• Perpetrators using technology to control, stalk and isolate victims. 
  • This includes constant messaging or keeping a track of what the victim is doing online and keeping a constant track of where the victim is by accessing the victim's phone location online.
  • Sending abuse over social media or pretending to be someone else when messaging the victim.