in Line with this study that the twelfth Pole he was or is a victim of persecution is persecution . A variety of traditional stalking is cyberstalking or his constant harassment of a person through telephone calls, sms messages, letters or emails, followed by threats and aggressive behavior, to monitor, to observe, to spy, causing the victim’s negative emotions, from fear, after stiffness. Cyberstalking is a crime, prey on the statement of the victim. For crime punishment till three years of imprisonment. Can also be a judgment prohibiting approach.
to be able to talk about the crime should be, is the result in the form of the emergen ce of reasonable circumstances, the sense of threat or substantial breaches of confidentiality. A sense of danger, must, therefore, have objective character, i.e. to be a natural reaction of the average, rational person.
the Victim cyberstalkingu must submit a notification of committing a crime to the Police or to the Prosecutor. To happen an effective conviction of the perpetrator, crime, prosecution, court, and law enforcement officials must have evidence to prove the fact of committing a crime. Evidence of a crime will SMS, print, e-mail, so you don’t have to remove the correspondence received from the offender. In the case of prosecutions, social networks, forums and chat rooms to make screen shots of the so-called screenshots print as well as digital recording.
the Author is a lawyer Jeanne Crow from the office Gardocki and Partners Attorneys and Lawyers And
Who can be a victim of harassment?
Yes, indeed, every one of us. The culprit of the persecution of so-called stalkerem often a former partner, employee, colleague, class. However, this may be the person is a complete stranger, in this case, the Stalker produces, as a rule, an imaginary emotional bond with his victim. Especially prone to public figures, movie stars or sports, but a victim can also be the people who accidentally came in the way of the pursuers.
What actions taken in cyberspace we can be considered cyberstalking?
to Replace should impersonate a person, on forums, in chats, social networks, and in extreme cases of hacking with the appropriate tools to the victim’s computer and view her personal documents, sending unsolicited email messages, sending computer viruses (causing, for example, automatic content download phenomena, for example, pornography). Cyberstalker may also act in such a way that spreading false information about t he victim, vilify and intimidate his victim, gives his personal information, phone numbers, intimate photos, etc., Such actions can have negative mental consequences especially for children of school age who may have a big problem with adoption among believers in the false difficulty of a Stalker. In extreme cases even reached targnięcia sacrifice his own life.
how to protect yourself from cyberstalkingiem?
it Should be borne in mind that we are not anonymous on the Network. The trend of sharing information, photos of their and their loved ones on the Internet leads to the fact that a potential criminal can easily find out about the details of our life: who’s Dating where we are, what are our interests etc. they don’t give the Internet your address, phone number, personal data, do not use the same password everywhere, to be skeptical towards e-mail and messages from unknown people, and not to be attributed to this type of message. In case of contact with stalkerem better in a straight path and to clearly Express the unwillingness of future relations, to break off all contact, do not respond to messages. The behavior of these security measures will prevent or seriously impede cyberstalkerowi to track our movements in cyberspace.
by the Author of the article is the lawyer Oksana Vorona from the office Gardocki and Partners and Lawyers And Consultants
More information: www.gardocki.pl
No comments:
Post a Comment