{"id":1206,"date":"2020-08-18T07:29:04","date_gmt":"2020-08-18T07:29:04","guid":{"rendered":"http:\/\/gocstg2020.govmu.org\/maucors\/?page_id=1206"},"modified":"2021-03-02T09:15:11","modified_gmt":"2021-03-02T09:15:11","slug":"cyber-stalking","status":"publish","type":"page","link":"https:\/\/maucors.govmu.org\/maucors\/?page_id=1206","title":{"rendered":"Cyber Stalking"},"content":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1614676433615{padding-top: 60px !important;}&#8221;][vc_column_text css_animation=&#8221;slideInLeft&#8221;]<\/p>\n<h3 style=\"text-align: center;\"><strong>Cyber Stalking<\/strong><\/h3>\n<h5 style=\"text-align: center;\">Cyber stalking is a form of online harassment in which the perpetrator uses electronic communications such as social media to stalk a victim.<\/h5>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;1220&#8243; img_size=&#8221;580&#215;250&#8243; style=&#8221;vc_box_shadow_border&#8221; onclick=&#8221;zoom&#8221; css_animation=&#8221;slideInRight&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1614676493084{padding-top: 15px !important;}&#8221;][vc_column][vc_column_text css_animation=&#8221;slideInRight&#8221;]Cyber stalking is a form of online harassment in which the perpetrator uses electronic communications such as social media to stalk a victim. Cyberstalking is considered more dangerous than other forms of cyberbullying because it generally involves a credible threat to the safety of the victim.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css_animation=&#8221;slideInLeft&#8221;]&nbsp;<\/p>\n<h3>Examples of cyber stalking are:<\/h3>\n<p>&nbsp;[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css_animation=&#8221;slideInRight&#8221; css=&#8221;.vc_custom_1597735498846{padding-left: 50px !important;}&#8221;]<\/p>\n<ul>\n<li>Sending manipulative, threatening, or harassing messages<\/li>\n<li>Hacking into a victim\u2019s social media accounts (such as banking or email) and changing the victim\u2019s settings and passwords<\/li>\n<li>Creating fake accounts on social networking and impersonating the victim or attempting to establish contact with the victim by using a false persona.<\/li>\n<li>Posting messages to discussion groups with the victim\u2019s personal information, such as home address, phone number or other personal information.<\/li>\n<\/ul>\n<p>&nbsp;[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css_animation=&#8221;slideInLeft&#8221;]<\/p>\n<h3>I am a victim of cyberstalking \u2013 how do I stop it?<\/h3>\n<p>&nbsp;[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css_animation=&#8221;slideInRight&#8221; css=&#8221;.vc_custom_1597735568122{padding-left: 50px !important;}&#8221;]<\/p>\n<ul>\n<li>Report the cyber stalking material to the social media service it happened on<\/li>\n<li>Collect evidence of the cyberbullying material such as messages, screen shots and print conversations<\/li>\n<li>Block the person<\/li>\n<li>Talk to someone you trust straight away &#8211; like a parent, sibling, uncle\/aunt, teacher or friend<\/li>\n<li>Do not retaliate or respond as they might use it against you<\/li>\n<\/ul>\n<p>&nbsp;[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css_animation=&#8221;slideInLeft&#8221;]<\/p>\n<h3>How to prevent from being cyberstalked?<\/h3>\n<p>&nbsp;[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css_animation=&#8221;slideInRight&#8221; css=&#8221;.vc_custom_1597735684465{padding-left: 50px !important;}&#8221;]<\/p>\n<ul>\n<li>Be careful what personal information you share online<\/li>\n<li>Create a different email account for registering in social networking sites and other online spaces.<\/li>\n<li>Do not feel obligated to fill out all fields when registering online or provide identifying information such as birthdates and place in required fields.<\/li>\n<li>In your online user profile, use a photo that does not identify you or your location<\/li>\n<li>Consider using a name that is not your real name or a nickname as your email name, screen name or user ID.<\/li>\n<li>Do not to use common dates such as your birthday as the digits in your email name or password.<\/li>\n<li>If you are breaking up with an intimate partner \u2013 especially if they are abusive, troubled, angry or difficult \u2013 reset every single password on all of your accounts<\/li>\n<li>Services such as Facebook change their privacy policy all the time, so it is a good idea to check your privacy settings to make sure you are sharing the information you want to share with people you trust and not the general internet public.<\/li>\n<\/ul>\n<p>&nbsp;[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1614676433615{padding-top: 60px !important;}&#8221;][vc_column_text css_animation=&#8221;slideInLeft&#8221;] Cyber Stalking Cyber stalking is a form of online harassment in which the perpetrator uses electronic communications such as social media to stalk a victim. [\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;1220&#8243; img_size=&#8221;580&#215;250&#8243; style=&#8221;vc_box_shadow_border&#8221; onclick=&#8221;zoom&#8221; css_animation=&#8221;slideInRight&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1614676493084{padding-top: 15px !important;}&#8221;][vc_column][vc_column_text css_animation=&#8221;slideInRight&#8221;]Cyber stalking is a form of online harassment in which the perpetrator uses electronic [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1206","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=\/wp\/v2\/pages\/1206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1206"}],"version-history":[{"count":3,"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=\/wp\/v2\/pages\/1206\/revisions"}],"predecessor-version":[{"id":1586,"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=\/wp\/v2\/pages\/1206\/revisions\/1586"}],"wp:attachment":[{"href":"https:\/\/maucors.govmu.org\/maucors\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}