ersistent Harassment, And Technology-Enabled Abuse

1. Cyberstalking

Definition:
Cyberstalking is the use of the internet, email, social media, or other electronic communications to stalk or harass an individual. Unlike traditional stalking, it is technology-mediated and can include threats, identity theft, monitoring online activity, sending unwanted messages, or defamation.

Key Legal Points:

Cyberstalking often overlaps with harassment and defamation.

Laws typically criminalize threats, repeated unwanted contact, and intent to cause fear.

Case Laws:

Case 1: State v. Michael D. S. (2001, Maryland)

Facts: Michael repeatedly sent threatening emails and messages to his ex-girlfriend after their breakup. He created fake social media accounts to monitor her online activity.

Legal Principle: The court held that persistent electronic communication intended to cause fear or emotional distress qualifies as stalking.

Outcome: Convicted under Maryland anti-stalking laws; electronic communication was treated as equivalent to physical stalking.

Case 2: People v. Wesby (2010, New York)

Facts: Wesby used social media to post false statements about a former colleague, sending threatening private messages.

Legal Principle: Harassment through online platforms constitutes cyberstalking if repeated and intentional.

Outcome: Convicted; court emphasized that persistent threats through technology can cause the same fear and trauma as in-person stalking.

2. Persistent Harassment

Definition:
Persistent harassment is repeated behavior intended to alarm, annoy, or distress a victim. It can occur offline or online and may include calls, messages, emails, and public humiliation.

Key Legal Points:

Courts look at repetition, intent, and impact on the victim’s daily life.

Technology-enabled harassment amplifies the reach and impact.

Case Laws:

Case 3: R v. Collett (2007, UK)

Facts: The defendant sent hundreds of unwanted emails to his ex-partner over months, attempting to intimidate her.

Legal Principle: Persistent communication, even via email, constitutes harassment under UK law.

Outcome: Convicted under the Protection from Harassment Act 1997. The case reinforced that emails can be as threatening as in-person harassment.

Case 4: State v. Elizabeth L. (2014, California)

Facts: Elizabeth harassed a coworker via repeated Facebook messages and text messages. She also posted defamatory comments on forums.

Legal Principle: California law recognizes online harassment as equivalent to in-person harassment when it causes emotional distress.

Outcome: Convicted; court cited the cumulative effect of online harassment on the victim’s mental well-being.

3. Technology-Enabled Abuse

Definition:
Technology-enabled abuse refers to the misuse of digital tools to control, threaten, or harm someone. It can include:

Monitoring devices (GPS trackers, spyware)

Sharing intimate images without consent (“revenge porn”)

Identity theft or impersonation

Key Legal Points:

Courts increasingly recognize digital tools as instruments of abuse.

Victims can include partners, colleagues, or strangers.

Case Laws:

Case 5: United States v. Lori Drew (2008, Missouri)

Facts: Lori Drew created a fake MySpace profile to harass a teenager, which led to the teen’s suicide.

Legal Principle: Courts debated whether violating website terms of service could lead to criminal liability. Although the federal conviction was overturned, the case highlighted technology-enabled psychological abuse.

Outcome: The case sparked reforms in cyberharassment laws.

Case 6: R v. Brown (2015, UK)

Facts: The defendant installed spyware on his partner’s phone to monitor her messages and location.

Legal Principle: Unauthorized digital monitoring constitutes a criminal offense and can be treated as coercive control.

Outcome: Convicted under the Serious Crime Act 2015; court emphasized technology as a tool of abuse.

Case 7: People v. Smith (2012, New York)

Facts: The defendant repeatedly posted intimate photos of his ex without consent on social media and dating sites.

Legal Principle: Sharing intimate images without consent is criminal under New York law. It constitutes harassment and invasion of privacy.

Outcome: Convicted; court held that the online nature of the abuse does not lessen its impact.

Key Observations from Case Law

Intent and Repetition: Courts look for deliberate and repeated behavior, not just one-off incidents.

Digital Platforms are Tools: Emails, social media, GPS trackers, and spyware are all recognized as instruments of abuse.

Equivalence to Physical Harm: Cyberstalking and technology-enabled harassment are treated as seriously as physical stalking or threats.

Cumulative Effect: Courts recognize the psychological harm caused by persistent online abuse.

 

LEAVE A COMMENT