{"id":128,"date":"2019-08-23T02:55:21","date_gmt":"2019-08-23T02:55:21","guid":{"rendered":"http:\/\/myunheardvoice.org\/?page_id=128"},"modified":"2019-08-28T21:22:50","modified_gmt":"2019-08-28T21:22:50","slug":"technology-safety","status":"publish","type":"page","link":"https:\/\/myunheardvoice.org\/ru\/technology-safety\/","title":{"rendered":"\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0422\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0438"},"content":{"rendered":"<p class=\"has-normal-font-size\">Some people use technology\u2014such as photos, videos, social media, and \ndating apps\u2014to engage in harassing, unsolicited, or non-consensual \nsexual interactions. It can leave the person on the other end feeling \nmanipulated, unsafe, exposed, and worried about their online reputation.\n The laws pertaining to these situations vary from state to state and \nplatform to platform and they are evolving rapidly. Learn more about \nthese situations so you can feel better prepared to report and protect \nyourself if they happen.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What are some ways people use digital technology to hurt others? <\/strong><\/h3>\n\n\n\n<p>The following list includes some of the ways a person can use digital technology in a sexually explicit or violating way.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Catfishing, or lying about one\u2019s identity online in order to initiate a romantic or sexual relationship<\/li><li><a href=\"http:\/\/cyberbullying.us\/what-is-cyberbullying\/\">Cyberbullying<\/a>,\n or the \u201cwillful and repeated harm inflicted through the use of \ncomputers, cell phones, and other electronic devices\u201d often to threat, \nharass, or humiliate another, according to the Cyberbullying Research \nCenter<\/li><li>Cyberstalking by monitoring someone\u2019s whereabouts with GPS or other \ntracking systems or persistently contacting someone against their will \nthrough text, email, social media, or other digital platforms<\/li><li>Distributing or threatening to distribute sexual or intimate images \nof someone without their consent, also known as digital sexual assault \nor revenge porn<\/li><li>Hacking into someone\u2019s online accounts or devices to steal personal images or information not intended for public sharing<\/li><li>Harassing someone through an online gaming platform or forum<\/li><li>Posting shaming, embarrassing, sensitive, or otherwise inappropriate\n information about someone on social media or other public sites, \nwhether it is true or not<\/li><li>Pressuring you to send explicit images of yourself Sending sexually \nexplicit emails, chats, texts, photos, videos, or emojis that are \nunwelcome or unsolicited<\/li><li>Taking sexually explicit pictures or videos of someone without their consent<\/li><li>Trolling, or deliberately posting upsetting or provocative statements or photos in order to provoke others<\/li><li>Unsolicited or unwanted sharing of pornography or pornographic images<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What are the effects of online harassment? <\/strong><\/h3>\n\n\n\n<p>If you have experienced sexual harassment, abuse, or bullying online,\n you may experience negative feelings or other mental or physical \neffects. Though certainly not exhaustive, the list below outlines a few \nways you may be affected by this experience.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Anxiety<\/li><li>Depression<\/li><li>Eating disturbances<\/li><li>Feelings of violation, shame, humiliation, or loss of control<\/li><li>Increased stress levels<\/li><li>Panic attacks<\/li><li>PTSD <\/li><li>Loss of motivation and difficulty concentrating<\/li><li>Sleep disturbances <\/li><li>Substance abuse<\/li><li>Suicidal ideation <\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How can I report it? <\/strong><\/h3>\n\n\n\n<p>You have several options for reporting. In some cases, there aren\u2019t \nlaws that directly prohibit these types of situations, even if they are \nsexually explicit or unwelcome. You can, however, often have that person\n removed or blocked from a website. If you receive communication that is\n threatening, part of a pattern of abuse, or consistent with harassment,\n don\u2019t hesitate to contact law enforcement or a lawyer. Even if you do \nnot wish to pursue a criminal case, you may be able to move forward with\n a civil case. You may be able to use the evidence you collect using the\n following tips to gain an order of protection that includes contact \nover social media and other digital platforms.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Keep evidence by taking screenshots immediately or printing out  text messages, social media posts, or other exchanges. Make sure your  screenshots contain the information of the person who is being harmful  and the time stamp. Some information is easily deleted\u2014a picture or hard  copy can provide evidence that the content was sent. If the interaction  occurred through a public website or social media channel, you can  report the exchange to the host of the site. Most websites that allow  exchanges between users have a \u201creport\u201d button or link located near the  chat window.<\/li><li>You can contact local authorities and report the activity. If you  are in school and the person harassing you goes to your school, you can  report anonymously. If you are experiencing the harassment or abuse  through a social media platform, app, or online game, you can report  through the site. Note that laws about digital technology and  communication will vary, and especially for these newer forms of  communication, there may not be laws in place to regulate this use of  technology.<\/li><li>If the situation involves a minor or images of a minor, report to  law enforcement or call 911 immediately. You can also make a report on  the <a href=\"http:\/\/www.missingkids.com\/gethelpnow\/cybertipline\">Cyber Tipline<\/a>. If you are a minor who takes photos of themselves and\/or sends and\/or possesses a photo, you should also reach out for advice.<\/li><li>If the situation occurred among co-workers or managers, it might be considered a form of sexual harassment and is illegal. Contact your Human Resources Department to report the activity.<\/li><li>If the person who is making you feel uncomfortable is another  student, teacher, or administrator at your college, university, or K-12  school, you may want to consider reporting the behavior to the Title IX officer or a trusted adult at school.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What can I do to feel safer? <\/strong><\/h3>\n\n\n\n<p>There are some precautionary steps you can take to increase your safety and security across different platforms.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Set a passcode on your phone and other devices.<\/strong>\n To help ensure more security on social media and messaging apps, logout\n of your accounts each time you are done using them. Don\u2019t save \npasswords in your web browser or other accounts for convenience.<\/li><li><strong>Google yourself. <\/strong>Make a habit of Googling yourself \nonce in a while. Remove any personal information or photos of you that \nyou are not comfortable with or that could be used by someone to harass \nyou online.<\/li><li><strong>You should never be pressured to share your personal information. <\/strong>If\n someone online is pressuring you to share personally identifiable \ninformation, such as your full name, address, date of birth, or phone \nnumber, you can always refuse, block them, or give them fake \ninformation.<\/li><li><strong>Do not open messages from unknown senders.<\/strong> If you \nreceive a text, call, friend request, or private message request from \nsomeone you don\u2019t recognize, you don\u2019t have to answer or respond to it. \nConsider deleting it without reading it, these can contain inappropriate\n content you may not want to be associated with or viruses that can \naffect your device.<\/li><li><strong>Limit what information you post about yourself online.<\/strong>\n Personally identifying information can be used against you. For \ninstance, posting your personal email on a public blog means that people\n you don\u2019t know have a way to contact you.<\/li><li><strong>Be conscious about who sees your photos.<\/strong> If you \nshare a picture, either online or with another person, be mindful that \nyou are increasing the odds that others will see the photograph, even if\n it was unintended.<\/li><li><strong>You can always block or report.<\/strong> If someone is \nmaking you uncomfortable on a public site, report them or block them \nusing the site\u2019s reporting function as soon as possible.<\/li><li><strong>Keep your webcam private.<\/strong> Put a sticker over your \nwebcam, laptop camera, or phone camera when they aren\u2019t in use. These \ndevice can sometimes be hacked and used to take pictures or videos of \nyou without your consent.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Legal Disclaimer<\/h3>\n\n\n\n<p style=\"font-size:12px\"><strong>MyUnheardVoice website provides general information that is intended, but not guaranteed, to be correct and up-to-date. The information is not presented as a source of legal advice. You should not rely, for legal advice, on statements or representations made within the website or by any externally referenced Internet sites. If you need legal advice upon which you intend to rely in the course of your legal affairs, consult a competent, independent attorney. MUV does not assume any responsibility for actions or non-actions taken by people who have visited this site, and no one shall be entitled to a claim for detrimental reliance on any information provided or expressed.<\/strong><\/p>\n\n\n\n<p style=\"font-size:12px\"><em>Original source link: https:\/\/rainn.org\/articles\/stalking<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Some people use technology\u2014such as photos, videos, social media, and dating apps\u2014to engage in harassing, unsolicited, or non-consensual sexual interactions. It can leave the person on<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-128","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/myunheardvoice.org\/ru\/wp-json\/wp\/v2\/pages\/128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/myunheardvoice.org\/ru\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/myunheardvoice.org\/ru\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/myunheardvoice.org\/ru\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/myunheardvoice.org\/ru\/wp-json\/wp\/v2\/comments?post=128"}],"version-history":[{"count":5,"href":"https:\/\/myunheardvoice.org\/ru\/wp-json\/wp\/v2\/pages\/128\/revisions"}],"predecessor-version":[{"id":266,"href":"https:\/\/myunheardvoice.org\/ru\/wp-json\/wp\/v2\/pages\/128\/revisions\/266"}],"wp:attachment":[{"href":"https:\/\/myunheardvoice.org\/ru\/wp-json\/wp\/v2\/media?parent=128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}