The DIVA Dictionary
A comprehensive glossary of terms related to online safety and abuse.
| Term | Definition | Category |
|---|---|---|
| Technology-Facilitated Abuse (TFA) | The overarching term for any form of abuse, harassment, or control that uses digital technology as a tool. | Core Concepts |
| Technology-Facilitated Gender-Based Violence (TFGBV) | A specific form of TFA that targets individuals based on their gender, often using misogynistic narratives and tactics. | Core Concepts |
| Technology-Facilitated Violence Against Women and Girls (TFVAWG) | A subset of TFGBV focusing specifically on the experiences of women and girls. | Core Concepts |
| Cyberviolence Against Women and Girls (CVAWG) | A specific form of Technology-Facilitated Gender-Based Violence (TFGBV) focusing on the experiences of women and girls. | Core Concepts |
| Online Gender-Based Violence (OGBV) | Violence directed at individuals based on their gender that occurs online. | Core Concepts |
| Digital Violence | A general, often interchangeable term for harmful behaviors conducted using technology. | Core Concepts |
| Cyber Violence | A general, often interchangeable term for harmful behaviors conducted using technology. | Core Concepts |
| Online Abuse | A general term for any form of abuse, harassment, or control that uses digital technology as a tool. | Core Concepts |
| Cyber Abuse | A general term for any form of abuse, harassment, or control that uses digital technology as a tool. | Core Concepts |
| Tech-Enabled Abuse | A general term for any form of abuse, harassment, or control that uses digital technology as a tool. | Core Concepts |
| Tech-Based Abuse | A general term for any form of abuse, harassment, or control that uses digital technology as a tool. | Core Concepts |
| Digital Abuse | A general term for any form of abuse, harassment, or control that uses digital technology as a tool. | Core Concepts |
| Online Harms | A broad term used by governments and platforms to describe a wide range of negative online content and behaviors. | Legal & Policy |
| Technology-Facilitated Coercive Control | Using technology to monitor, control, and isolate a current or former partner. | Core Concepts |
| Technology-Facilitated Domestic Abuse | The use of technology as part of a pattern of domestic abuse. | Core Concepts |
| Digital Coercive Control | Using technology to monitor, control, and isolate a current or former partner. Also known as Technology-Facilitated Coercive Control. | Core Concepts |
| Cyberstalking | The use of the internet or other electronic means to stalk or harass an individual, often involving monitoring their online activity, location, and communications. | Core Concepts |
| Online Stalking | The use of the internet or other electronic means to stalk or harass an individual. | Core Concepts |
| Cyberbullying | The use of digital technology to threaten, harass, embarrass, or target another person. It can occur on social media, in games, or through messaging apps. | Youth-Focused |
| Online Harassment | A broad category of behaviors that use technology to target and distress an individual. Also known as Digital Harassment or Electronic Harassment. | Core Concepts |
| Digital Harassment | A broad category of behaviors that use technology to target and distress an individual. Also known as Online Harassment or Electronic Harassment. | Core Concepts |
| Electronic Harassment | A broad category of behaviors that use technology to target and distress an individual. Also known as Online Harassment or Digital Harassment. | Core Concepts |
| Image-Based Abuse | The non-consensual creation, sharing, or threat of sharing of intimate or nude images. Also known as Image-Based Sexual Abuse (IBSA). | Core Concepts |
| Non-Consensual Intimate Image Sharing | A specific form of Image-Based Abuse where intimate images are shared without the consent of the person pictured. Also known as NCII. | Legal & Policy |
| Non-Consensual Pornography | A term for sharing intimate images without the consent of the person pictured. See also Image-Based Abuse. | Legal & Policy |
| Revenge Porn | An outdated term for sharing intimate images without the consent of the person pictured. The motive is not always revenge, which is why terms like Image-Based Abuse are now preferred. | Legal & Policy |
| Sextortion | A form of blackmail where a perpetrator threatens to distribute a victim's intimate images unless they provide more images, money, or sexual favors. | Core Concepts |
| Sexual Image Exploitation | Using technology to sexually exploit someone, which can include grooming, sextortion, or human trafficking. | Youth-Focused |
| Doxing | Short for 'dropping docs,' this is the act of researching and broadcasting private or identifying information about an individual or organization to the public without their permission, often with malicious intent. | Core Concepts |
| Doxxing | An alternative spelling for 'Doxing.' | Core Concepts |
| Online Impersonation | Creating a fake profile or accessing someone's real account to pretend to be them, often to damage their reputation or trick others. | Core Concepts |
| Digital Impersonation | Creating a fake profile or accessing someone's real account to pretend to be them, often to damage their reputation or trick others. | Core Concepts |
| Identity Misuse | Stealing someone's identity not for financial gain, but to use it to harass them or others. | Core Concepts |
| Deepfake Abuse | Using artificial intelligence to create realistic but fake explicit videos or images of a person without their consent. Also known as Deepfake Pornography, Synthetic Image Abuse, or AI-Generated Sexual Abuse. | AI & Emerging Tech |
| Deepfake Pornography | Using artificial intelligence to create realistic but fake explicit videos or images of a person without their consent. Also known as Deepfake Pornography, Synthetic Image Abuse, or AI-Generated Sexual Abuse. | AI & Emerging Tech |
| Synthetic Image Abuse | Using artificial intelligence to create realistic but fake explicit videos or images of a person without their consent. See also Deepfake Abuse. | AI & Emerging Tech |
| AI-Generated Sexual Abuse | Using artificial intelligence to create realistic but fake explicit videos or images of a person without their consent. See also Deepfake Abuse. | AI & Emerging Tech |
| Cyberflashing | Sending someone sexually explicit images or videos they did not ask for or consent to receiving. | Core Concepts |
| Unsolicited Explicit Images | Sending someone sexually explicit images or videos they did not ask for or consent to receiving. See also Cyberflashing. | Core Concepts |
| Online Hate Speech | Publicly directing abusive or threatening speech at individuals or groups. | Core Concepts |
| Gendered Hate Speech | Publicly directing abusive or threatening speech at individuals or groups, specifically targeting them based on their gender. | Core Concepts |
| Online Threats | Making explicit threats of violence against someone online. | Core Concepts |
| Digital Threats | Making explicit threats of violence against someone online. | Core Concepts |
| Rape Threats Online | Threats of rape made against LGBTQ+ individuals with the stated aim of "correcting" their sexual orientation or gender identity. | LGBTQIA+ Specific |
| Death Threats Online | Making explicit threats of violence against someone online. | Core Concepts |
| Harassment via Messaging | Overwhelming a person with a large volume of unwanted messages. Also known as Abusive Text Bombing or Message Flooding. | Platform-Specific |
| Abusive Text Bombing | Overwhelming a person with a large volume of unwanted messages. Also known as Abusive Text Bombing or Message Flooding. | Platform-Specific |
| Message Flooding | Overwhelming a person with a large volume of unwanted messages. Also known as Abusive Text Bombing. | Platform-Specific |
| Dogpiling | When a large group of people coordinate to harass a single target online. Also known as Pile-On Harassment or Coordinated Harassment. | Core Concepts |
| Pile-On Harassment | When a large group of people coordinate to harass a single target online. Also known as Dogpiling. | Core Concepts |
| Coordinated Harassment | When a large group of people coordinate to harass a single target online. Also known as Dogpiling or Pile-On Harassment. | Core Concepts |
| Targeted Harassment Campaigns | Coordinated efforts by a group to harass a specific individual online. | Core Concepts |
| Defamation | Spreading false information about someone online to damage their reputation. Also known as Online Defamation, Cyber Defamation, Reputation Attacks, or Smear Campaigns. | Core Concepts |
| Online Defamation | Spreading false information about someone online to damage their reputation. Also known as Online Defamation, Cyber Defamation, Reputation Attacks, or Smear Campaigns. | Core Concepts |
| Cyber Defamation | Spreading false information about someone online to damage their reputation. Also known as Online Defamation, Cyber Defamation, Reputation Attacks, or Smear Campaigns. | Core Concepts |
| Reputation Attacks | Spreading false information about someone online to damage their reputation. Also known as Online Defamation, Cyber Defamation, Reputation Attacks, or Smear Campaigns. | Core Concepts |
| Smear Campaigns | A coordinated effort to damage someone's reputation by spreading false and malicious information online. | Core Concepts |
| Cyber Hate | The expression of hatred towards individuals or groups online. | Core Concepts |
| Gendered Disinformation | Spreading false or misleading information specifically designed to harm women or promote misogynistic ideas. | Core Concepts |
| Malicious Rumour Spreading | Intentionally spreading false and harmful rumors about someone online. | Core Concepts |
| Slut-Shaming Online | Attacking and shaming women and girls for their real or perceived sexual behavior. | Core Concepts |
| Victim-Blaming Online | Blaming the victim of an attack or crime for what happened to them, rather than the perpetrator. | Core Concepts |
| Trolling | The act of deliberately posting inflammatory or off-topic comments with the main goal of provoking an emotional response or disrupting a conversation for the troll's amusement. | Core Concepts |
| Gendered Trolling | A form of trolling that specifically uses misogynistic or gender-based insults to provoke a reaction. | Core Concepts |
| Flaming | The act of posting inflammatory or offensive comments to provoke an emotional response, often as part of Trolling. | Core Concepts |
| Cyber Mobbing | A coordinated effort by a group to harass a specific individual online. | Core Concepts |
| Stalking via Location Tracking | Using technology like GPS or location-sharing apps to monitor someone's movements without their consent. | Core Concepts |
| Digital Surveillance | Using technology like GPS or location-sharing apps to monitor someone's movements without their consent. | Core Concepts |
| Intimate Partner Surveillance | Using technology to monitor a current or former partner's location, communications, or online activity without consent. | Core Concepts |
| GPS Tracking Abuse | Using technology like GPS or location-sharing apps to monitor someone's movements without their consent. | Core Concepts |
| Location Tracking Abuse | Using technology like GPS or location-sharing apps to monitor someone's movements without their consent. | Core Concepts |
| Spyware | Software secretly installed on a person's device to monitor their activity, including calls, messages, location, and app usage. Also known as Stalkerware. | Platform-Specific |
| Stalkerware | Software secretly installed on a person's device to monitor their activity. A form of spyware often used in cases of intimate partner surveillance. | Platform-Specific |
| Tracking Apps | Software secretly installed on a person's device to monitor their activity, including calls, messages, location, and app usage. Also known as Stalkerware. | Platform-Specific |
| Hidden Tracking Devices | Using small physical devices like Apple AirTags or Tiles to secretly track a person's location. | Platform-Specific |
| Account Monitoring Without Consent | Gaining access to and monitoring someone's email, social media, or other online accounts without their permission. Also known as Unauthorized Account Access. | Core Concepts |
| Unauthorized Account Access | Gaining access to and monitoring someone's email, social media, or other online accounts without their permission. | Core Concepts |
| IoT Abuse | Using internet-connected "smart" devices (like speakers, thermostats, or locks) to control, harass, or monitor someone. Also known as Smart Home Abuse. | Platform-Specific |
| Smart Home Abuse | Using internet-connected "smart" devices (like speakers, thermostats, or locks) to control, harass, or monitor someone. Also known as IoT Abuse. | Platform-Specific |
| Connected Device Abuse | Using internet-connected "smart" devices (like speakers, thermostats, or locks) to control, harass, or monitor someone. Also known as IoT (Internet of Things) Abuse or Smart Home Abuse. | Platform-Specific |
| Access Control Abuse | Using technology to monitor, control, and isolate a current or former partner. | Core Concepts |
| Password Coercion | Forcing someone to hand over their passwords. A form of Forced Account Access. | Core Concepts |
| Password Theft | Stealing someone's password to gain unauthorized access to their accounts. | Core Concepts |
| Forced Account Access | Forcing someone to hand over their passwords or stealing them to gain control of their digital life. | Core Concepts |
| Digital Isolation | Using technology to cut someone off from their friends, family, and support networks. | Core Concepts |
| Communication Blocking | Using technology to cut someone off from their friends, family, and support networks. A form of Digital Isolation. | Core Concepts |
| Social Media Isolation | Using social media to cut someone off from their friends and support networks. A form of Digital Isolation. | Core Concepts |
| Information and Communication Technologies Abuse (ICT Abuse) | A formal term for using any information or communication technology for abusive purposes. | Legal & Policy |
| Platform-Facilitated Abuse | Abuse that is enabled or made easier by the features of a specific social media platform or app. | Platform-Specific |
| App-Based Abuse | A general term for abuse that occurs through a specific mobile application. | Platform-Specific |
| Online Privacy Invasion | The unauthorized collection, use, or sharing of someone's personal data. | Core Concepts |
| Digital Privacy Violations | The unauthorized collection, use, or sharing of someone's personal data. | Core Concepts |
| Data-Enabled Abuse | Using data collected about a person, even if they don't have a profile on a platform, to target them with abuse. | Platform-Specific |
| Digital Coercion | Using technology to pressure or force someone into doing something they don't want to do. | Core Concepts |
| Online Coercion | Using technology to pressure or force someone into doing something they don't want to do. | Core Concepts |
| Offline Escalation of Online Abuse | When online threats or harassment lead to real-world violence or stalking. | Core Concepts |
| Algorithmic Harassment | When a platform's algorithms unintentionally promote and spread harassing content, making it more visible. Also known as Algorithmic Harassment. | AI & Emerging Tech |
| Algorithmic Amplification of Abuse | When a platform's algorithms unintentionally promote and spread harassing content, making it more visible. Also known as Algorithmic Harassment. | AI & Emerging Tech |
| Online Dating Abuse | Abusive or harassing behavior that occurs on or is facilitated by dating apps. | Platform-Specific |
| Dating App Harassment | Abusive or harassing behavior that occurs on or is facilitated by dating apps. | Platform-Specific |
| Digital Power and Control | The use of technology to exert power and control over another person, a key element of domestic abuse. | Core Concepts |
| Tech-Enabled Control | The use of technology to exert power and control over another person, a key element of domestic abuse. | Core Concepts |
| Online Grooming | Building an emotional connection with a young person online to gain their trust for the purpose of sexual exploitation. | Youth-Focused |
| Sexual Grooming Online | Building an emotional connection with a young person online to gain their trust for the purpose of sexual exploitation. | Youth-Focused |
| Online Defamation Campaigns | Coordinated efforts to destroy someone's reputation online using false information. | Core Concepts |
| Non-Consensual Distribution of Intimate Content | A formal term for sharing intimate images or videos without consent. | Legal & Policy |
| Threatened Distribution of Intimate Images | Threatening to share someone's private images, a common tactic in sextortion and coercive control. | Core Concepts |
| Sexual Exploitation via ICT | Using technology to sexually exploit someone, which can include grooming, sextortion, or human trafficking. | Youth-Focused |
| Online Sexual Exploitation | Using technology to sexually exploit someone, which can include grooming, sextortion, or human trafficking. | Youth-Focused |
| Psychological Abuse Online | Using technology to cause emotional or psychological harm. | Core Concepts |
| Emotional Abuse via Technology | Using technology to cause emotional or psychological harm. | Core Concepts |
| Economic Abuse via Technology | Using technology to control someone's finances, such as by restricting access to online banking or running up debt in their name. A form of Economic Abuse. | Core Concepts |
| Financial Control Through Tech | Using technology to control someone's finances, such as by restricting access to online banking or running up debt in their name. A form of Economic Abuse. | Core Concepts |
| Technological Harassment | A general term for harassment using any form of technology. | Core Concepts |
| Account Takeover | Gaining unauthorized control of someone's online account. Also known as Account Hijacking or Profile Hacking. | Platform-Specific |
| Account Hijacking | Gaining unauthorized control of someone's online account. Also known as Account Takeover or Profile Hacking. | Platform-Specific |
| Profile Hacking | Gaining unauthorized control of someone's online account. Also known as Account Takeover. | Platform-Specific |
| Forced Surveillance of Children | Using tracking apps to excessively monitor a teenager's movements and activities after school. | Youth-Focused |
| Fake Online Profiles | Creating a fake online identity to deceive someone, often for a relationship or financial gain. See also Catfishing. | Core Concepts |
| Catfishing | The act of creating a fake online identity to deceive someone into a relationship. This is often done for personal gain, to cause emotional distress, or for malicious purposes. | Core Concepts |
| Malicious Sharing of Private Messages | Screenshotting and sharing private conversations without consent to embarrass or harm someone. | Platform-Specific |
| Threat to Publish Personal Data | Threatening to reveal private information or doxing them. Also known as Dox-Threats. | Core Concepts |
| Outing | The act of revealing private information about someone, such as their sexual orientation, without their consent. | LGBTQIA+ Specific |
| Dox-Threats | Threatening to reveal private information or doxing them. Also known as Dox-Threats. | Core Concepts |
| Platform Algorithm Abuse | Exploiting platform algorithms to specifically target an individual with a barrage of negative content or harassment. | AI & Emerging Tech |
| Cybersex Trafficking | A form of human trafficking that uses technology to recruit, groom, and sexually exploit victims online. | Legal & Policy |
| Livestreamed Sexual Exploitation | Broadcasting sexual exploitation in real-time online. | Youth-Focused |
| Malware-Based Surveillance | Software secretly installed on a person's device to monitor their activity, including calls, messages, location, and app usage. Also known as Stalkerware. | Platform-Specific |
| Device Compromise | Gaining unauthorized control of someone's computer or phone to terrorize or surveil them. Also known as Device Takeover. | Platform-Specific |
| Online Abuse Legislation | Laws and statutes designed to address various forms of online abuse. | Legal & Policy |
| Digital Rights Violations | Actions online that violate a person's established rights, such as the right to privacy or freedom from harassment. | Legal & Policy |
| Data Protection Violations | Breaches of laws that are designed to protect an individual's privacy from intrusion by state or private actors. | Legal & Policy |
| Cybercrime Against Individuals | Laws that deal with crimes that are committed on the internet or a computer network. | Legal & Policy |
| Platform Safety Policy | The features provided by platforms to help users stay safe, such as blocking and reporting tools. | Platform-Specific |
| Content Moderation Abuse | Coordinated campaigns to falsely report a user's account to get it suspended. Also known as Mass Reporting Attacks. | Platform-Specific |
| Platform Reporting Evasion | Tactics used by abusers to avoid being detected or penalized by a platform's content moderation systems. | Platform-Specific |
| Safety by Design | An approach to building apps and platforms where user safety is a core consideration from the very beginning of the design process. | Platform-Specific |
| Digital Harm Metrics | A broad term used by governments and platforms to describe a wide range of negative online content and behaviors. | Legal & Policy |
| Online Abuse Prevalence | A broad term used by governments and platforms to describe a wide range of negative online content and behaviors. | Legal & Policy |
| Intersectional Online Abuse | Abuse that targets an individual based on multiple, intersecting aspects of their identity (e.g., race, gender, and sexual orientation). | Cultural & Regional |
| Digital Abuse Continuum | A broad category of behaviors that use technology to target and distress an individual. Also known as Online Harassment or Electronic Harassment. | Core Concepts |
| Online Misogyny | Online abuse that is rooted in the hatred of women. Also known as Cybersexism. | Core Concepts |
| Cybersexism | Online abuse that is rooted in the hatred of women. Also known as Online Misogyny. | Core Concepts |
| Online Gender Trolling | A form of trolling that specifically uses misogynistic or gender-based insults to provoke a reaction. | Core Concepts |
| Digital Patriarchal Abuse | A specific form of TFA that targets individuals based on their gender, often using misogynistic narratives and tactics. | Core Concepts |
| Sexual Identity Harassment Online | Forms of online abuse targeting individuals based on their sexual or gender identity. | LGBTQIA+ Specific |
| Transphobic Online Abuse | Forms of online abuse targeting individuals based on their gender identity. | LGBTQIA+ Specific |
| Homophobic Cyber Abuse | Forms of online abuse targeting individuals based on their sexual orientation. | LGBTQIA+ Specific |
| Racist Online Abuse | Forms of online abuse targeting individuals based on their race. | Cultural & Regional |
| Gendered Online Ridicule | Mocking or ridiculing someone online in a way that specifically targets their gender. | Core Concepts |
| Algorithmic Bias in Abuse Spread | How algorithms can be biased and unintentionally spread abuse targeting certain groups more than others. | AI & Emerging Tech |
| Geo-location Exploitation | Using the location data (geotags) in photos or posts to find and harass a person in the real world. | Platform-Specific |
| Platform Exploitation | Abuse that is enabled or made easier by the features of a specific social media platform or app. | Platform-Specific |
| Online Psychological Manipulation | Using technology to cause emotional or psychological harm. | Core Concepts |
| Gaslighting via Technology | Using technology to manipulate someone into questioning their own sanity or reality. | Core Concepts |
| Identity Theft for Abuse | Stealing someone's identity not for financial gain, but to use it to harass them or others. | Core Concepts |
| Threat Messaging Across Channels | Harassing a target across multiple different platforms simultaneously. | Platform-Specific |
| Cross-Platform Harassment | Harassing a target across multiple different platforms simultaneously. | Platform-Specific |
| Image Manipulation Abuse | Altering someone's photo to be humiliating or sexually explicit, often known as "Photoshopped" sexual images. | AI & Emerging Tech |
| Photoshopped Sexual Images | Altering someone's photo to be humiliating or sexually explicit. A form of Image Manipulation Abuse. | AI & Emerging Tech |
| Non-Consensual Identity Sharing | Revealing someone's personal details without their consent. | Core Concepts |
| Digital Exclusion | The act of deliberately and publicly leaving someone out of an online group, conversation, or event, causing them to feel isolated. Also known as Exclusion or Online Shunning. | Core Concepts |
| Online Shunning | Deliberately excluding someone from online social groups. A form of Digital Exclusion. | Core Concepts |
| Mobile Device Abuse | Using a person's mobile phone as a tool for abuse, such as by monitoring it or controlling their access to it. | Platform-Specific |
| Digital Surveillance Culture | The gradual expansion of AI-powered surveillance into more areas of public and private life. | AI & Emerging Tech |
| Digital Safety Planning | The process of creating a plan to increase one's safety online, especially when experiencing abuse. | Core Concepts |
| Online Safety Tools | The features provided by platforms to help users stay safe, such as blocking and reporting tools. | Platform-Specific |
| Platform Blocking Tools | The features provided by platforms to help users stay safe, such as blocking and reporting tools. | Platform-Specific |
| Online Reporting Systems | The features provided by platforms to help users stay safe, such as blocking and reporting tools. | Platform-Specific |
| Digital Literacy for Safety | Education focused on providing the skills and knowledge needed to navigate the digital world safely. Also known as ICT Safety Education. | Youth-Focused |
| ICT Safety Education | Education focused on providing the skills and knowledge needed to navigate the digital world safely. Also known as ICT Safety Education. | Youth-Focused |
| Legal Remedies for Online Abuse | Non-criminal legal options for victims of online abuse, such as suing for damages or seeking an injunction. | Legal & Policy |
| Digital Resilience | The ability to cope with and recover from negative experiences online. | Core Concepts |
| Behavioral Tracking Abuse | Misusing advertising technology or behavioral tracking for stalking or harassment. | Workplace & Professional |
| Ad Tech Misuse | Misusing advertising technology or behavioral tracking for stalking or harassment. | Workplace & Professional |
| Fake News Harassment | Spreading false or misleading information specifically designed to harm women or promote misogynistic ideas. | Core Concepts |
| Disinformation for Harassment | Spreading false or misleading information specifically designed to harm women or promote misogynistic ideas. | Core Concepts |
| Coercive Messaging | Using messaging apps to control or coerce someone. | Core Concepts |
| Data Misuse for Harm | The unauthorized collection, use, or sharing of someone's personal data. | Core Concepts |
| Content Manipulation Abuse | Altering content to be harmful or misleading. | AI & Emerging Tech |
| User Profile Hijacking | Taking control of someone's user profile. | Platform-Specific |
| Unwanted Sexual Solicitation | Repeatedly sending unwanted sexual messages or requests. | Core Concepts |
| Networked Harassment | Harassment that leverages a network of people or accounts. | Core Concepts |
| Bot-Driven Harassment | Using automated bots to send large volumes of harassing messages. Also known as Automated Abuse. | AI & Emerging Tech |
| Automated Abuse | Using automated bots to send large volumes of harassing messages. Also known as Bot-Driven Harassment. | AI & Emerging Tech |
| Social Engineering Abuse | The psychological manipulation of people into performing actions or divulging confidential information. Phishing and baiting are common forms. | General & Technical |
| Phishing for Abuse | A social engineering tactic where a scammer tricks someone into giving up their login details, which are then used to take over accounts for abuse rather than financial gain. | General & Technical |
| Encoded Threats | Sending threats hidden in coded language, memes, or emojis. | Core Concepts |
| Threat Amplification | Using social media to make a threat more visible and widespread. | Platform-Specific |
| Public Records Abuse | Using publicly available records to find information for doxing or harassment. | Core Concepts |
| Platform Policy Evasion | Tactics used by abusers to avoid being detected or penalized by a platform's content moderation systems. | Platform-Specific |
| Anonymous Abuse | Using anonymity to send abusive or threatening content, often to evade platform policies. | Core Concepts |
| Anonymous Threatening | Using anonymity to send abusive or threatening content, often to evade platform policies. | Core Concepts |
| Cross-Border Online Abuse | International agreements and cooperation between law enforcement agencies to tackle cybercrime that spans multiple countries. | Legal & Policy |
| Peer-to-Peer Abuse Sharing | Abuse that occurs between peers, often in a school or social context, using digital technology. | Youth-Focused |
| Media Stalking | Stalking someone by obsessively monitoring their media appearances, interviews, and social media. | Core Concepts |
| Digital Extortion | Threatening to release embarrassing or compromising deepfake videos or images unless a ransom is paid. | AI & Emerging Tech |
| Account Cloning | Creating a copy of someone's social media profile to trick their friends or damage their reputation. Also known as Profile Cloning. | Platform-Specific |
| Profile Cloning | Creating a copy of someone's social media profile to trick their friends or damage their reputation. Also known as Account Cloning. | Platform-Specific |
| Online Reputation Sabotage | A deliberate campaign to ruin someone's reputation online. | Workplace & Professional |
| Persistent Identity Harassment | A deliberate campaign to ruin someone's reputation online. | Workplace & Professional |
| Shadow Profile Abuse | Using data collected about a person, even if they don't have a profile on a platform, to target them with abuse. | Platform-Specific |
| Platform Algorithm Exploitation | Exploiting platform algorithms to specifically target an individual with a barrage of negative content or harassment. | AI & Emerging Tech |
| Device Takeover | Gaining remote control of someone's computer or phone to terrorize or surveil them. Also known as Device Takeover. | Platform-Specific |
| Remote Device Control Abuse | Gaining remote control of someone's computer or phone to terrorize or surveil them. Also known as Device Takeover. | Platform-Specific |
| Non-Consensual Recording | Recording or capturing someone's conversations or activities without their consent. Also known as Voyeuristic Recording or Eavesdropping Abuse. | Core Concepts |
| Voyeuristic Recording | Recording or capturing someone's conversations or activities without their consent. | Core Concepts |
| Eavesdropping Abuse | Recording or capturing someone's conversations or activities without their consent. | Core Concepts |
| Screen Capture Abuse | Capturing images or video of someone's screen without their consent. | Core Concepts |
| Cloud Storage Abuse | Gaining unauthorized access to someone's cloud storage (like Google Drive or iCloud) to steal private files. | Platform-Specific |
| Shared Network Abuse | Abusing a shared Wi-Fi network to monitor or intercept another user's traffic. | Core Concepts |
| Child Sexual Abuse Material Distribution | The illegal sharing of child sexual abuse material (CSAM). | Youth-Focused |
| Online Child Grooming | Using a fake identity or false pretences to groom a child online. | Youth-Focused |
| Solicitation Under False Pretences | Using a fake identity or false pretences to groom a child online. | Youth-Focused |
| Threatened Disclosure of Communications | Threatening to share someone's private images, a common tactic in sextortion and coercive control. | Core Concepts |
| Public Exposure of Private Information | The act of revealing private information about someone, such as their sexual orientation, without their consent. | LGBTQIA+ Specific |
| Coordinated Account Reporting Abuse | Coordinated campaigns to falsely report a user's account to get it suspended. Also known as Mass Reporting Attacks. | Platform-Specific |
| Mass Reporting Attacks | Coordinated campaigns to falsely report a user's account to get it suspended. Also known as Coordinated Account Reporting Abuse. | Platform-Specific |
| Privileged Account Misuse | Using legitimate access to a system (e.g., as a system administrator) to abuse or harass someone. | Workplace & Professional |
| Impersonation for Blackmail | Impersonating someone to gather information that can then be used for blackmail. | Core Concepts |
| Unauthorized Cloud Access | Gaining unauthorized access to someone's cloud storage. | Platform-Specific |
| Unauthorized Device Linking | Linking a new device to someone's account without their permission in order to gain access. | Platform-Specific |
| Biometric Data Abuse | Misusing someone's biometric data, like their fingerprint or face, for malicious purposes. | AI & Emerging Tech |
| Facial Recognition Abuse | Misusing facial recognition technology for malicious purposes, such as stalking or harassment. | AI & Emerging Tech |
| Deepfake Voice Abuse | Using AI to clone a person's voice for harassment, fraud, or creating fake audio evidence. | AI & Emerging Tech |
| Synthetic Voice Scams | Using AI to clone someone's voice for harassment or scams. Also known as Deepfake Voice Abuse. | AI & Emerging Tech |
| Virtual Reality Harassment | Harassment that takes place in virtual reality environments, often involving unwanted virtual touching or sexual advances towards a user's avatar. | AI & Emerging Tech |
| Metaverse Sexual Harassment | Harassment that takes place in virtual reality environments, often involving unwanted virtual touching or sexual advances towards a user's avatar. | AI & Emerging Tech |
| Avatar-Based Harassment | Harassment that takes place in virtual reality environments, often involving unwanted virtual touching or sexual advances towards a user's avatar. | AI & Emerging Tech |
| Emoji Threat Messaging | Using emojis in a combination that implies a violent threat. | Platform-Specific |
| Meme-Based Harassment | Creating and spreading memes to mock, harass, or spread disinformation about a person. | Platform-Specific |
| Hashtag Harassment Campaigns | Hijacking a hashtag or creating a new one to coordinate harassment against a target. | Platform-Specific |
| Livestream Harassment | Harassing someone during a live video stream. | Platform-Specific |
| Swatting | Deceiving emergency services into sending a police and emergency service response team to another person's address, a dangerous and illegal form of harassment. | Platform-Specific |
| Digital Vigilantism | When online mobs publicly shame a person they believe has done something wrong, often without due process. | Cultural & Regional |
| Crowdsourced Harassment | When a large group of people coordinate to harass a single target online. Also known as Dogpiling or Pile-On Harassment. | Core Concepts |
| Online Incitement to Violence | Using online platforms to encourage others to commit acts of violence. | Core Concepts |
| Gendered Cyber Incitement | Using online platforms to encourage others to commit acts of violence. | Core Concepts |
| Digital Stalking Trails | The use of the internet or other electronic means to stalk or harass an individual, often involving monitoring their online activity, location, and communications. | Core Concepts |
| Metadata Abuse | Using the metadata in files (data about data, such as when a photo was taken) and posts to track and stalk someone. | Core Concepts |
| Data Scraping for Harassment | Automatically collecting large amounts of data from social media profiles to use for harassment. | AI & Emerging Tech |
| Contact List Abuse | Gaining access to someone's contact list and harassing their friends, family, or colleagues. | Core Concepts |
| Subscription Bombing | Signing a person up for thousands of unwanted email lists, text messages, or services to overwhelm their inbox and notifications. | Platform-Specific |
| Email Bombing | Signing a person up for thousands of unwanted email lists or services to overwhelm their inbox. A form of Subscription Bombing. | Platform-Specific |
| Notification Bombing | Signing a person up for thousands of unwanted services to overwhelm their notifications. A form of Subscription Bombing. | Platform-Specific |
| Ride-Share Tracking Abuse | Abusing features in ride-sharing apps to track a person's movements. | Platform-Specific |
| AirTag Stalking | Using small physical devices like Apple AirTags or Tiles to secretly track a person's location. | Platform-Specific |
| Bluetooth Tracking Abuse | Using small physical tracking devices that use Bluetooth (like AirTags) to secretly track a person's location. | Platform-Specific |
| AI-Enabled Abuse | Using artificial intelligence to automate, scale, or enhance abusive behaviors online. | AI & Emerging Tech |
| AI-Facilitated Gender-Based Violence | The use of AI tools to perpetrate violence targeting individuals based on their gender. | AI & Emerging Tech |
| AI-Generated Intimate Images | Creating non-consensual explicit images of individuals using generative AI. Also known as Synthetic Sexual Imagery. | AI & Emerging Tech |
| Synthetic Sexual Imagery | Fake explicit images created with AI, often of real people without their consent. | AI & Emerging Tech |
| Deepfake Image Abuse | Using deepfake technology to create abusive or harmful images of a person. | AI & Emerging Tech |
| Deepfake Video Abuse | Using deepfake technology to create abusive or harmful videos of a person. | AI & Emerging Tech |
| Voice Cloning Harassment | Harassing someone by using an AI-cloned version of their voice. | AI & Emerging Tech |
| Synthetic Media Abuse | The use of any AI-generated or manipulated media (video, audio, image) for abusive purposes. | AI & Emerging Tech |
| Generative AI Harassment | Using generative AI models (like text or image generators) to create and disseminate harassing content. | AI & Emerging Tech |
| AI Impersonation | Using AI to mimic someone's writing style, voice, or likeness to impersonate them online. | AI & Emerging Tech |
| AI Identity Fraud | Using AI to create fake identities or steal real ones for fraudulent purposes. | AI & Emerging Tech |
| Chatbot-Enabled Grooming | Using conversational AI to engage in grooming behaviors with a young person. | AI & Emerging Tech |
| AI-Assisted Sextortion | Using AI-generated explicit images as leverage in sextortion schemes. | AI & Emerging Tech |
| Automated Intimate Image Generation | Using AI bots or scripts to automatically generate non-consensual intimate images of people. | AI & Emerging Tech |
| Text-to-Image Abuse | Using text prompts in AI image generators to create harmful, harassing, or non-consensual images. | AI & Emerging Tech |
| Text-to-Voice Impersonation | Using text-to-speech AI to clone and impersonate a person's voice. | AI & Emerging Tech |
| Synthetic Nude Generation | The use of AI to create fake nude images of individuals. Also known as "undress AI abuse". | AI & Emerging Tech |
| Undress AI Abuse | Using AI applications to digitally remove clothing from images of people, creating non-consensual fake nudes. | AI & Emerging Tech |
| AI-Driven Doxing | Using AI tools to rapidly collect and publish someone's private information. | AI & Emerging Tech |
| AI-Enhanced Surveillance | Using AI to analyze data from multiple sources for the purpose of large-scale surveillance. | AI & Emerging Tech |
| Predictive Tracking Abuse | Using AI to predict a person's future location or behavior for the purpose of stalking. | AI & Emerging Tech |
| Facial Recognition Stalking | Using facial recognition technology to identify and stalk individuals from images or videos. | AI & Emerging Tech |
| Facial Recognition Doxing | Using facial recognition to identify a person from an image and then publishing their personal information. | AI & Emerging Tech |
| Emotion Recognition Exploitation | Using AI to analyze and exploit a person's emotional state for manipulation or abuse. | AI & Emerging Tech |
| AI Profiling for Harassment | Using AI to create detailed profiles of individuals to enable more effective and targeted harassment. | AI & Emerging Tech |
| Algorithmic Targeting Abuse | Exploiting platform algorithms to specifically target an individual with a barrage of negative content or harassment. | AI & Emerging Tech |
| Recommender System Abuse | Manipulating recommendation algorithms to promote harmful content or harass individuals. | AI & Emerging Tech |
| AI-Powered Harassment Bots | Using automated bots to send large volumes of harassing messages. Also known as Automated Abuse. | AI & Emerging Tech |
| Conversational AI Grooming | Using chatbots or conversational AI to simulate relationships and groom individuals, especially minors. | AI & Emerging Tech |
| Virtual Companion Manipulation | Exploiting the emotional bond a user has with an AI companion for manipulative or abusive purposes. | AI & Emerging Tech |
| AI-Generated Revenge Porn | Using AI to create fake explicit images or videos of an ex-partner for revenge. | AI & Emerging Tech |
| Synthetic Child Sexual Abuse Material | The creation of AI-generated images or videos depicting child sexual abuse. This is illegal and harmful. | AI & Emerging Tech |
| AI-Assisted Blackmail | Using artificial intelligence to create convincing fake evidence (e.g., images, videos, audio) for blackmail purposes. | AI & Emerging Tech |
| AI Voice Scam Targeting | Using a cloned voice in a scam, for example, to impersonate a family member in distress to ask for money. | AI & Emerging Tech |
| Deepfake Extortion | Threatening to release embarrassing or compromising deepfake videos or images unless a ransom is paid. | AI & Emerging Tech |
| AI Content Manipulation | Using AI to alter content in a way that changes its meaning to be harmful or misleading. | AI & Emerging Tech |
| Synthetic Evidence Fabrication | Creating fake AI-generated evidence (e.g., screenshots, audio) to use in a dispute or legal case. | AI & Emerging Tech |
| AI-Altered Screenshots | Using AI to manipulate screenshots of conversations or posts to create a false narrative. | AI & Emerging Tech |
| AI Chat Impersonation | Training an AI to mimic a person's chat style and then using it to impersonate them in conversations. | AI & Emerging Tech |
| Hologram Harassment | A future-facing term for harassment using realistic, AI-generated holographic projections of a person. | AI & Emerging Tech |
| Virtual Avatar Impersonation | Creating a virtual avatar that closely resembles another person to impersonate them in a metaverse or virtual world. | AI & Emerging Tech |
| AI-Generated Threat Messages | Using AI text generators to create threatening messages, potentially to evade detection systems that look for human patterns. | AI & Emerging Tech |
| Automated Abuse Scaling | Using AI to massively scale up abuse campaigns, sending thousands of harassing messages simultaneously. | AI & Emerging Tech |
| AI-Based Image Morphing Abuse | Using AI to seamlessly merge one person's face onto another body, often for creating non-consensual explicit content. | AI & Emerging Tech |
| Synthetic Identity Abuse | Creating a completely fabricated but realistic online identity using AI-generated photos, text, and voice for malicious purposes. | AI & Emerging Tech |
| AI-Powered Romance Scams | Using AI-generated profiles and conversational AI to carry out romance scams at a large scale. | AI & Emerging Tech |
| AI-Based Social Engineering | Using AI to analyze a target's online presence and craft highly personalized social engineering attacks. | AI & Emerging Tech |
| Large Language Model Impersonation | Fine-tuning a large language model (LLM) on a person's writings to impersonate them with a high degree of accuracy. | AI & Emerging Tech |
| AI-Generated Defamation | Using AI to generate and spread false and defamatory statements about an individual or group. | AI & Emerging Tech |
| AI-Assisted Catfishing | Using AI tools to create more convincing fake profiles and maintain conversations for catfishing. | AI & Emerging Tech |
| AI Face Swap Abuse | Using AI to swap a person's face into a compromising or harmful video or image. | AI & Emerging Tech |
| Biometric Spoofing Abuse | Using AI to create synthetic biometric data (like a fingerprint or face) to bypass security systems. | AI & Emerging Tech |
| AI Surveillance Creep | The gradual expansion of AI-powered surveillance into more areas of public and private life. | AI & Emerging Tech |
| Emotion AI Coercion | Using AI that claims to detect emotions to coerce or manipulate individuals based on their inferred emotional state. | AI & Emerging Tech |
| Synthetic Media-Based Gaslighting | Using AI-generated media to make someone doubt their own memory or sanity. | AI & Emerging Tech |
| AI Reputation Manipulation | Using AI to either artificially boost or destroy an individual's or company's online reputation. | AI & Emerging Tech |
| AI-Generated False Allegations | Creating fake AI-generated evidence (e.g., screenshots, audio) to use in a dispute or legal case. | AI & Emerging Tech |
| Automated Deepfake Distribution | Using bots and AI to automatically spread deepfake content across multiple platforms. | AI & Emerging Tech |
| AI-Assisted Stalking | Using AI tools to track, monitor, and gather information about a stalking victim. | AI & Emerging Tech |
| AI Behavioral Prediction Abuse | Using AI to predict a person's behavior and then using those predictions for manipulative or harmful purposes. | AI & Emerging Tech |
| Technology-Facilitated Abuse Legislation | Laws specifically designed to address abuse and violence that is perpetrated using technology. | Legal & Policy |
| Cybercrime Law | Laws that deal with crimes that are committed on the internet or a computer network. | Legal & Policy |
| Image-Based Abuse Law | Legislation that criminalizes the non-consensual creation and distribution of intimate images. | Legal & Policy |
| Non-Consensual Intimate Image Law | Specific laws targeting the sharing of private, intimate images without the consent of the person depicted. | Legal & Policy |
| Revenge Porn Legislation | Laws criminalizing the act of sharing sexually explicit images of a person without their consent, often after a breakup. | Legal & Policy |
| Coercive Control Law | Laws that recognize a pattern of controlling or coercive behavior within a domestic setting as a criminal offense. | Legal & Policy |
| Digital Coercive Control Recognition | The application of coercive control laws to behaviors that use technology, such as monitoring, isolation, and control. | Legal & Policy |
| Electronic Communications Harassment Law | Laws that criminalize harassment conducted through electronic means, like emails, texts, or social media. | Legal & Policy |
| Cyberstalking Law | Laws specifically criminalizing the use of the internet and electronic communications to stalk an individual. | Legal & Policy |
| Online Harassment Offence | A specific criminal offence that covers a course of conduct amounting to harassment online. | Legal & Policy |
| Malicious Communications Offence | An offence that covers the sending of communications that are indecent, grossly offensive, or contain a threat. | Legal & Policy |
| Threats via Electronic Communication | Specific laws covering the act of making threats of violence through digital channels. | Legal & Policy |
| Intimate Image Protection Law | Legislation aimed at protecting individuals from the non-consensual sharing of their intimate images. | Legal & Policy |
| Voyeurism Offence (Digital) | Laws that extend voyeurism offences to cover digital acts, such as using a hidden camera and distributing the footage. | Legal & Policy |
| Upskirting and Downblousing Laws | Specific legislation making it illegal to take non-consensual photos or videos under a person's clothing. | Legal & Policy |
| Deepfake Criminalisation | The process of making the creation and distribution of malicious deepfakes a specific criminal offence. | Legal & Policy |
| Synthetic Media Regulation | Rules and laws governing the creation and use of AI-generated media, including requirements for labeling. | Legal & Policy |
| Online Hate Crime Law | Laws that apply hate crime statutes to offenses committed online, with enhanced penalties. | Legal & Policy |
| Gender-Based Online Hate Crime | Recognizing online hate speech that is specifically motivated by misogyny or hatred based on gender identity. | Legal & Policy |
| Digital Evidence Protection | Rules and procedures for the lawful collection, preservation, and presentation of digital evidence in court. | Legal & Policy |
| Data Protection Law Misuse | When data protection laws are used maliciously, for example, to demand the takedown of legitimate journalism. | Legal & Policy |
| Privacy Law Violations | Breaches of laws that are designed to protect an individual's privacy from intrusion by state or private actors. | Legal & Policy |
| Surveillance Law Abuse | The unlawful use of surveillance technologies in a way that violates established legal frameworks. | Legal & Policy |
| Stalkerware Criminalisation | The act of making it illegal to create, sell, or use software designed for stalking. | Legal & Policy |
| Unlawful Device Tracking | The illegal use of GPS trackers or other technologies to monitor a person's location without their consent. | Legal & Policy |
| Electronic Monitoring Abuse | The misuse of electronic monitoring technologies (like those used in probation) for purposes of harassment or control. | Legal & Policy |
| Identity Theft Legislation | Laws that criminalize the act of stealing and using another person's personal information. | Legal & Policy |
| Impersonation Offence (Online) | A specific crime related to impersonating another individual online for the purpose of harm or fraud. | Legal & Policy |
| Fraud by Digital Deception | Committing fraud through deceptive practices online, such as phishing or creating fake websites. | Legal & Policy |
| Online Defamation Law | The area of law that deals with reputational damage caused by false statements published online. | Legal & Policy |
| Platform Duty of Care | A legal requirement for online platforms to take reasonable steps to protect their users from harm. | Legal & Policy |
| Intermediary Liability | The legal principle that determines whether an online platform is liable for the content posted by its users. | Legal & Policy |
| Safe Harbour Provisions | Legal provisions that shield online platforms from liability for user-generated content, provided they meet certain requirements. | Legal & Policy |
| Notice-and-Takedown Procedures | The process by which platforms must remove infringing or illegal content after being notified of its existence. | Legal & Policy |
| Right to be Forgotten | A legal principle that allows individuals to request the removal of personal data from search engine results under certain circumstances. | Legal & Policy |
| Digital Restraining Orders | Court orders that prohibit an individual from contacting or harassing another person through digital means. | Legal & Policy |
| Electronic Protection Orders | A type of restraining order that specifically covers electronic communication and contact. | Legal & Policy |
| Online Non-Molestation Orders | A UK-specific court order to prevent a partner or ex-partner from harassing or threatening someone, extended to online behavior. | Legal & Policy |
| Cyber Protection Orders | A type of court order aimed at preventing online harassment and stalking. | Legal & Policy |
| Technology Abuse Risk Assessment | A formal assessment to evaluate the risk of an individual using technology to perpetrate abuse. | Legal & Policy |
| Digital Safety Orders | Court orders focused on restricting an abuser's use of technology to ensure the victim's safety. | Legal & Policy |
| Platform Accountability Regulation | Government regulation designed to hold social media and other platforms accountable for the content they host. | Legal & Policy |
| Algorithmic Accountability Law | Legislation requiring transparency and fairness in the algorithms used by platforms and AI systems. | Legal & Policy |
| AI Safety Regulation | Laws and rules aimed at ensuring the safe development and deployment of artificial intelligence. | Legal & Policy |
| AI Risk Governance | The frameworks and processes for managing the risks associated with artificial intelligence. | Legal & Policy |
| Automated Decision-Making Oversight | Regulatory oversight of systems that make important decisions about people automatically using AI. | Legal & Policy |
| Children’s Online Safety Law | Legislation specifically designed to protect minors from online harms. | Legal & Policy |
| Age-Appropriate Design Code | A UK code of practice that requires online services to provide better privacy protections for children. | Legal & Policy |
| Duty to Report Online Abuse | A legal or professional obligation for certain individuals or organizations to report suspected cases of online abuse. | Legal & Policy |
| Mandatory Reporting of CSAM | A legal requirement for platforms to report any detected Child Sexual Abuse Material to the authorities. | Legal & Policy |
| Online Exploitation Statutes | Laws that specifically criminalize various forms of online exploitation. | Legal & Policy |
| Cross-Border Cybercrime Cooperation | International agreements and cooperation between law enforcement agencies to tackle cybercrime that spans multiple countries. | Legal & Policy |
| Budapest Convention on Cybercrime | The first international treaty seeking to address Internet and computer crime by harmonizing national laws and improving investigative techniques. | Legal & Policy |
| Digital Human Rights | The concept that human rights, such as freedom of speech and privacy, apply in the digital world. | Legal & Policy |
| Right to Online Safety | The emerging principle that individuals have a right to be reasonably safe from harm when using online services. | Legal & Policy |
| Freedom from Digital Violence | The right to participate in the digital world without facing violence or abuse. | Legal & Policy |
| Technology-Facilitated Abuse in Family Law | The consideration of tech-based abuse as a factor in family court proceedings, such as custody battles. | Legal & Policy |
| Evidentiary Use of Digital Abuse | The use of digital evidence, such as threatening texts or emails, in court cases. | Legal & Policy |
| Admissibility of Digital Evidence | The rules governing whether digital evidence can be presented in a court of law. | Legal & Policy |
| Forensic Analysis of Devices | The expert examination of computers, phones, and other devices to recover data for an investigation. | Legal & Policy |
| Digital Chain of Custody | The chronological documentation of the seizure, control, transfer, analysis, and disposition of digital evidence. | Legal & Policy |
| Victim Protection in Cybercrime Cases | Measures to protect the identity and privacy of victims throughout the investigation and trial of a cybercrime. | Legal & Policy |
| Online Witness Protection Measures | Steps taken to protect witnesses in online crime cases from intimidation or harm. | Legal & Policy |
| Platform Transparency Requirements | Legal requirements for online platforms to be transparent about their content moderation policies and actions. | Legal & Policy |
| Content Moderation Regulation | Government rules that oversee how platforms moderate the content generated by their users. | Legal & Policy |
| Harmful Online Communications Law | Legislation that criminalizes various forms of harmful online speech and communication. | Legal & Policy |
| Electronic Abuse Protection Orders | Court orders designed to prevent abuse that is conducted through electronic means. | Legal & Policy |
| Digital Harassment Sentencing Enhancements | Legal provisions that allow for tougher sentences for crimes that involve digital harassment. | Legal & Policy |
| Gender-Based Violence Online Recognition | The formal recognition in law and policy that online abuse can be a form of gender-based violence. | Legal & Policy |
| Tech Abuse Survivor Protections | Legal and practical protections specifically for survivors of technology-facilitated abuse. | Legal & Policy |
| Civil Remedies for Online Abuse | Non-criminal legal options for victims of online abuse, such as suing for damages or seeking an injunction. | Legal & Policy |
| Tort of Misuse of Private Information | A civil action in the UK for the misuse of private information. | Legal & Policy |
| Intentional Infliction of Emotional Distress (Online) | A civil action for extreme and outrageous conduct online that causes severe emotional distress. | Legal & Policy |
| Civil Harassment Restraining Orders | Non-criminal court orders to prevent harassment. | Legal & Policy |
| Digital Cease and Desist Orders | A formal demand to stop a particular online activity, often as a precursor to legal action. | Legal & Policy |
| Platform Ban Evasion Offence | The act of circumventing a platform ban, which may be a violation of terms of service and in some cases a legal issue. | Legal & Policy |
| Criminal Threats via Internet | The crime of making a threat to harm someone, transmitted via the internet. | Legal & Policy |
| Extortion Using Intimate Images Law | Laws that specifically criminalize sextortion. | Legal & Policy |