Digital considerations for non-molestation and restraining orders

Digital considerations for non-molestation and restraining orders

If you are applying for a non-molestation or restraining order think about about adding the following:

Background: Today, all stalkers use digital means to monitor, humiliate, intimidate and alienate the victim. The most common tactics include: accessing accounts, spyware, social media, tracking devices. They use these tools against the victim, and those closest to the victim.

The information that that can be obtained by digital means increases the physical risks as well the mental and financial harm.

The most effective way to protect a victim digitally is to educate and encourage them to address their digital safety and habits. They need to be made aware of the risks, how to address them, and what software and mobile apps are available to help them. There are online resources to assist victims.

Adding digital related restrictions to a non-molestation/restraining order will usually offer increased protection. They would clearly state what the abuser can’t do, so that that the abuser is unable to claim ignorance. It would also make it clearer to those enforcing the order that there has been a clear breach. 

Key Challenges:

  • Friends and family provide opportunities to continue to monitor/torment victims
  • Existing data/pictures or videos relating to the victim that the abuser might use
  • Publishing of material or content targeting the victim
  • Ability to monitor a victim's physical location
  • Issues related to access and children

Ideas for discussion

1.       Connecting to someone via social media

  • Require abuser to remove victim and named friends and family from all online accounts; including but limited to: Social media (Facebook, Twitter, Linkedin, Whatsapps)
  • Resign from any online groups that the victim participates in
  • Do not attempt to add/follow/connect with the victim and named friends and family, nor join a group the victim is participating in either under their own identity of another.
  • The abuser can’t use a third party’s account to monitor or contact the victim and named friends and family.

2.       Pictures

  • Delete all existing digital pictures the abuser has, or has uploaded, of the victim; including those stored on a local device (computer, drive, mobile) and those stored electronically in online, in picture libraries or posted online.
  • Do not publish or distribute pictures of the victim or those associated with the victim
  • No labelling/tagging/identifying pictures with the victim’s name, either pictures of the victim, associated with the victim or used to embarrass the victim.

3.       Content

  • Do not publish any information, comments or opinion of the victim or named friends and family.
  • Do not make comments that a reasonable person could conclude allude to the victim.

4.       Monitoring

  • Do not use any geolocation technology to monitor the victim or their named friends and family.
  • Do not use a tracking device on any car used by the victim (even if it is owned by the abuser)

5.       Joint access issues

  • Do not access a child’s phone
  • Do not send the child electronic files
  • Don’t connect with the child via any social media where the mother and named friends and family are already connected.
  • Do not purchase an Internet phone or computer for a child, without permission from the victim.
How stalkers use digital technology against their victims

How stalkers use digital technology against their victims

How and what to tell family, friends and colleagues when you are being stalked

How and what to tell family, friends and colleagues when you are being stalked