Am being harassed online dating
A profile on a social network might include information such as your email address, phone number, general (or even specific) address information, birthday, legal name, names of family members, and even minute-to-minute updates on your location.If a victim has a public profile, a stalker could easily access any information posted to the social networking account.See the Resources section for more information and directions for how to get photos removed from Google searches, Microsoft products, and some major social media sites.If you are a victim of stalking, consider suspending your social networking accounts until the stalking has been resolved.Cyberstalking involves using the Internet or other electronic means to stalk a victim, and generally refers to a pattern of threatening or malicious behaviors.To be considered cyberstalking, the behavior must pose a credible threat of harm to the victim.The victim does not have to prove that the stalker had the intent to carry out the threat.(California Penal Code 646.9)California’s criminal laws addressing online harassment state that it is illegal to use an electronic communication device to make repeated contact with another person with the intent to harass or annoy, or to make a single intentionally harassing contact if it includes any obscene or threatening language.
California Law California was the first state to pass an anti-stalking law in 1990, but now all 50 states have an anti-stalking law.
All states have anti-stalking laws, but the legal definitions vary.
Some state laws require that the perpetrator, to qualify as a stalker, make a credible threat of violence against the victim.
There are laws providing for criminal and civil liability for revenge porn (see below), but victims may want to first take action to get the material taken down as quickly as possible.
Many social media sites have created policies for reporting and removing this kind of material from their websites.
(California Penal Code 653m.) Additionally, it is illegal to make credible threats by means of any electronic communication device, including but not limited to telephones, cell phones, smart phones, tablets and computers.