Technology Facilitated Abuse

What is Technology-Facilitated Abuse?

Technology-facilitated abuse happens when someone uses digital technology to control, coerce, or harm another person. This type of abuse is often part of domestic, family, and sexual violence.

In Australia, some forms of technology-facilitated abuse, like sharing intimate photos without consent or using surveillance software to spy on someone, are against the law. You can report these actions to the police and the eSafety Commissioner.

Technology-facilitated abuse is a serious issue because it invades your privacy and can cause significant harm. Understanding this type of abuse is important to protect yourself and others. By knowing your rights and seeking support, you can regain control and ensure your safety.

In Australia it is important to remember:

  • You have the right to use technology without fear of abuse.
  • Technology-facilitated abuse is never your fault.
  • Help is available, and you are not alone.

Forms of Technology-Facilitated Abuse

Technology-facilitated abuse can take many forms. Here are some examples:

  • Controlling WiFi Passwords: Keeping you from using the internet to isolate you.
  • Constantly Contacting You: Repeatedly calling or messaging to know where you are and what you are doing.
  • Monitoring Online Activity: Checking your social media, text messages, or internet use.
  • Restricting Device Use: Not allowing you to have a phone or computer, or to talk to friends and family online.
  • Sharing Intimate Photos Without Consent: Posting or sending private photos of you without your permission.
  • Cultural or Religious Shaming: Sharing photos that misrepresent your cultural or religious practices without your consent.
  • Spying and Tracking: Using software or devices to monitor your location or activities without your knowledge.

Keeping Yourself Safe

If you or someone you know is experiencing technology-facilitated abuse, here are some tips to help keep you safe:

  • Use a Safe Device: If you think your device is being monitored, use a computer or phone that the abuser cannot access, like one at a public library.
  • Delete Browser History: Clear your browsing history regularly on browsers like Google Chrome, Safari, and Microsoft Edge.
  • Change Passwords: Change your passwords and do not use them on devices you think are monitored.
  • Use Quick Exit Buttons: On some websites, there are quick exit buttons to leave the site quickly. Remember, some sites can still appear in your browser history.
  • Use Private Mode: Browse in incognito or private mode so your web pages are not recorded.
  • Check for Tracking Devices: Look for tracking devices like AirTags in your belongings and turn off location tracking on your phone or tablet.

Collecting Evidence

If it is safe, collecting evidence of the abuse can help with legal investigations. For example, take screenshots of abusive messages and save them on a safe device. A domestic, family, or sexual violence service provider, the police, or a lawyer can advise you on what type of evidence is most useful for your case.

Getting Help

Before seeking help, be aware that this can be a risky situation as the abuse might get worse. A domestic, family, and sexual violence service can help you make a safety plan.

The eSafety Commissioner has developed resources in your language to help people experiencing technology-facilitated abuse.

WESNET also has a series of resources (English-only) on women’s safety and privacy.