Tech-Facilitated Abuse and Online Safety

You are not alone. If you experience discomfort, coercion, harassment or harm—online or offline—reach out for support. Confidential, non-confidential and off-campus resources are available.

Tech-facilitated or digital abuse refers to the use of technology—such as phones, social media, apps or AI tools—to monitor, control, harass, impersonate or violate someone’s boundaries. It mirrors other forms of relationship and sexual violence, but is carried out through digital means, using technology as an extension of power and control.

Related Terms and Definitions

Cyberstalking occurs when electronic media such as the internet, social networks, blogs, cell phones, texts or other similar devices or forms of contact are used for stalking.

Stalking occurs when a person engages in a course of conduct directed at a specific person under circumstances that would cause a reasonable person to fear for their own safety or the safety of others, or suffer substantial emotional distress.

Course of conduct means two or more instances including but not limited to unwelcome acts in which an individual directly, indirectly or through third parties, by any action, method, device or means, follows, monitors, observes, surveils, threatens or communicates to or about a person, or interferes with a person’s property. Substantial emotional distress means significant mental suffering or anguish.

Deepfakes are realistic, AI-generated videos, images or audio that falsely depicts a real person saying or doing something they did not do. In the context of sexual harm, deepfakes are often used to create fake sexual or nude images of someone without their consent.

Doxing is the act of collecting and publicly sharing someone’s personal, private or identifying information, such as their home address, phone number, school, workplace or social media accounts, often to intimidate, harass or cause harm. This information can come from private sources but is often obtained from public records.

Image-based sexual abuse (IBSA) is a term used to describe situations where intimate or sexual images or videos are taken, created, shared or threatened to be shared without someone’s consent. This can include pressuring or coercing someone to send intimate images, threatening to share private images to control or harm someone (sometimes called sextortion), sharing explicit images that are unwanted or unsolicited, or using artificial intelligence (AI) to create fake or altered sexual images of someone.

Sextortion is a combination of the words “sex” and “extortion.” It is a non-physical form of coercion where a perpetrator threatens to send out someone’s private or sensitive materials or intimate pictures if they do not provide them with more sexual images, sexual favors or money.

Online Safety Harm Reduction Strategies

Experiencing harm online or in digital relationships is never your fault. Responsibility always lies with the person who chooses to cross boundaries, manipulate, harass or abuse—not with you for using technology, trusting someone or trying to connect.

Harm reduction strategies are about supporting choice and safety, not preventing harm perfectly. If something happens, it does not mean you did anything wrong.

Remember: AI cannot consent, set boundaries, protect your privacy or prioritize your well-being.

  • Be cautious about sharing intimate details, images or emotional vulnerabilities with AI chatbots or virtual companions—content may be stored, used to train systems or shared with third parties.
  • Avoid relying on AI for emotional validation or relationship advice in place of trusted humans or professionals.
  • Do not send photos, voice recordings or identifying information to AI tools that claim to simulate romantic or sexual relationships.
  • If AI is used for exploration or curiosity, set clear personal boundaries around time, emotional investment and disclosure.

Trust your instincts—if something feels off, you don’t owe anyone continued conversation or explanation.

  • Use in-app messaging instead of moving quickly to personal phone numbers or social media.
  • Avoid sharing details like your class schedule, home address or daily routines early on.
  • Meet in public places and tell a trusted person where you’re going.
  • Use blocking and reporting tools when someone violates boundaries or makes you uncomfortable.

Remember: you don’t owe anyone your location.

  • Share your location only with people you trust and for a clear purpose (e.g., safety during travel).
  • Use temporary or time-limited location sharing rather than continuous tracking.
  • Regularly review who has access to your location in apps and device settings.
  • Turn off location sharing after dates, breakups or changes in trust.
  • Be aware that screenshots or saved location data can be used even after sharing is turned off.

  • Set accounts to private when possible and review follower lists regularly.
  • Use different handles/usernames across platforms.
  • Use a different email address for social media.
  • Avoid posting real-time locations or predictable routines.
  • Be mindful of what personal information can be pieced together from posts, bios or tagged photos.
  • If harassment occurs, save evidence (e.g., screenshots and messages) before blocking or reporting.