project’s Survivor Toolkit has resources that could help.

If you think a device is being misused, you can begin to document the incidents. A technology abuse log is one way to do this. These logs can be helpful in showing patterns and deciding next steps. They could be useful in building a legal case if you decide to pursue one.

In terms of protecting your physical safety, each survivor’s situation and risks are different. There isn’t one “right” way to protect yourself. If an abusive person is monitoring your devices and accounts, making changes to them may alert the abuser to the fact that you discovered this unauthorized access. In some situations, it could even erase evidence of the unauthorized access. Prioritize safety and trust your instincts.

It can help to make a safety plan with a domestic violence advocate. If you are already working with an advocate who does not have specialized knowledge of tech misuse, the advocate can ask for help from NNEDV’s Safety Net Project.

Abuse Involving Texts, Photos, and Videos (non-consensual dissemination of intimate images/"revenge porn")

Abuse Involving Sexting

What is “sexting?”

Sexting refers to sending and receiving sexually explicit text messages, photos, or videos, mainly through a mobile device. These can be sent as a regular text message or through a mobile texting app.  

Once a “sext” is sent, the image is out of your control. The person you send it to could share it with other people or post it to the internet without your consent. But remember, if someone shares your intimate images without your consent, is not your fault.

In many states, sharing an intimate image is illegal and you can report it to the police. You can learn more about this on our Abuse Involving Nude/Sexual Images page.

Is sexting against the law?

Sexting between consenting adults may not violate any laws. But many state laws that deal with sexting are different if a minor is involved. The laws will usually make it clear that sending sexually explicit images to a minor or keeping sexually explicit images of a minor that were sent by someone else is illegal.

If you are a minor, it may be against the law for anyone to send, keep, or share sexually explicit photos or videos of you. However, you should know that in some states, a minor who sends his/her own intimate image may even be violating the state’s child pornography laws or other related laws. You can find a list of states that have criminal sexting laws on cyberbullying.org.

You may not want to share sexual or explicit images with someone unless you have 100% trust that s/he will not send them to others.  You should never be pressured or forced into sending personal images. Threatening or forcing you to do so may be illegal and there may be people who can help. You can discuss your options with a local victim service provider, attorney, or law enforcement officer. The Cyber Civil Rights Initiative has a confidential hotline where you can get more information.

What are some ways an abuser could use sexting?

Sexting can be consensual. It is not itself a sign of abuse. However, an abuser could use photos, videos, or messages shared through sexting to maintain power and control over you. For example, the abuser may later threaten to share these images or may actually share them with others. To learn more about laws on these topics, see our Abuse Involving Nude/Sexual Images page.  If an abuser is threatening to post your images, there are tools that may be able to help you. StopNCII is a tool for adults and Take It Down is a tool for minors.

An abuser could also blackmail you once s/he gains access to images and messages shared through sexting. S/he may pressure or threaten you to continue to send photos, videos, or messages even if you do not want to. For more information on this type of blackmail, go to What is “sextortion”?

An abuser could also harass you by sexting after you asked him/her to stop. Sending unwanted sexual photos or videos is sometimes called “cyber flashing.” You may have legal options if someone is harassing you in this way. These could include reporting crimes to the police, filing for a restraining order, or suing the abuser.

Abuse Involving Nude/Sexual Images

Definitions and basic information

How can an abuser use images to harass and harm me?

An abuser could use nude or sexual images of you as a way to gain and keep power and control over you. S/he may do this by:

  • sharing intimate images that you sent;
  • taking photos or videos of you without your consent; or
  • threatening to share images as a way to scare, harass, control, or blackmail you.

These actions can be part of a pattern of domestic abuse and there are laws that may address this type of behavior. You may choose to report it to the police to see if it qualifies as a crime in your state, file for a restraining order, or even sue the abuser in civil court for money damages.

What is nonconsensual image sharing? Is it the same as “revenge porn”?

Nonconsensual intimate image sharing, abbreviated NCII, is sometimes referred to as nonconsensual dissemination of images, nonconsensual pornography, or by the slang phrase “revenge porn.”  All of these terms describe the sharing or distribution of sexual, intimate, nude, or semi-nude photos or videos of someone without his/her permission. Note: Most advocacy groups stay away from using the phrase “revenge porn” because it suggests that a scorned partner’s motivation is to “get back” at the victim. However, this may likely not be the actual motivation. An abuser may share or threaten to share images in order to:

  • gain power and control over the victim;
  • harass the victim;
  • cause the victim distress, humiliation, and shame;
  • cause the victim to lose a job or not be able to get a job; or
  • influence an ongoing court case. For example, the abuser may think that posting such images would tarnish the victim in the eyes of a judge who is deciding an ongoing custody case between the victim and the abuser.

NCII can involve images that were originally shared with consent. It can also include images obtained without consent or and even without the victim’s knowledge through the use of cell phone cameras, hidden cameras, or hacking of devices.

What is a “deepfake”?

A synthetic media image, also called a deepfake, is a type of picture or video that is created using artificial intelligence (AI) tools. They are meant to look like real images and often the viewer cannot tell that the image is fake. Not all deepfakes are sexual but an abuser could misuse AI to create sexual or intimate images. For instance, the abuser can take a photo of you in clothing and use an app to turn it into a fake nude picture of you. This sort of deepfake image could be shared on the internet or in other ways; to the viewers, it looks like a real nude image.

Not many state laws specifically address this sort of synthetic media images. But it’s possible that other laws that deal with the following crimes might apply:

  • harassment;
  • stalking;
  • unlawful dissemination of intimate images;
  • unlawful disclosure of private images; or
  • computer crimes.

You can look for the laws in your state on our Crimes page by entering your state in the drop-down menu. You can also check for your state’s laws on the Cyber Civil Rights Institute map of synthetic media laws.

What is “sextortion”?

“Sextortion” is when someone threatens to share sexual or intimate materials unless you do what the person tells you to do. It is a type of blackmail or extortion. The person may ask for money, sexual favors, more sexual images, or something else. Just like with other types of image abuse, sextortion can involve images that were taken with or without your permission. You may have previously shared the images with the person or s/he may have gotten them through someone else or through hacking.

Sextortion can also be used as a tactic to get money from someone who is not known to the victim. For example, someone may contact you over the internet falsely claiming to have sexual images of you and threatening to share or post them unless you pay a certain amount of money or send additional images. In those cases, the person is usually contacting many people with the same threat, hoping that some victims will be frightened enough to do what the scammer demands.

You can learn more about sextortion from the Cyber Civil Rights Initiative.

What is cyber flashing?

Cyber flashing is when someone sends you an unwanted naked or sexual photo or video on the internet, through an app, or by text message. Most often, this takes the form of someone sending an unwanted picture of his/her genitals or exposing one’s genitals over live video. Cyber flashing can be done by someone you know or by a stranger. It can happen in lots of different situations - for example:

  • on dating apps or websites;
  • on social media;
  • over text, WhatsApp, or other messaging apps;
  • during a video call;
  • over email; or
  • through Airdrop or another app that allows someone to share files with people close by.1

Cyber flashing can be considered a form of online harassment and sexual harassment. In some cases, it may be part of a pattern of abuse designed to cause you emotional distress. A few states have specific laws that make it a crime or specifically state that it can be the reason to sue the abuser in civil court for money damages.

1 Information adapted from Rape Crisis England and Wales

Where can I get help if I am the victim of abuse involving sexual or intimate images?

A lawyer may be able to help you figure out what laws apply to your situation. You can find legal resources on our Finding a Lawyer page by selecting your state from the drop-down menu. Or you can talk to a local domestic or sexual violence program or law enforcement. They can give you information on your options and the applicable laws.

You may also be able to find help through one of the resources listed on our National Organizations - Posting Nude/Sexual Images Without Consent/“Revenge Porn” page.

When images are threatened to be posted online or are actually posted

How can I find websites where my image is posted online?

You might know or suspect that the abuser has posted an intimate image of you online, yet you don’t know where. Or you may know of one website where the image was posted, but it is also possible that the abuser posted it in other places that you do not know about. To try to get an image taken down, it will be important to figure out all of the websites where the abuser may have posted the image. One way to search for a specific image posted online is to use a reverse image search on search engines, such as:

  • Google;
  • Bing;
  • TinEyes;
  • Yandex; and
  • KarmaDecay - for Reddit.

If you are not sure how to do a reverse image search, try searching “[Search engine name] image search.” Here are some additional tips:

If you are on a computer:

  • Find the website where your image appears, right-click on the image and select Copy image URL.
  • On images.google.com or any image results page, click the camera icon in the search bar. You can use a different search engine, such as Bing, if you prefer. Most search engines allow this.
  • Paste the URL into the search box.

If you are on a phone, you can use the Chrome app on an Android phone, iPhone, or iPad:

  • Using the Chrome app, find the website where your image appears.
  • Press and hold the image. In the box that appears, touch Search Google for this image. You might need to touch the image once to enlarge it on certain devices.
  • If you prefer, you can use a different browser app. In that case you may have to use the same process as if you were on a computer.

It will be important to document all of the places where the image appears in case this is needed for reporting it to the police or the courts. You can take a screenshot of the results and then go to each website and take a screenshot of each one.

This whole process can be stressful and upsetting, especially if you find your image in multiple places. You may want to ask a trusted friend to help you through it and even seek professional emotional support from an advocate or therapist.

How can I get my images removed if the abuser posted them online?

Once you have identified all of the places where the intimate image of you has been posted, you will want to look for each website’s take-down policy. Most take-down policies can be found in the “terms of service” language on the website. There may even be specific instructions for you to follow regarding how to make a request to have your image removed from the website. If there aren’t any instructions or a take-down policy, you can read NNEDV’s Safety Net Project’s guide called Removing Sensitive Content from the Internet.

Note: As of 2023, Google will also remove sexual images that were shared without consent from its search results. This does not remove them from the websites, however. It makes it so that a Google search cannot find them. You can find Google’s request form here.

In addition, if you took the image yourself –in other words, if you were the photographer– there might be a way to use copyright law to get it removed. Generally, the person who takes a photo automatically owns its copyright. However, even if the abuser took the photo or video and the copyright belongs to him/her, the person who is featured in the photo or video may also be able to apply for the copyright to that image. If someone owns the copyright to an image and another person posts the image publicly without the copyright owner’s consent, it’s possible to file what is called a “takedown notice” based on the Digital Millennium Copyright Act of 1998. The notice would be sent to the relevant websites and search engines with the request to remove the image. You can read more about this strategy in a 2016 New Yorker magazine article. However, this strategy would be very difficult to do on one’s own without the help of a lawyer. You may want to look for an attorney on our Finding a Lawyer page.  You can also get help by contacting the Cyber Civil Rights Initiative.

How can I prevent the abuser from posting my images on Facebook, Instagram, and other apps?

The StopNCII tool lets you create a “hash” of an image. A hash is a “digital fingerprint” created with a mathematical process. The tool lets you share the hashes of your images with many different app companies. This way you do not have to share the actual images. The app companies and StopNCII will look for posts of images with the same hashes so they can help detect and remove the images from being shared online.

StopNCII is for people who are 18 or older in the images. If you are under 18, you can use the similar TakeItDown tool.

The Cyber Civil Rights Initiative (CCRI) may provide you with other help too.

If the abuser already posted the image, go to How can I get my images removed if the abuser posted them online? for information on how to remove the images.

Criminal and civil options

Is it a crime for someone to take or record intimate video or images of me without my knowledge or consent?

Taking nude or semi-nude videos or photographs of you without you consent is usually a criminal act if the images are taken in a place where you can reasonably expect to have privacy.  For example, if someone places a hidden camera in your bathroom or bedroom and captures you, this is almost always illegal. Now, let’s say you are on a nude beach or you are doing sexual acts in a public park, it may not be illegal to take photos or videos because you likely cannot expect to have privacy in  these types of public places. The specific laws in your state will say what is legal and what is illegal. 

In some states, the laws about sharing intimate images may also specifically address taking images without consent, making that a more serious crime, for example. Or there might be another crime that covers this behavior, such as violation of privacyinvasion of privacy, voyeurism, or unlawful surveillance.  You can look for the actual crimes in your state on our Crimes page by entering your state in the drop-down menu.

If someone shares my intimate images, is that a crime? What is the crime commonly called?

Many states have laws about sharing sexual or intimate images. These laws generally prohibit anyone from taking or distributing intimate photos or videos without the consent of the person shown. They may also prohibit threatening to do so. Distributing an image could happen by posting it on a website or app. It could also include other sharing, like sending it to others over text message or email, or printing out the pictures and mailing them to others.

Crime names and exact definitions vary by state but may be something similar to unlawful dissemination of intimate images or unlawful disclosure of private images. In some states, a threat to share them can be a crime that comes under extortion or blackmail.

If the images were taken without your consent or without your knowledge, laws against unlawful surveillance or invasion of privacy may be broken as well. Stealing images from your computer may break a data theft or computer crime law in your state. You can look for the actual crimes in your state on our Crimes page by entering your state in the drop-down menu.

Can I request a restraining order if the abuser has posted an intimate image of me online?

It could be possible that the distribution of intimate images, or the threat to do so, is a legal reason that a judge could issue a restraining order. If it’s not specifically listed in the law, it’s possible it might be considered harassment, which many states include as a reason for getting an order.

If you qualify for a restraining order, you can specifically ask for the order to include a term that states that the abuser cannot post any images of you online. You could also request the judge to order the abuser to remove any current images. For information about filing for a restraining order in your state, and to see the legal reasons (grounds) for which an order can be granted, please see our Restraining Orders page.

Cyberstalking and Online Harassment

What is cyberstalking?

Cyberstalking means misusing the internet or other technology to stalk and harass someone.  A stalker may contact you by:

  • email;
  • social media sites;
  • a messaging app; or
  • through other online spaces/websites. 

The person may do any of the following:

  • post messages about you;
  • spread rumors about you;
  • harass your friends or family;
  • recruit other people to harass you;
  • impersonate you;
  • share your personal information or pictures of you online to harass or scare you;
  • use technology to find/track your location and to monitor what you do online or offline; and
  • create fake images or recordings of you (“deepfakes”).

A stalker or harasser may also target your friends or family. This is a risk factor for the stalking getting worse. You can learn more about risk factors at the Stalking Prevention, Awareness, & Resource Center (SPARC) website.

Even if your state does not have a criminal law specifically against “cyberstalking,” that doesn’t mean it isn’t a crime. In most states, repeatedly contacting or harassing a person through the internet or other technology is still considered a crime under the state’s stalking or harassment laws.  It’s important to know that even if you were originally okay with the person contacting you, it could still be illegal if you make it known that the contact is now unwanted. To read your state’s specific laws, you can go to our Crimes page and enter your state in the drop-down menu.

What is online harassment?

Online harassment is a pattern of behavior where someone tries to scare or hurt you using tech. It can happen through:

  • email;
  • messaging;
  • social media;
  • dating sites; and
  • other platforms.  

Abusers who commit online harassment often do it to make you feel unsafe, humiliated, scared, emotionally distressed, or to keep power and control over you.  They may also be trying to:

  • publicly embarrass you;
  • sexually harass you;
  • threaten you;
  • dox you; and
  • cyberbully, offend, or otherwise harass you.

What is doxing?

“Doxing” is when someone weaponizes your private or identifying information by collecting and publishing it. That person may be trying to scare, humiliate, blackmail you, or encourage others to harm you or sexually assault you. The information posted publicly could include your:

  • name;
  • address;
  • phone number;
  • email address;
  • photos;
  • finances;
  • family members’ names;
  • social media accounts; and
  • other things.

An abuser who wants to dox you may already know a lot of this information about you. If not, s/he might look for your information online through search engines, social media sites, or even by hacking into devices or accounts. An abuser may reach out to your friends or family members pretending to be you or a friend of yours. This could allow them to get more information about you.

There may not be a law in your state that specifically identifies doxing as a crime. But this behavior may fall under your state’s stalking, harassment, or criminal threat laws. To see what laws in your state may protect you, visit our Crimes page and enter your state in the drop-down menu to see the laws related to harassment.

NNEDV’s Safety Net Project has two resources that can help if you have been doxed or are worried about it: Removing Sensitive Content from the internet and Password Safety.

How is online harassment different from cyberstalking?

Online harassment and cyberstalking look a lot alike. They also often happen at the same time. However, the laws covering each may differ.

Cyberstalking laws usually require proof of a few things. One is that the harassment made you feel scared that you or someone else was in immediate physical danger. Another is that the abuser knew or should have known it would make you feel that way.

Online harassment laws often don’t require proof that the abuser knew or should have known his/her actions would scare you. Instead, online harassment laws may require that:

  • the abuser meant to annoy or alarm you, and possibly that s/he knew or should have known the actions would do that; and
  • there was “no legitimate purpose” for his/her actions.

Both sets of laws usually require proof of a “course of conduct,” which means a pattern of incidents.

What is cyberbullying?

Cyberbullying is unwanted and aggressive behavior targeted at a specific person through the internet and other technology. A cyberbully may repeatedly send offensive, insulting, hurtful or threatening text messages to you. S/he may use social media to post rumors or share personal information about you.

Not all states have cyberbullying laws. Many laws that do exist only apply to students or minors since “bullying” is typically associated with children and teens. If you are being cyberbullied and your state doesn’t have a cyberbullying law, it’s possible that the your state’s stalking or harassment laws may apply.

One place you can find cyberbullying laws is on the Cyberbullying Research Center’s website. Another is at stopbullying.gov.

Can I get a restraining order based on cyberstalking or online harassment?

In many states, you can file for a restraining order against anyone who has stalked or harassed you regardless of your relationship with that person. Most states also include stalking as a reason to get a domestic violence restraining order and some include harassment as well. Please check the Restraining Orders page for your state to find out which restraining order may apply to your situation.

Another way to get a restraining order is from the criminal court if the stalker/harasser is arrested.

It can be helpful to keep track of any contact a stalker or harasser has with you by creating a log to document phone calls, drive-bys, messages, voicemails, or emails. Take screenshots of online harassment posts on social media and print them out. When printing harassing emails, print the header too, which has identifying information.  Save original messages and recordings. The Stalking Prevention, Awareness, and Resource Center (SPARC) has a stalking incident log that you can use to record this information. And Safety Net, a project of the National Network to End Domestic Violence, has a sample cyberstalking incident log with tips on how to best document evidence of tech abuse.

With or without a restraining order, there are things you can do to try to increase your safety. Go to our Safety Tips for Stalking Victims page for more information.

What is cyber flashing?

Cyber flashing is when someone sends you an unwanted naked or sexual photo or video on the internet, through an app, or by text message. Most often, this takes the form of someone sending an unwanted picture of his/her genitals or exposing one’s genitals over live video. Cyber flashing can be done by someone you know or by a stranger. It can happen in lots of different situations - for example:

  • on dating apps or websites;
  • on social media;
  • over text, WhatsApp, or other messaging apps;
  • during a video call;
  • over email; or
  • through Airdrop or another app that allows someone to share files with people close by.1

Cyber flashing can be considered a form of online harassment and sexual harassment. In some cases, it may be part of a pattern of abuse designed to cause you emotional distress. A few states have specific laws that make it a crime or specifically state that it can be the reason to sue the abuser in civil court for money damages.

1 Information adapted from Rape Crisis England and Wales

Where can I get additional information?

Recording

How can an abuser misuse recording technology?

In a relationship where there is domestic violence or stalking, an abuser may record you. This could mean recording your conversations or taking video of you. S/he can use the recordings to get more information about your personal life or even as a way to blackmail you by threatening to share intimate or embarrassing information, photos, or videos. Keeping you from having any privacy can also be a way to keep power and control over you. You can learn more about misusing recording technology on our Electronic Surveillance page.

Is recording a conversation with another person illegal?

Whether recording a conversation is illegal depends on your state’s laws. Some states allow recording of calls and in-person conversations without consent of the other person involved. These laws may allow you to record a conversation between you and someone else without that person knowing. On the other hand, this means that the abuser may also be legally allowed to record a conversation with you without your knowledge or consent. These types of law are often called “one-party consent” recording laws.

Other states require consent to record from everyone who is a part of the conversation. Without that consent, recording a conversation might be considered illegal, at worst, or just not admissible in court, at best. The “two-party consent” laws make it much more difficult for victims to gather evidence of threats or abuse.

Although some state’s recording laws may refer specifically to “telephone calls,” there are other types of voice calls these days besides phone calls. Many apps, like Discord and WhatsApp, can be used for voice calls. There are also video calls using apps like Zoom and FaceTime. You may want to find out how your state’s recording laws apply to these types of technology if you are hoping to record such a call. A lawyer who is knowledgeable about privacy laws should be able to provide legal advice.

Most states have specific recording, eavesdropping, or wiretap laws that deal with the issue of whether consent is needed for a recording to be legal. You can check your state’s Crimes page to look for any laws related to recordings or you can check the Reporters Committee for Freedom of the Press website. It has a lot of state-by-state information on recording laws.

Is taking a video or photograph of another person illegal?

The key to figuring out whether it is legal to take a photo or video of someone without their consent is whether the person would have a “reasonable expectation of privacy.” A “reasonable expectation of privacy” generally exists if someone is in a place where an “average person” would expect to not be seen or spied on.1 If there is a reasonable expectation of privacy, then taking the photo or video without consent may likely be illegal. For example, if you are in a public place, such as a beach or a park, you may not have a reasonable expectation of privacy. If you are in your bedroom or a public restroom stall, you generally would reasonably expect privacy.

Many states have specific voyeurism or surveillance laws that could apply to taking a video or photo of someone without his/her permission. You can check your state’s Crimes page to look for any laws related to photos or videos.

1 See Katz v. United States, 389 U.S. 347 (1967)

Can recordings be used in court?

Whether or not a recording can be used in court may likely depend on whether the recording was made in line with your state’s laws regarding consent for recordings. Generally, evidence gathered illegally cannot be entered “into the record” in court. But, even if you have recordings that were legally created, whether you can use them in court will still depend on your state’s rules of evidence. So, for example, you may have to prove the truthfulness (authenticity) of the recording to the judge and convince the judge whose voice or image is in the recording.

Another possible challenge with getting a recording admitted into evidence is that the recording may be considered hearsay. Hearsay is basically an inadmissible out-of-court statement. There are several exceptions to the hearsay rule, one of which could be used to allow a recording to come into evidence. You can read more about hearsay and the exceptions to hearsay in our Preparing for Court – By Yourself section. 

After considered these factors and others, the judge will decide whether it is appropriate under your state’s rules of evidence to allow the recording to be accepted (“admitted”) as evidence. It may be helpful to speak with a lawyer in your state. A lawyer can give you advice about whether recordings that you think are important to your case might be allowed into the court hearing. The lawyer can also advise on how to object to recordings that the abuser may try to enter into evidence in court.

Spoofing

What is spoofing?

Spoofing is a type of masking or hiding one’s actual phone number by having a different number show up on the recipient’s caller ID. The fake number is chosen by the spoofer.

Is spoofing illegal?

Most states do not have laws that specifically deal with spoofing technology itself. However, there is a federal law, which applies to all states, called the Truth in Caller ID Act. This law prohibits falsifying or spoofing caller ID to do any of the following:

  • to cheat or trick someone out of something (defraud);
  • to cause harm; or
  • to wrongly obtain anything of value.1 

If a person breaks this law, s/he can be reported to the Federal Communications Commission (FCC). S/he may face penalties of up to $10,000. 

Note: The law does allow people to use caller ID spoofing to protect their personal information and privacy if there are good intentions. For instance, victims of domestic violence who are concerned for their safety might mask their number if they have to call a relative of the abuser and don’t want their actual phone number revealed. The law only bans it being done to cause harm or to defraud anyone.

To learn more about the Truth in Caller ID Act, including information on how to make a complaint if you believe someone is spoofing you illegally, visit the FCC’s website.

1 47 U.S.C. § 227(e)

What are some ways an abuser could use spoofing technology?

An abuser could use spoofing to trick you into picking up the phone if you would not pick up a phone call that comes from the abuser’s number. Depending on what number the abuser enters into the spoofing app, you might think you are receiving a telephone call from a family member, an advocate, your lawyer, or the courthouse. Be cautious if you receive a call that appears to come from the courthouse, for example, telling you that your court hearing date has been changed. This may be a way the abuser is tricking you into missing your court date.

Another way that an abuser can use spoofing for impersonation is by calling others with your phone number as the “caller.” The abuser may pretend to be you to cause problems with your personal or professional life. An abuser may also do this to create a false record of you calling him/her multiple times in order to report you to the police or courts for harassment. However, you can prove that you did not make the calls since they would not appear on your phone bill in your outgoing call log.

Some spoofing apps also allow users to alter their voice so it appears to come from someone else. Or it could be used to add background noise or record the call.

How can I prove spoofing in court?

It can be very difficult to prove spoofing in court. A judge may not understand how an abuser can make phone calls when the phone number on your call log doesn’t match the abuser’s number. But there are some steps that a victim of spoofing can take to help the judge to better understand what is happening. Here are some things you may want to think about:

1. Similar times: Is there anything that you notice about the times of when the abuser usually calls/texts and when the spoofed calls/texts arrive? For example, let’s say the abuser works from 2 PM until midnight and, in the past, always called you right after midnight. Then, all of the calls/texts with the spoofed number came in at the exact same time. Perhaps that can be an indication that it is the abuser making the spoofed calls. The smaller the timeframe or the more unique the timeframe, the better.

2. Similar information: Are there any similarities between texts that you received from the abuser’s number and those from the spoofed ones? If all of the messages are written in a similar manner, with similar words, or with similar information, this can be an indication that it is the abuser making the spoofed texts.

3. Suspicious timing: Did the calls/texts start right after a certain event that can be proven in court? For example, let’s say you could show social media posts, voicemails, emails, or other proof of your breakup with the abuser. And then, the spoofed calls start immediately afterwards. This may help convince a judge that the abuser sent the calls/texts.

4. Other types of abuse: Is the abuser committing other acts of abuse that you can prove to the judge? Showing up at your home or work? Posting negative things about you online? (Sometimes, doing a Google search for your own name can reveal if the person is posting anything about you online). Proving to the judge that there are other forms of abuse going on during the same time period of harassing spoofed calls/texts could help convince the judge that it’s the abuser.

5. Evidence in court: Sometimes the best way to get evidence is actually to request help from the court. For example, you may be able to ask the judge to sign a subpoena for the abuser’s phone records. Phone records are often the most direct way to prove spoofing. Coming prepared with all of the information listed above may be useful in trying to convince the judge to sign such a subpoena. Sometimes, your number won’t show up on the phone call logs. This is because the abuser can call a spoofing number to call your number. In that case, only the spoofing number that the abuser used would show up on the phone records of the abuser. However, if the abuser’s phone records show that the abuser made calls at the exact time you received calls from the spoofed number, this may cause the judge to believe the abuser made those calls. However, comparing phone records is not a perfect answer because not all spoofing calls will be on the phone records. For example, if the person makes the spoofed calls through an app, you may need to request the records from the app itself; but you may not know which app was used. In fact, if the calls were made from an app and therefore do not appear on the abuser’s phone records, this could even harm your case. The judge may see this as proof that the abuser did not make the calls.

For more information about getting evidence for court, see the National Council of Juvenile and Family Court Judges’ How to Gather Tech Evidence and 10 Steps for Presenting Evidence in Court.

Electronic Surveillance

What is electronic surveillance?

Electronic surveillance is a broad term that is used to describe monitoring another person’s actions or conversations without his/her knowledge or consent by using one or more electronic devices or platforms.  

Electronic surveillance can be done by misusing cameras, social media, or other tech.  It can also involve stalkerware, also known as spyware, which can be installed on a computer, tablet, or smartphone. This allows someone to secretly monitor the activity on the device without the user’s knowledge.  It can allow the abusive person access to everything on the phone.  To learn more about stalkerware, visit Safety Net’s Survivor Toolkit. You can also go to the WomensLaw.org Crimes page to look for a specific law in your state involving stalkerware.

How can an abuser misuse electronic surveillance?

As part of domestic violence or stalking, an abuser may use electronic surveillance to “keep tabs” on you by monitoring your whereabouts and conversations. There are several reasons an abuser may use electronic surveillance, such as:

  • to keep power and control over you;
  • to take away your privacy;
  • to make it hard for you to have a life separate from the abuser; and
  • to try to discover or stop any plans you may be making to leave the relationship.

An abuser may also misuse family phone features. For instance, s/he may misuse apps meant for parents to see children’s phone use in order to monitor your phone usage. If you have a child, the abuser may misuse these apps on the child’s phone as a way to monitor your location or conversations with the child. Or if you are on a family phone plan with the abuser, s/he could misuse it to monitor your phone activities. In some cases, you may wish to leave a family plan to lessen the abuser’s access to your cellular information. The Safe Connections Act of 2022 makes this easier for survivors. It can help avoid termination fees. You can learn more about the Safe Connections Act on TechSafety.org, the website of NNEDV’s Safety Net Project.

Is electronic surveillance illegal?

Whether electronic surveillance is legal or not may depend on whether the person doing the recording is part of the activity or conversation and your specific state’s laws on this issue.

If the person is part of the activity or conversation:
Many states allow someone to record a phone call, conversation, or activity as long as one person involved consents. This could be the person recording it who “gives consent.” Other states require that everyone who is part of the conversation or activity consents. You can read more in Is recording a conversation with another person illegal?

If the person is not part of the activity or conversation:
Depending on the state, there might be one or more laws that address:

  • listening in on a private conversation;
  • electronically recording a person’s conversation; and
  • videotaping a person’s activities.  

The names of these laws vary across the country, but they often include wiretap, voyeurism, interception, and other recording laws. Deciding which law(s) may apply to your situation can be tricky. It often depends on the circumstances of the surveillance and whether you had a “reasonable expectation of privacy” while the abuser recorded or observed you.  Legally, a reasonable expectation of privacy exists when you are in a situation where an average person would expect to not be seen or spied on.1 For example, a person in public places, such as in a football stadium or on a main street, may not reasonably expect privacy. A person in his/her bedroom or in a public restroom stall generally would.

1 See Katz v. United States, 389 U.S. 347 (1967)

What is spyware?

Stalkerware is monitoring software that can be used to secretly monitor a device’s activity without the user’s knowledge. Stalkerware can be installed on a computer, tablet, smartphone, or other device.

Stalkerware can allow an abuser to access everything on your device. It may also allow someone to record and listen in on phone calls or other communications. Stalkerware may be hidden and, therefore, difficult to detect or remove. It generally does not notify you that the software has been installed or is in use. The Coalition Against Stalkerware has information for survivors regarding preventing, finding, and removing stalkerware. You can also learn more about it on the Safety Net website.

To read the language of laws in your state that may deal with stalkerware, go to our Crimes page.

What specific crimes come under the category of “electronic surveillance?”

There are various laws that an abuser may be breaking by electronically surveilling or recording someone.   

Some states have specific laws that address the recording of telephone, online, or in-person conversations. It may be illegal for someone who is not a part of your conversation to record it without your consent. It may still be illegal even if you know that person is listening to you speak. Below, we give general definitions of various types of crimes. To read the language of the laws in your state, go to our Crimes page.

Wiretap is a form of electronic surveillance where a person monitors or records telephone communications.  Often people think of it as a way that police gather evidence.  But wiretaps are also misused by abusers and stalkers.

Interception is when someone who is not part of a conversation uses technology to interfere with it so that s/he can listen to or record it.  Interception laws usually apply to more than phone calls. These might include email and text messages.  Many states have either an interception law or a wiretap law. So if you don’t find one in your state, look for the other.

Eavesdropping also involves listening in on or recording another person’s private conversation without the consent of one or both of the parties. There are many ways to eavesdrop. Some are not high tech. For example, let’s say you are talking on a landline at home. Someone else can pick up another receiver in your home and listen in. Eavesdropping laws generally apply when there is a reasonable expectation of privacy.

Invasion of privacy is when someone observes, monitors, or records your personal or private activities.  This could be taking nude or partially nude photos or videos without your consent.  It could also be secretly filming sexual acts. 

Voyeurism means spying on someone for sexual pleasure.  It does not always involve filming or using tech. It may apply to physically spying on someone. If there is no “invasion of privacy” law in your state, check for a voyeurism law.

Impersonation

What is impersonation?

Impersonation generally refers to when someone uses a false identity for certain purposes. The impersonator commits acts for personal gain or to deceive or harm another person.

Is impersonation illegal?

Some states have laws against impersonating certain types of professionals or public figures. These might include law enforcement, political officers, or lawyers. Or the law may criminalize impersonation for the purpose of cheating (defrauding) someone. Even if your state’s criminal laws don’t cover the specific type of impersonation being committed against you, the abuser may have committed other crimes in the process. For example, let’s say an abuser impersonates you to withdraw money from your bank account. This may be theft or fraud. Or let’s say an abuser impersonates someone else to harass you. This may be criminal harassment. If there is a restraining order in place, it could be the crime of contempt.

What civil legal options are there to deal with impersonation?

A person may be able to sue for money damages in civil court if a “tort,” which means a civil wrong, was committed against him/her. (See our Suing an Abuser for Money page for more information about civil lawsuits.) There are a few torts that might come into play when dealing with impersonation, which we explain below.

Defamation is a tort that refers to the act of saying or writing false information that damages a person’s reputation in the community. An abuser may have impersonated someone else to spread false and damaging statements about you. Or s/he may have impersonated you to spread false information. If the damaging statement is spoken, it may be considered slander. If it is written it may be considered libel.

For a statement to be considered slander or libel, the judge will generally require proof that:

  • It was false;
  • It was “published,” which  means a third party must have read or heard the statement;
  • It caused harm to your reputation, which is often proven by showing one of two things:
    • that your business was negatively impacted; or
    • that you were subjected to public hatred, disapproval, disgrace, or ridicule.

False light is a tort that deals with being portrayed in a misleading or false way, causing harm to your emotional well-being. To prove false light, the courts generally require proof that:

  1. The abuser attributed a statement or view to you that you do not hold, thereby placing you in a “false light;”
  2. The statement or view puts you before the public in a very offensive and untrue manner; and
  3. S/he acted with “actual malice,” which means s/he knew that the statement was false or didn’t care (“recklessly disregarded”) whether it was false or not.

What are some ways that an abuser might use technology for impersonation?

There are many ways that abusers misuse technology to help them impersonate someone.

Social media
Abusers might misuse social media by using it to:

  • create fake social media accounts in your name;
  • log into your accounts by having or guessing the password; or
  • manipulate technology to make it seem like a communication is coming from you.

Through impersonation, abusers may gather confidential or personal information about you from your friends, family, or an employer who believe they are talking to you. An abuser may create false “evidence” that could cast doubt on allegations you make in court or to the police.  For example, abusers can create fake messages from your account to make it look like you are harassing them on social media. Then they can use those “harassing messages” to file a police report or protection order against you.

Generative AI (“Deepfakes”)
An abuser or stalker may use generative artificial intelligence (“AI”) tools to create fake recordings or videos of you. These are sometimes called deepfakes. The deepfakes may be sexual in nature or they may be meant to harm you in other ways. In 2024, for example, a stalker used these tools to create a deepfake recording of a school principal saying racist and antisemitic comments. This led to outrage and harassment against the principal and the school until it was discovered that the recording was a deepfake.

Email
Abusers may create email accounts not connected to their own name for various reasons to send harassing emails. Abusers may send an email from these “fake” accounts to harass, threaten, or intimidate you. They may try to trick you into opening a message with a virus or stalkerware to let them to spy on your computer. Abusers may also create an email account in your name in order to send emails to others while pretending to be you. They could be trying to embarrass or discredit you, put you at risk of harm, or cause other problems for you.

In many cases, though, the original sender of the email can still be proven. This may require the help of law enforcement.

Spoofing
Spoofing is masking or hiding one’s actual phone number so that a phone number chosen by the user shows up on the recipient’s caller ID. You can find more information about spoofing on our Spoofing page.

Online impersonation
An abuser may use your personal information to pose as you online. S/he may invite others to harass or endanger you. For example, an abuser may create an ad posing as you directing others to contact you for escort or massage services. Or the ad might invite others to come to your home or call you for a specific purpose.

Some abusers could even use impersonation to encourage others to sexually assault you. An abuser could say in the ad or online post that you have a “rape fetish” or “rape fantasy.” The ad or post could then ask for someone to carry out this “fantasy.” The purpose of these types of online posts is so that the person who is sexually assaulting you thinks that if you say “no” or fight back, your resistance is part of “role-playing” in the “rape fantasy.” In these types of cases, the abuser who makes the post can be charged with rape or solicitation to commit rape. This is in addition to whatever rape charges are filed against the person who actually commits the sexual assault.

GPS Monitoring

What is GPS?

A global positioning system (GPS) is a network of satellites that provides location information to many common devices, such as smartphones, car navigation systems, and laptop computers. The satellite information allows these devices to be located on a map. There are many different types of devices that use GPS.

GPS has many positive uses, such as monitoring an abuser’s whereabouts while on probation or keeping track of a child’s location. However, the expanded use of GPS-enabled devices has also increased the opportunities for an abuser to misuse GPS technology. See How can an abuser misuse GPS technology? for more information.

How can an abuser misuse GPS technology?

Abuse is about someone seeking power and control over someone else. So, an abuser may misuse GPS to try to gain or keep control over you. For example, an abuser could use GPS to track your location as part of a pattern of stalking. Or perhaps an abuser wants to see where you have been to then misuse this information against you in a custody or divorce case, for example.

Because GPS-enabled devices can be so small and easily hidden, an abuser could hide a device in your belongings or car without you knowing. The GPS in your phone could also be used to track you. An abuser could get that information if s/he:

  • shares a cell phone plan with you;
  • can access your cell phone account; or
  • has another way of accessing your information, such as:
    • through stalkerware;
    • through downloaded apps; or
    • when your devices are synced to the “cloud” or your computer.

What laws address GPS monitoring?

Some states’ stalking laws specifically prohibit putting a tracking device on your property, such as in your car or purse, without your consent. You can read our Stalking/Cyberstalking page to learn more about stalking. 

If the abuser tampered with your personal devices, such as your phone, tablet, etc., there may be state laws regarding interference or tampering with an electronic communications device that apply. 

You can read more about electronic surveillance on our website. Electronic surveillance laws, such as computer crimes or privacy laws, are not specifically focused on domestic violence, so police or attorneys may not think of them right away.

You can find a selection of laws in your state on our Crimes page by selecting your state from the drop-down menu.

What are some signs that I'm possibly being monitored by GPS?

Let’s say an abuser seems to know too much information about where you have been. Or s/he shows up in random locations that you did not share that you would be at. You may consider checking your belongings or car for hidden GPS-enabled devices. A GPS device might be connected to your car battery or under your dashboard so you might need the help of a mechanic to check your car.

GPS can be included in many different types of devices, so you may need to look for something that you do not recognize or that is out of the ordinary.  You may be able to get help from a professional to search your belongings, such as a law enforcement officer. If you find something, an attorney, advocate, or law enforcement might be able to help you figure out what it is and what to do with it. You may also find information about a device if you do an online search describing it.

In addition to looking for unknown devices, consider the GPS on your own devices. Devices to consider include your phone, computer, or “wearable” device like a smart watch. If you have children or live with other relatives, consider their devices too. If you have pets, their collars may have GPS-enabled tags to track them if they get lost.

What can I do to stay safe or prevent the misuse of a GPS-enabled device?

Many apps and programs on your devices use GPS. If you want to turn it off, you could try an online search with the words “how to turn off GPS on my [insert device name].” You can learn more about phone safety on Safety Net’s website.

If you believe that you are being tracked by GPS, it can be helpful to keep a log of incidents related to the tracking. This gives you evidence of a pattern or history to share with a lawyer or law enforcement.

GPS monitoring can be particularly dangerous if you are trying to leave an abusive relationship and don’t want the abuser to be able to locate you. However, if you find a GPS device in your property, pause and think before doing anything. It can be important to safety plan with an advocate before removing any type of tracking device. This is because removing the device may alert the abuser that you have found it. But if you think that the abuser is monitoring your phone, you may want to use a different phone to call a domestic violence program. This could be a friend’s or family member’s phone or a public phone. You can learn more about safer devices on Safety Net’s website in the page called Securing Devices & Accounts as well as their safety tips page if an abuser is using technology to monitor you.­

Computer Crimes

What are computer crimes?

The term “computer crimes” refers to a broad category of crimes that could violate your privacy or interfere with your data/technology. Computer crimes include, but are not limited to, misusing a computer to:

  • steal information or something else of value;
  • scam or trick you;
  • harass you;
  • impersonate you;
  • blackmail you; or
  • create or publish sexual images of you.

Some of these crimes can also be committed without computers or tech, such as fraud or identity theft. But technology can often make it easier for an abuser to commit those crimes. It can help him/her:

  • access or use your private information;
  • copy your data;
  • destroy your information; or
  • interfere with your data or technology.

What are some examples of computer crimes?

Below are some of the more common forms of computer misuse, which can be considered a computer crime.

Hacking is when someone gains access to your computer without your permission or accesses more data or information than what you allowed. An abuser could gain access to your devices or accounts if s/he knows your passwords. S/he could also do so if s/he has the skills to break into them. Or s/he may use software designed to gain entry into your technology. This can all happen without you knowing.

Spyware and stalkerware are types of software that allow someone to secretly monitor or observe your computer activity. Once it is installed, an abuser can see and record what you type, the websites that you visit, your passwords, and other private information. It can be installed on smartphones and on other devices, such as tablets and computers without your knowledge. Someone can install it on your device in person or by sending attachments that will download the software onto your device when you click on a link or download the attachment. It can be difficult to notice or remove.

Phishing is a way that an abuser may use a text message, email, or call that looks real to trick you. You may also hear the term “smishing.” This is phishing by text message. The abuser may scam you into giving your personal information or an account password. S/he could then use it to steal your identity, monitor you, or log into your accounts.

Computer fraud is when someone uses computers or the internet to defraud people, companies, or government agencies. (To “defraud” someone means to get something of value through cheating or deceit, such as money or internet access.) An abuser might pose as someone else and defraud you or pose as you and defraud someone else to get you in legal trouble.

Identity theft involves getting someone else’s personal or financial information in order to misuse that person’s identity. An abuser could use your identity to do any of the following:

  • destroy your credit score;
  • attempt to make you lose your job;
  • apply for or get public benefits in your name; or
  • commit a crime in your name, thereby subjecting you to criminal consequences for his/her actions.

Abusers often use information that they already have available to steal an identity, such as a Social Security number, name and date of birth, residential history, or something else. Or s/he could get the information through hacking, stalkerware, or phishing.

It can be worrying to not know whether your tech is safe to use. Or to know that it is not safe, but to feel that you have no other options. Safety Net has resources to help you navigate these issues. Check out their information on Password Safety, Spyware and Stalkerware, and Securing Devices and Accounts.

How can an abuser commit a computer crime as a way to abuse me?

An abuser could commit a computer crime to gain access to your personal information and use that information to keep power and control over you. S/he may do this by breaking into your computer, phone, or other device, and copying or stealing your data, such as:

  • your Social Security number or other private identifying information;
  • employment information;
  • calendar details.; or
  • photos or videos, especially ones of a sexual nature.

Depending on what the abuser steals or learns, s/he may use that information to:

  • stalk you by showing up at the places marked in your calendar;
  • publish your photos, videos, or personal information to harm, embarrass, or endanger you;
  •  blackmail you by threatening to share your private information; or
  • otherwise harass or intimidate you.

If the abuser steals nude or sexual images or videos, s/he may threaten to post or share these videos as a way to gain control over you. You can learn more about this on our Abuse Involving Nude/Sexual Images page.

What types of laws address computer crimes?

There are several federal laws that address computer crimes, including the Computer Fraud and Abuse Act and the Wiretap Act. Many states also have specific laws that prohibit hacking, unauthorized access, computer trespass, or something similar.

The National Conference of State Legislatures lists computer crime laws and spyware and stalkerware laws on their website. You can go to our Crimes page in your state to see if we list any relevant crimes.

You may also be able to use the civil legal system to combat computer crimes. For example, you may be able to sue the abuser in civil court for money “damages” based on what you lost and other harms that you experienced. Civil courts provide other options as well. You may be able to ask a court to issue a civil restraining order that specifically prohibits accessing your personal data or committing any unauthorized access of your devices. Violating a restraining order could put the abuser in contempt of court, which could have civil or criminal consequences. Go to our Restraining Orders page to read about what types of civil restraining orders are available in your state.

It can be helpful to get legal advice or representation when filing something in court. You can find lawyer referrals on our Finding a Lawyer page. Or you can contact the National Crime Victim Bar Association for a lawyer referral.

Responding to Technology Misuse: Civil and Criminal Options

What are the basic differences in criminal and civil court cases?

Tech misuse can often be dealt with in both civil court and criminal court. The process and purpose for using each court is different. You may accomplish different outcomes depending on which court you are in.

In state criminal court, the case is filed by the state or county prosecutor. The purpose is to punish the abuser for breaking the law, which may result in jail time. In civil cases, the case is filed by you or your attorney. The purpose is either to have the abuser pay you for damages that his/her behavior caused you or to ask the judge to issue a civil restraining order to stop certain behavior. In some situations, there may be both civil and criminal cases happening at the same time. For example, in 2008, Erin Andrews, a sportscaster on ESPN, was stalked by a man who filmed her in her hotel room through a peephole. He was convicted of stalking in criminal court and sentenced to jail. Later, she successfully sued the stalker in civil court for money damages for invasion of privacy and emotional distress.

What can I accomplish through civil court?

In civil court, you might be able to sue for money damages for things like:

  • lost wages;
  • loss of your job;
  • emotional pain and suffering;
  • damage to your reputation; and
  • punitive damages, which is intended to punish the defendant. 

If your damages are below a certain amount, you can file on your own in small claims court. See our Suing an Abuser for Money page for more information.

Another way to use the civil court is to file for a civil restraining order. The judge can order the abuser to stop doing certain things, like sending nude images of you to others or publishing your personal information online. The order may also force him/her to do certain actions, such as taking down images or social media posts that put you in danger.  Go to our Restraining Orders page to learn more.

There also may be other important civil legal options to consider in tech abuse cases. This is especially true if there was sharing of sexual images of you without your consent.  One possible option, for example, deals with getting the copyright of images of you.  Generally, copyright law may protect certain photos or videos as an “original work.” The person who takes a photo or video is generally the copyright “owner.”  The owner can decide if, how, and when those images are distributed, published online, etc. In a civil lawsuit, you may be able to get copyright ownership of the images. This would give you the legal power to decide where the pictures are published so you could then demand that they be removed from the Internet or other publications.  For advice on whether or not this may be an option for you, please consult with a lawyer who knows about copyright law and tech misuse.  See our National Organizations - Posting Nude/Sexual Images Without Consent/“Revenge Porn” section for legal referrals.

What can I accomplish through criminal court?

If there is a violation of criminal law, the district attorney, county attorney, or attorney general would be the one to file criminal charges for the crime committed against you. A criminal case usually starts with a call to 911 or filing a police report at the police station. Then the police should investigate and determine if there is “probable cause” to make an arrest. Prosecutors then look at whether there is enough evidence to prosecute. If so, the case will proceed through the criminal court process and may end up going to trial or the defendant agreeing to a plea bargain. 

It’s important to remember that in a criminal case, the parties on the case are the state, represented by the prosecutor, and the defendant. The victim is not a party to the case. So, if you later decide that you want to “drop the charges,” the prosecutor does not have to honor your request. This is because s/he is not “your attorney” but rather is an attorney advocating for the state’s interests. You could express your wishes to the prosecutor but it is ultimately up to him or her whether to continue the case or not.

How can I plan for my safety if I am the victim of technology abuse?

Tech-facilitated abuse and stalking can feel overwhelming. But you do not have to be a “techie” to think through ways to increase your safety and privacy. When you make a plan for your safety, this can include planning for your tech safety in addition to your physical safety.

See our Safety Planning page to learn more about ways to increase your safety.  Your local domestic violence program can help you create a safety plan and provide other help as well.  You can also find tech safety planning tips and suggestions on Safety Net’s website.

Evidence Issues in Cases Involving Technology

Digital Evidence

What is digital evidence?

Digital evidence, also known as electronic evidence, is information that:

  • is stored on, received, or sent in a digital format by an electronic device; and  
  • can be used in court to help prove abuse occurred.

Tech misuse often creates this type of evidence, such as when the abuser sends text messages or makes social media posts that contain threats. Those messages or posts, or screenshots of them, become digital evidence that can be used in court to help prove the threatening behavior. Also, if an abuser misuses tech to stalk a victim, there may be GPS data, video footage, or stalkerware purchases that can be used as evidence to help prove what happened.

How is digital evidence different from other types of evidence?

One difference between digital evidence and other evidence is the actual format of it. Since digital evidence is in electronic data files, such as a “png” file for an image, you will need to think through how to present the evidence in a format that the judge can examine. For example, let’s say your evidence is on your cell phone. If the rules of evidence in your state require the judge to keep all evidence submitted in the case as part of the court record, you would want to think about how to get your evidence printed from your phone. This way, you don’t have to leave your actual cell phone with the judge.

Another difference is that digital evidence can be easily changed, damaged, or destroyed, so it is important to protect the data. This may be done by:

  • creating backup copies that are saved to a second device;
  • taking videos or screenshots, and storing them somewhere that the abuser cannot access; and
  • updating account passwords. You can learn more about password safety on Safety Net’s website.

What should I do to prepare for my case if it involves digital evidence?

Preparing for your case will depend on your state’s rules of evidence, the type of abuse you are experiencing, and other factors. Here are some things you may want to consider:

  • You may be able to get the evidence you need directly through your own social media, phone, and other accounts. If not, you may have to request that a third party, such as a telephone company, provide you with the evidence you need. But, the company might refuse to provide it without a subpoena.
  • Take pictures, screenshots, or printouts of any evidence on your phone or tablet. Then print them out so you can hand them into the judge in court if needed. If your evidence is only on your phone or tablet, you may be required to leave it with the judge until your hearing is over if you don’t have it printed out or saved in another format. You can read more about saving evidence on our Documenting/Saving Evidence page.
  • Think about the testimony you plan to tell the judge and how your evidence fits with your testimony. In order to enter (“admit”) evidence in court, you will likely have to testify (“lay a foundation”) about:
    • how you came upon that evidence; and
    • how you know that it is the abuser who sent the messages, posted the social media posts, etc.
  • Check with a lawyer in your state if you made a video or audio recording to capture evidence of the abuse. In some states, it may not be legal for you to record a conversation if the other person being recorded doesn’t know about it. You can read more about recording laws on our website.

It is helpful to work with a lawyer to prepare for a court hearing or get advice about what evidence you may be able to use in court.

Will I be able to get my digital evidence into the court record during my hearing?

Generally, the “rules of evidence” govern what can be considered by a judge at trial. Your state may have its own rules or the state may follow the Federal Rules of Evidence. The rules of evidence deal with issues such as:

On our Rules of Evidence page, we link to most states’ rules. However, even if you read your state’s rules, it may not be clear as to whether your digital evidence is likely to be admitted into the court record. This is something that a lawyer can best advise you on. You can find lawyers in your state on our Finding a Lawyer page.

Documenting/Saving Evidence

What does it mean to document my evidence?

Documenting your evidence means that you are taking steps to do the following:

  1. safeguard proof you have of the abuse, such as:
  • printing out emails that show evidence of abuse;
  • taking screenshots of text messages or social media posts;
  • printing photographs or cell phone records;
  1. accurately record incidents of abuse as they happen in a log, including:
  • the date and time of each incident;
  • what the abuser did or said;
  • what actions, if any, you took; and
  • what witnesses or evidence you have that is related to the incident; and
  1. not change the evidence at all. So, for example, let’s say the abuser sends a threatening email that is unsigned. You cannot add his/her name to the email just because you know that s/he wrote it.

Documenting your evidence correctly can be crucial if you later need to produce it for a court hearing or other legal matter.

Why is documenting evidence important in cases involving technology abuse?

If an abuser is using technology to abuse you, it is important to document the evidence as soon as possible. This is because an abuser may be able to access the technological evidence and delete it. Even if you don’t want to take legal action now, consider whether you might later on.

It may be your instinct to keep the abuser’s actions “away” from you. For instance, you might delete threatening messages from an abuser or block the abuser if s/he is harassing you on social media. This is a completely understandable response. However, before you do this, it’s important to think through how this could affect your ability to document evidence. If you delete messages, for example, this could permanently erase your ability to access them in the future. This can create a dilemma for many survivors who don’t want to erase evidence yet don’t want to be subjected to abusive technological contact. A couple of ways to minimize having to see the abusive material can be to:

  • silence message text notifications from the abuser;
  • set up a folder in your email account and create a “rule” for emails from the abuser’s email address to go straight to the separate folder.

Filtering the abuser’s communications will allow you to have access to the information when you want to without constantly having to see it.

How should I document technology abuse?

One way you can document your evidence is to keep a record (log) of the details of each incident as the incidents occur. You can download a sample technology abuse log to help with this.

Another important part of documenting evidence is storing the evidence in a safe location. For instance, if your phone is not safe, you may be able to store evidence such as voicemails, call logs, emails, or text messages in a cloud storage account, like Dropbox. You can also take screenshots or photos of the phone or computer screen and store those in a safe location. Be sure to capture as much information as possible. For instance, you will want to show the phone number of the person who is sending harassing messages, not just the contact name you assigned to that person in your phone. Multiple screenshots may be necessary for each item. For instance, you could take one of the message with the contact name, and another of the contact name and phone number. With screenshots of social media posts, be sure to include the full URL web address that is in the bar at the top of the window as well as the abuser’s profile page.

To document emails, print them with the full header information included. If you do not know how to do this, you can Google “[your email provider, like Gmail or Outlook] + get header information.” This preserves details such as the date and time of the email and the IP addresses it passed through to get to you. In some cases, it may even show the sender IP address, though this is less common nowadays. It is important to only document this from the original email. If the email has been forwarded, it will not have the same information.

Many social media sites and apps allow you to download the data on your account. If you have filed criminal charges or are involved in a court case, law enforcement or your lawyer may be able to send a letter or subpoena to the social media company or website to preserve and produce the account information.

Sometimes people find evidence that they are being stalked or monitored through a hidden camera, microphone, or GPS tracker. If this happens, you may want to think through the impact of removing or interfering with the equipment. Removing it could impact your safety, if the abuser knows that you found it, as well as interfere with your ability to document it. One option is asking the police to document the evidence before removing it. Before taking any action, you may want to work with a domestic violence advocate to think through how removing the equipment may impact your safety. The abuser may escalate his/her violence if s/he realizes you have discovered it.

Ways Courts Use Technology

Remote or Virtual Court Hearings

What are some pros and cons of a remote hearing?

Many courts use virtual platforms like Zoom or WebEx to hold court hearings remotely. Remote hearings can have some advantages, like not having to find childcare or pay for transportation and parking, and not needing to take as much time off from work as you would if you had to travel to court. Some people also find it less scary to testify when they aren’t in the same physical space as the abuser.

However, presenting evidence might be more difficult with remote hearings since it may require you to send evidence electronically ahead of the hearing. If your hearing is going to be virtual, make sure you find out from the court:

  • what technology or platform the court uses;
  • how you will join the hearing; and
  • what to do/who you should contact if you have any technical difficulties during the hearing.

If you prefer an in-person hearing, you could ask the court whether you have the option to choose between a virtual or in-person hearing.

You can read more information about virtual hearings in our Quick Guide and the Virtual Hearings section of our Preparing for Court – By Yourself section.

GPS Monitoring of Offenders

How do courts use GPS technology to track offenders?

Some states have specific laws that allow judges and law enforcement to use technology, such as GPS, in ways that are intended to protect victims of domestic violence or stalking. There are two types of GPS tracking – “active” and “passive.” Active tracking sends alerts if the abuser enters a location where s/he is prohibited. The alerts may be sent to you, to law enforcement, or to any court-ordered supervision agency that is monitoring the offender. An abuser wearing passive GPS tracking may only be required to upload his/her location history periodically. The location history may then be reviewed from time to time by a probation officer or it may be used as a tool by law enforcement if needed. Depending on your state, a judge may be able to order GPS tracking in a criminal or civil court case.

Are there any risks to having an offender’s location tracked?

Tracking abusers with GPS technology can have risks if the victim relies solely upon the GPS tracking to stay safe. For example, passive GPS monitoring does not provide real-time alerts. It will not warn you that the abuser is approaching you. And active GPS monitoring requires good procedures to be effective. Law enforcement must quickly respond when an abuser enters a prohibited location near you. The court must have proper procedures in place if an abuser violates a court order. 

If a victim is relying heavily upon active GPS monitoring technology to send an alert if the abuser is nearby, it’s important to keep in mind that the technology might fail. 

You may want to talk to a domestic violence advocate for help making a safety plan.

Virtual Visitation

What is virtual visitation?

Virtual visitation is the term used to describe parents using video calls to “visit” with their children. This could be done through Zoom, FaceTime, or other technology. Some states have laws that specifically allow a judge to order virtual visitation as part of a custody order. Virtual visits can be used to maintain the child’s relationship with the non-custodial parent between in-person visits or can be ordered if physical visitation isn’t safe.

How can virtual visitation help me?

Virtual visitation can be an option if in-person visits are not safe, or not practical, for the child or parent. Some types of visitation technology allow a parent to record the visits, which creates a record of what was said during a visit. This could help capture proof of abusive behavior towards the child or inappropriate things the parent might say about the other parent. However, recording without consent is not allowed in all states. You can read more about recording laws and electronic surveillance on our website. But if you are thinking of recording a virtual visit, please speak to a lawyer to make sure it would not violate the law to do so.

Are there any risks with using virtual visitation?

Virtual visitation doesn’t guarantee safety. The abuser could still abuse/harass you or your child during the visit. An abuser may want to gain access to your computer to track you, steal your information, or to try to share malicious links with you. Such links could download stalkerware or malware onto your computer. 

The abuser could try to use tech to monitor you in other ways. Read more about monitoring in our GPS Monitoring page and Computer Crimes page. An advocate can help you safety plan around using tech to co-parent.

Co-parenting Apps

How is technology used in co-parenting situations?

There are apps that help with communication between parties in family law cases or help them coordinate custody and visitation schedules. These apps can track communications about the child with functions such as:  

  • an electronic journal;
  • a message board;
  • a shared expense log; and
  • a child custody/visitation calendar. 

How can co-parenting technology help me stay safe?

Apps that track communications between parents can protect you in a few ways. If there is a dispute between you and your co-parent about what was said, there is an electronic record of it. Knowing communications may easily be seen by the judge might deter an abuser from using co-parenting communications to harass you. Alternatively, the log may help if you have to prove abuse or harassment in court or provide documentation to an attorney or law enforcement official.

These apps can also provide clear visitation schedules that clarify the custody arrangement when parents need to plan vacations or other activities. Using such tools therefore reduces the need for parents to speak in person or over the phone. This could reduce or eliminate your and your child’s exposure to high-conflict communications that may otherwise happen in person or over the phone.

Are there any risks with using co-parenting technology?

One risk to using co-parenting technology apps is that, just like other types of apps, it may require you to reveal more personally identifying information than you are comfortable sharing. Some aspects of the app that may affect your privacy or safety are:

  • It may require location services to be turned on;
  • It may collect and share data about you with other companies;
  • The app or web portal may not be secure;
  • You may only be able to use it from your phone, with no option to use a browser, which could be an issue if you think the abuser may be monitoring your phone;
  • It may not remove metadata from images or videos that you upload. The metadata could include sensitive information like your location. You can see what metadata a file has, and remove it, using online tools. If you are using a laptop or desktop, you can learn how to remove the metadata on the University of Michigan Safe Computing website. (WomensLaw is not affiliated with that website and cannot vouch for the  accuracy of it; we provide it for your information only.)

If you are uncomfortable with a particular app, you may be able to ask the judge to order a different app.

To think through whether or not using some sort of communication tool may work for your situation, you may want to talk to a lawyer who specializes in custody and domestic violence issues.

To learn more about custody in your state, go to our Custody page and select your state from the drop-down menu.