Image based abuse

What is Image-Based Abuse?

Image-based abuse happens when someone shares or threatens to share private images or videos of you without your consent. This type of abuse is often part of domestic, family, and sexual violence.

In Australia, sharing intimate photos without consent or using images to blackmail someone is against the law. You can report these actions to the police and the eSafety Commissioner.

Image-based abuse is a serious issue because it invades your privacy and can cause significant harm. Understanding this type of abuse is important to protect yourself and others. By knowing your rights and seeking support, you can regain control and ensure your safety.

Under Australian law

  • You have the right to privacy and safety.
  • Image-based abuse is never your fault.
  • Help is available, and you are not alone.

Forms of Image-Based Abuse

Image-based abuse can take many forms. Here are some examples:

  • Sharing Intimate Photos Without Consent: Posting or sending private photos or videos of you without your permission.
  • Threatening to Share Images: Using the threat of sharing private images to control or scare you.
  • Cultural or Religious Shaming: Sharing photos that misrepresent your cultural or religious practices without your consent.
  • Editing Images: Altering photos to misrepresent you and then sharing them.
  • Using Images for Blackmail: Demanding money or favours in exchange for not sharing the images.
  • Distributing Images Widely: Sharing private images on social media or other online platforms.

Non-Consensual Pornography

Non-consensual pornography, also known as "revenge porn," is when someone shares or threatens to share explicit images or videos of you without your consent. This is a severe form of image-based abuse and can have devastating effects on your mental and emotional well-being.

Keeping Yourself Safe

If you or someone you know is experiencing image-based abuse, here are some tips to help keep you safe:

  • Use a Safe Device: If you think your device is compromised, use a computer or phone that the abuser cannot access, like one at a public library.
  • Change Privacy Settings: Adjust the privacy settings on your social media accounts to limit who can see your information.
  • Report and Block: Report the abuse to the platform where it is happening and block the abuser.
  • Collect Evidence: Take screenshots of abusive messages and posts and save them on a safe device.
  • Seek Support: Talk to a trusted friend or family member about what is happening.

Collecting Evidence

If it is safe, collecting evidence of the abuse can help with legal investigations. For example, take screenshots of abusive messages and save them on a secure device. A domestic, family, or sexual violence service provider, the police, or a lawyer can advise you on what type of evidence is most useful for your case.

Getting Help

Before seeking help, be aware that this can be a risky situation as the abuse might get worse. A domestic, family, and sexual violence service can help you make a safety plan.

The eSafety Commissioner has developed resources in your language to help people experiencing technology-facilitated abuse.

WESNET also has a series of resources (English-only) on women’s safety and privacy.