WomensLaw serves and supports all survivors.

Close

About Abuse

Abuse Using Technology

View all
Updated: July 14, 2017

What are some examples of computer crimes?

Below are some of the more common forms of computer misuse, which can be considered a computer crime.

Hacking is when someone gains access to your computer without your permission or accesses more data or information than what you allowed. An abuser could gain access to your devices or accounts if s/he knows your passwords. S/he could also do so if s/he has the skills to break into them. Or s/he may use software designed to gain entry into your technology. This can all happen without you knowing.

Spyware and stalkerware are types of software that allow someone to secretly monitor or observe your computer activity. Once it is installed, an abuser can see and record what you type, the websites that you visit, your passwords, and other private information. It can be installed on smartphones and on other devices, such as tablets and computers without your knowledge. Someone can install it on your device in person or by sending attachments that will download the software onto your device when you click on a link or download the attachment. It can be difficult to notice or remove.

Phishing is a way that an abuser may use a text message, email, or call that looks real to trick you. You may also hear the term “smishing.” This is phishing by text message. The abuser may scam you into giving your personal information or an account password. S/he could then use it to steal your identity, monitor you, or log into your accounts.

Computer fraud is when someone uses computers or the internet to defraud people, companies, or government agencies. (To “defraud” someone means to get something of value through cheating or deceit, such as money or internet access.) An abuser might pose as someone else and defraud you or pose as you and defraud someone else to get you in legal trouble.

Identity theft involves getting someone else’s personal or financial information in order to misuse that person’s identity. An abuser could use your identity to do any of the following:

  • destroy your credit score;
  • attempt to make you lose your job;
  • apply for or get public benefits in your name; or
  • commit a crime in your name, thereby subjecting you to criminal consequences for his/her actions.

Abusers often use information that they already have available to steal an identity, such as a Social Security number, name and date of birth, residential history, or something else. Or s/he could get the information through hacking, stalkerware, or phishing.

It can be worrying to not know whether your tech is safe to use. Or to know that it is not safe, but to feel that you have no other options. Safety Net has resources to help you navigate these issues. Check out their information on Password Safety, Spyware and Stalkerware, and Securing Devices and Accounts.