If you disagree with the person, state your position objectively and factually. If the person is a member of your workplace: Report the incident s by following your workplace's policy and procedures for workplace bullying , harassment or violence. If someone is harassing you by e-mail in general : If the harasser is known to you, make it clear that you do not want him or her to contact you again.
Once you have told a known harasser not to contact you again, or if you are receiving harassing e-mail from someone you do not know, block or filter messages from the harasser. Many e-mail programs have a filter feature that will automatically delete or place e-mails from a particular e-mail address or that contain offensive words into a separate folder. DO NOT reply to unsolicited, harassing or offensive e-mail if the harasser is not known to you.
By responding, you confirm that your e-mail address is valid and active. DO NOT open attachments as they may contain viruses. Keep a log of any harassing activity. Save all offending communications for evidence, both electronically and in hard copy print. Do not edit or alter them in any way. Using your name, conduct a Web search to find out if any information exists about you, so you are at least aware of what information about yourself is publicly available.
If the harasser is known to you and harassment continues after you have asked the person to stop, contact the harassers Internet Service Provider ISP.
Most ISP's have clear policies prohibiting the use of their services to abuse another person. Often, an ISP can stop the conduct by direct contact with the harasser or by closing his or her account. The ISP domain name is identified by the information after the e. Most ISPs have an e-mail address such as postmaster domain name that can be used for complaints.
In a discussion group: Keep a log of any harassing activity. DO NOT edit them in any way. Contact the group's administrator and provide evidence of the harassment. If they fail to respond, stop participating in the group i. In a live chat situation: Log off. If the situation causes you to fear for your safety or that of others, contact your local police or law enforcement agency.
Keep a record of any harassing activity. If they fail to respond, stop participating in the group. As a user, you can also opt to take action, such as: Always think before you post — are these words or this photo something you would want everyone to see?
Could your comments elicit a potentially harmful reaction? Use recommended privacy settings provided by the site. Unfriend, hide, block, or mute another user from seeing your profile. Remove tags as necessary on posts or photos, or adjust your privacy settings so that you can review tags before they are published.
Keep personal details private, including your address, date of birth, phone number, school, credit card number s , and passwords. Be aware of the details you're showing in photos, such as address numbers, street names, and work buildings.
Anyone who thinks their life is in immediate danger should call Next, as with any crime, the target of email harassment should save all evidence of abuse, taking screen shots, printing out emails, and making note of links to websites. I set up filters in my email accounts and directed all emails from the sender into a separate email account so I didn't have to see these insane messages in my inbox. Also, don't engage with the abuser beyond a clear, firm request for the abuser to cease and desist.
Save the evidence that this request was sent. Often the sick person wants attention and wants to drag you down into engaging at their level. Don't be sucked in. Chances are good that they've bullied other people. I made contact with Haltabuse. Peter Kurata, the kindly case worker assigned to help me, wrote, "The cease and desist is next not only to document your disapproval, but to show non-compliance by the abuser. Whether in email or on a website, reply or post a message to remove the offending material, and save evidence.
Most email services and social media sites have a way to report abuse. For example, email harassment is a violation of Gmail policy, and Google has a specific page for reporting a Gmail user who engages in abusive emails.
You need to copy the email header from the sample email reported to Google, and that process is explained on the Google page. A response from Google may take some time. Sometimes an attorney is necessary when an email can't be traced to the source, and a subpoena is necessary for gathering supporting evidence. Kurata contacted the online vendor, from whom I still receive emails, but since the harasser used their own credit card, there was nothing to be done.
He recounted that Jayne Hitchcock , the founder of Haltabuse. It gave her a passion for helping others. No one gets paid and we do whatever we can with a skeleton staff," Mr. Kurata said. Department of Justice nor any of its components operate, control, are responsible for, or necessarily endorse, this website including, without limitation, its content, technical infrastructure, and policies, and any services or tools provided. Skip to main content.
You are here Home » Legal Information. Safety when using email What precautions should I take if I want to email a domestic violence program for help? Can the abuser access my email account? What should I do if I think the abuser can access my email account? What safety steps should I take even if I think the abuser does not have access to my email account?
What should I do if I receive threatening or harassing emails from the abuser?
0コメント