- harassing phone calls and esemesami,
- worrying electronic mail messages: e-mails, messages transmitted via instant messaging, transmitted through websites, etc.
- impersonation,
- use someone else's image,
- dissemination of compromising photographs and entries about the persecuted people
- breaking into the victim's computer,
- break into online accounts, such as e-mail boxes, profiles on social networking sites, instant messaging, etc.
No comments:
Post a Comment