Tech­nol­o­gy facil­i­tat­ed vio­lence and abuse is a seri­ous issue. When peo­ple sep­a­rate it is not uncom­mon for a dis­grun­tled spouse to turn to social media such as Face­book to vent their unhap­pi­ness. But when does the use of social media in this man­ner become some­thing more?

In this pub­li­ca­tion, we dis­cuss Cyber Abuse and pro­vide help­ful tips for col­lect­ing and stor­ing evi­dence safely. 

What is Cyber Abuse?

A help­ful def­i­n­i­tion of Cyber abuse’ can be found on the eSafe­ty Com­mis­sion­ers web­site. Cyber abuse is defined as online behav­iour which is rea­son­ably like­ly to have a seri­ous­ly threat­en­ing, intim­i­dat­ing, harass­ing or humil­i­at­ing effect on a per­son. It is behav­iour that threat­ens to hurt a per­son social­ly, psy­cho­log­i­cal­ly or even physically.’

Cyber abuse can occur through a range of plat­forms includ­ing social media (such as Face­book, Insta­gram, Twit­ter), games or oth­er online forums to make:

  • abu­sive, degrad­ing or hate­ful com­ments about a person;
  • threats of phys­i­cal or sex­u­al vio­lence to a per­son; or
  • repeat­ed or unwant­ed sex­u­al requests to a person.

Behav­iours that may also con­sti­tute abuse include:

  • Shar­ing, or threat­en­ing to share, inti­mate or sex­u­al pho­tos or videos of a per­son online with­out their consent.
  • Encour­ag­ing vul­ner­a­ble peo­ple to self harm.
  • Stalk­ing a per­son online — reg­u­lar­ly check­ing a per­son­’s social media activ­i­ty such as Face­book, Insta­gram etc.
  • Hack­ing into a person’s email or social media account to imper­son­ate them.
  • Cre­at­ing fake social media accounts. For exam­ple, cre­at­ing a Face­book account in anoth­er person’s name using some­one else’s pic­ture. Many peo­ple know this as cat­fish­ing”.
  • Spread­ing lies or mali­cious rumours about a person.
  • Threat­ing vio­lence or incit­ing oth­ers to do the same.
  • Repeat­ed­ly mak­ing unwant­ed con­tact with a per­son by call­ing, email­ing, tex­ting, mes­sag­ing, or send­ing obscene material.
  • Mon­i­tor­ing anoth­er person’s move­ments using GPS, track­ing apps or spyware.

Prov­ing online abuse

While there are laws that can help with this, with­out evi­dence it will be dif­fi­cult to prove to Police and the Courts that this is happening.

There are a num­ber of ways you can col­lect evi­dence of cyber abuse how­ev­er you must only do so if it is safe to.

Here are some help­ful tips when col­lect­ing evidence:

  • Always seek legal advice first (if you can). Your lawyer is the best per­son to tell you what evi­dence may be required in your case.
  • Take screen shots of abu­sive posts, texts or emails. If you don’t know how to do this ask some­body you trust to show you.
  • Save or copy voice mail mes­sages. You can do this by record­ing the mes­sage on a sep­a­rate device or a Dic­ta­phone. Make sure that your abuser can’t find the device con­tain­ing the recording.
  • Keep a copy of all emails, let­ters and fax­es sent to you.
  • Save your evi­dence some­where the abuser can’t find it. A good idea is to save your evi­dence on two USBs. You keep one and secret­ly give the oth­er to a friend. If your abuser finds your USB, you have not lost your evidence.

About eSafe­ty Women

eSafe­ty Women is an ini­tia­tive of the Office of the Children’s eSafe­ty Com­mis­sion­er which forms part of the Aus­tralian Government’s Women’s Safe­ty Pack­age to Stop the Vio­lence. It aims to help women man­age tech­nol­o­gy risks and abuse by giv­ing women the tools they need to be con­fi­dent when online.

The eSafe­ty web­site is packed full of help­ful resources to assist women stay con­nect­ed safely.

Need Help?

If you feel as though you are being sub­ject to, or at risk of tech­nol­o­gy facil­i­tat­ed vio­lence or abuse, please con­tact our Fam­i­ly Lawyers today.

If you would like to repub­lish this arti­cle, it is gen­er­al­ly approved, but pri­or to doing so please con­tact the Mar­ket­ing team at marketing@​swaab.​com.​au. This arti­cle is not legal advice and the views and com­ments are of a gen­er­al nature only. This arti­cle is not to be relied upon in sub­sti­tu­tion for detailed legal advice.

Publications

Assess­ing Scope 3 Emis­sions: An analy­sis of the impli­ca­tions of Den­man Aberdeen Muswell­brook Scone Healthy Envi­ron­ment Group Inc v MACH Ener­gy Aus­tralia Pty Ltd [2025] NSW­CA 163 (the Mount Pleas­ant decision)

Intro­duc­tionOn July 24, 2025, the New South Wales Court of Appeal (NSW­CA) deliv­ered a land­mark rul­ing in Den­man Aberdeen Muswell­brook Scone…

Work­place Rela­tion­ships: The Legal Posi­tion (Cold­play Con­cert Edition)

The recent sto­ry of col­leagues (a Chief Exec­u­tive Offi­cer and Chief Peo­ple Offi­cer (CPO)) whose appar­ent rela­tion­ship was cap­tured on…

Dis­missal for Dissent?

The recent unfair dis­missal deci­sion of the Fair Work Com­mis­sion, Shaun Turn­er v Dare­bin City Coun­cil [2025] FWC 1763, in which Deputy…

In the News

Michael Byrnes is quot­ed in the arti­cle, Employ­ee award­ed $305k in record sex­u­al harass­ment pay­out”, pub­lished in HRM Online on 12 August 2025

Michael Byrnes is quot­ed in the arti­cle, ​“Employ­ee award­ed $305k in record sex­u­al harass­ment pay­out”, pub­lished in HRM Online on…

Michael Byrnes appeared on Mon­ey News with Evan Lucas on 2GB on 4 August 2025 to dis­cuss the pro­posed Vic­to­ri­an state gov­ern­ment work from home laws

Michael Byrnes appeared on Mon­ey News with Evan Lucas on 2GB on 4 August 2025 to dis­cuss the pro­posed Vic­to­ri­an state gov­ern­ment…

Julie Briscoe attend­ed an event last night host­ed by NSW Gov­er­nor Mar­garet Bea­z­ley, cel­e­brat­ing Tour de Cure’s sup­port for world-class can­cer research breakthroughs.

Her Excel­len­cy the Hon­ourable Mar­garet Bea­z­ley AC KC, Gov­er­nor of New South Wales, and patron of Tour de Cure, host­ed…

Sign up for our Newsletter

*Mandatory information