Technology Abuse

Technology Abuse

 listen to this page

When someone uses technology (phones, social media or computers) to abuse, blackmail, manipulate or control you.


Examples of technology facilitated abuse:


  • Sending abusive texts, emails or messages via social media
  • Making repeated threatening phone calls
  • Tracking your location or using spyware
  • Checking your text messages, social media activity or internet activity
  • Forbidding you from having a phone or breaking your phone
  • Sharing or threatening to share intimate photos without consent (sometimes called revenge porn)
  • Forcing you to send nude images or taking nude images of you without your knowledge

Dealing with image-based abuse


For more information about sexting and sending nudes click here for First Nations created content, and here for young people.



Get Help


Below is a list of things that can help:

  1. Collect evidence safely
  2. Report it to eSafety Commission
  3. Stop contact
  4. Get more help


Being constantly harassed or monitored can, like any other form of abuse, leave you feeling powerless and justifiably fearful for your safety.


No one deserves to be abused, threatened or stalked by someone using technology. 


Click here for more information by eSafety Commission on things that can help.


To find help locally, click the button below.

Share by: