Skip to main content
Choose from website modes:
Languages

Violence or abuse through technology

question mark icon
I need help now
Get information on how to get help in an emergency
question mark icon
Exit site
Click to leave website and go to Google.

On this page, we talk about through technology.

Violence or abuse is when someone:

  • hurts you
  • scares you
  • controls you.

There is support available if the information on this page upsets you.

You can find out more on our page about support.

What violence or abuse through technology is

Violence or abuse through technology is when somebody tries to scare or control you using:

  • your phone
  • your computer
  • the internet.

It can take away your

When you have privacy, you can choose:

  • what you want to keep safe and private
  • what other people can know about you.

And it is against the law in Australia.

There are ways that you can protect yourself.

You can also get advice about what to do if you experience violence or abuse through technology.

It can be hard to know if you are experiencing violence or abuse through technology.

It can happen in lots of different ways.

For example:

  • in a text message
  • on social media
  • using a device in your home.

It is possible to experience violence or abuse through technology from anyone.

This includes:

  • someone you know
  • a stranger.

Examples of violence or abuse through technology

There are lots of different types of violence or abuse through technology.

For example, someone might use technology to keep track of:

  • where you go
  • who you spend time with
  • what you do on your devices.

Violence or abuse through technology can also include when someone:

  • threatens you
  • threatens someone you know
  • sends you mean messages.

It can include when someone online sends you lots of messages to make you feel bad.

They could use:

  • emails
  • text messages
  • social media sites
  • online dating sites.

Violence or abuse through technology can also be when someone online:

  • asks to have sex with you
  • sends you sexual photos that you do not want to receive.

And it can include when someone calls you or sends you a text message when you do not want them to.

They might put a camera in your home that you do not know about, so they can know:

  • what you are doing
  • who comes to visit you.

They could also check what you do on your computer and your phone.

For example, they could check:

  • what you do online
  • who you talk to online
  • what apps you use.

They might control how you use your computer and phone.

For example, by not letting you:

  • use the internet
  • contact people you know.

They might also threaten to share private photos or videos that you do not want other people to see.

If you think you might be experiencing violence or abuse through technology, you can ask somebody that you trust for support.

You can contact a helpline.

Helplines are phone numbers that will connect you to people who:

  • care about what you are going through
  • can give you good advice.

You can find out more on our page about helplines.

How to protect yourself online

There are things you can do to protect yourself from violence or abuse through technology.

For example, you can make sure that your phone has a good password that you do not use anywhere else.

Be careful when you share things online.

Think about:

  • if you are sharing something that should be private
  • if you can trust the person you are sharing things with.

Check the privacy settings on the social media sites that you use.

Choose options that make it harder for people to see information about you.

You should also think about setting up on all of your online accounts.

Multi‑factor authentication is when you use 2 different ways to log in to your account every time.

For example, setting up your email account so a code goes to your phone every time you want to log in.

What you can do

There are things you can do if you think you have experienced violence or abuse through technology.

You can look for a device that someone might be using to check what you are doing.

For example:

  • a hidden camera in your home
  • a hidden device in your car that tells someone where you are.

You can also change the passwords you use for your:

  • phone
  • email account
  • internet accounts.

You can also get legal advice about what to do.

You can find out more on our page about legal help after experiencing violence or abuse.

We have information and resources on this website to help you get the support you need.

You can find out more on our page about support.

You can think about how you can be safe.

You can find out more on our page about becoming safer.

You should take care of yourself.

You can find out more on our page about getting the most out of life.

Example story

We wrote a story to show an example of violence and abuse through technology.

The story we wrote is about a person called Mariam.

The story and the people in it are not real.

We made them up to explain violence and abuse through technology.

Mariam’s story

Mariam has just broken up with her boyfriend.

But he keeps showing up at places where she goes.

For example:

  • the shops
  • cafes
  • other people’s houses.

One day, Mariam and her friend go for a drive.

Mariam’s friend gets a notification on their phone.

The notification says there is a device hidden in the car that tells someone where the car is.

Mariam calls the police.

The police find the device inside her car.

They tell her that it belongs to Mariam’s ex‑boyfriend.

This is against the law.

And it is an example of violence and abuse through technology.