top of page
Claire's Community Logo
  • Grey Facebook Icon
  • Grey Instagram Icon

Digital Abuse

Digital abuse is a form of relationship violence where technology—such as texting, social media, or other online tools—is used to control, harass, threaten, or monitor a partner. It can include behaviors like excessive messaging, spreading rumors online, sharing private information or images without consent, or using devices and apps to track someone’s location.

​

As with all types of relationship violence, digital abuse is about power and control—using technology to intimidate, isolate, or manipulate another person. It can happen in any relationship and is just as harmful as abuse that happens offline.

Teen_Phone_RIA.jpg

Digital abuse is present when someone does the following to another person (current or former partner, friend, classmate, etc.):

​

  • Sending so many messages or liking so many of their photos and posts that it makes them uncomfortable

  • Keeping constant tabs and making the victim/survivor feel afraid when they do not respond to calls or texts

  • Looking through the other person's phone frequently to check in on texting and phone call history

  • Spreading rumors about them online or through texts

  • Creating a profile page about the other person without their permission

  • Posting embarrassing photos or information about them online

  • Writing nasty things about the victim/survivor on their profile page or anywhere online

  • Sending threatening text messages, DMs, or chats

  • Pressuring and threatening the other person to send sexual photos of themselves, and/or making them feel inferior if you don’t comply

  • Taking a video of the other prson and sending it to anyone else without your permission

  • Telling the other person who they can or can’t interact with or what posts they can or can’t like on social media

Elements and Tactics of Digital Abuse

This includes sending offensive messages, spreading rumors, or posting abusive comments on social media platforms.

The abuser might share (or threaten to share) explicit images or videos of the victim without their consent as a form of revenge or control.

They can install spyware on devices to monitor victims’ online activities or use GPS to track their physical location.

 They can hijack victims’ online identities, sending messages or making posts on their behalf to damage their reputation or relationships.

This is characterized by obsessive tracking of the victim’s online activities, such as tracking their location using GPS or spyware.

digitalpage-section-two-min.jpg

The abuser may gain unauthorized access to the victim’s personal information, including bank accounts, email, or social media profiles, to manipulate or control them.

They can control the victim’s communication with the outside world by monitoring their calls, messages, or social media interactions.

bottom of page