What are computer crimes?
The term “computer crimes” refers to a broad category of crimes that could violate your privacy or interfere with your data/technology. Computer crimes include, but are not limited to, misusing a computer to:
- steal information or something else of value;
- scam or trick you;
- harass you;
- impersonate you;
- blackmail you; or
- create or publish sexual images of you.
Some of these crimes can also be committed without computers or tech, such as fraud or identity theft. But technology can often make it easier for an abuser to commit those crimes. It can help him/her:
- access or use your private information;
- copy your data;
- destroy your information; or
- interfere with your data or technology.
What are some examples of computer crimes?
Below are some of the more common forms of computer misuse, which can be considered a computer crime.
Hacking is when someone gains access to your computer without your permission or accesses more data or information than what you allowed. An abuser could gain access to your devices or accounts if s/he knows your passwords. S/he could also do so if s/he has the skills to break into them. Or s/he may use software designed to gain entry into your technology. This can all happen without you knowing.
Spyware and stalkerware are types of software that allow someone to secretly monitor or observe your computer activity. Once it is installed, an abuser can see and record what you type, the websites that you visit, your passwords, and other private information. It can be installed on smartphones and on other devices, such as tablets and computers without your knowledge. Someone can install it on your device in person or by sending attachments that will download the software onto your device when you click on a link or download the attachment. It can be difficult to notice or remove.
Phishing is a way that an abuser may use a text message, email, or call that looks real to trick you. You may also hear the term “smishing.” This is phishing by text message. The abuser may scam you into giving your personal information or an account password. S/he could then use it to steal your identity, monitor you, or log into your accounts.
Computer fraud is when someone uses computers or the internet to defraud people, companies, or government agencies. (To “defraud” someone means to get something of value through cheating or deceit, such as money or internet access.) An abuser might pose as someone else and defraud you or pose as you and defraud someone else to get you in legal trouble.
Identity theft involves getting someone else’s personal or financial information in order to misuse that person’s identity. An abuser could use your identity to do any of the following:
- destroy your credit score;
- attempt to make you lose your job;
- apply for or get public benefits in your name; or
- commit a crime in your name, thereby subjecting you to criminal consequences for his/her actions.
Abusers often use information that they already have available to steal an identity, such as a Social Security number, name and date of birth, residential history, or something else. Or s/he could get the information through hacking, stalkerware, or phishing.
It can be worrying to not know whether your tech is safe to use. Or to know that it is not safe, but to feel that you have no other options. Safety Net has resources to help you navigate these issues. Check out their information on Password Safety, Spyware and Stalkerware, and Securing Devices and Accounts.
How can an abuser commit a computer crime as a way to abuse me?
An abuser could commit a computer crime to gain access to your personal information and use that information to keep power and control over you. S/he may do this by breaking into your computer, phone, or other device, and copying or stealing your data, such as:
- your Social Security number or other private identifying information;
- employment information;
- calendar details.; or
- photos or videos, especially ones of a sexual nature.
Depending on what the abuser steals or learns, s/he may use that information to:
- stalk you by showing up at the places marked in your calendar;
- publish your photos, videos, or personal information to harm, embarrass, or endanger you;
- blackmail you by threatening to share your private information; or
- otherwise harass or intimidate you.
If the abuser steals nude or sexual images or videos, s/he may threaten to post or share these videos as a way to gain control over you. You can learn more about this on our Abuse Involving Nude/Sexual Images page.
What types of laws address computer crimes?
There are several federal laws that address computer crimes, including the Computer Fraud and Abuse Act and the Wiretap Act. Many states also have specific laws that prohibit hacking, unauthorized access, computer trespass, or something similar.
The National Conference of State Legislatures lists computer crime laws and spyware and stalkerware laws on their website. You can go to our Crimes page in your state to see if we list any relevant crimes.
You may also be able to use the civil legal system to combat computer crimes. For example, you may be able to sue the abuser in civil court for money “damages” based on what you lost and other harms that you experienced. Civil courts provide other options as well. You may be able to ask a court to issue a civil restraining order that specifically prohibits accessing your personal data or committing any unauthorized access of your devices. Violating a restraining order could put the abuser in contempt of court, which could have civil or criminal consequences. Go to our Restraining Orders page to read about what types of civil restraining orders are available in your state.
It can be helpful to get legal advice or representation when filing something in court. You can find lawyer referrals on our Finding a Lawyer page. Or you can contact the National Crime Victim Bar Association for a lawyer referral.