What Is Cyber Harassment?
Cyber harassment is repeated, targeted online conduct designed to intimidate, embarrass, distress, or harm a specific individual. When it involves non-consensual intimate imagery, it intersects with NCII law and may constitute federal cyberstalking.
Cyber harassment exists on a spectrum from targeted social media attacks to coordinated harassment campaigns involving multiple perpetrators. In the NCII context, harassment frequently accompanies intimate image distribution — perpetrators share images, encourage others to share or contact the victim, and maintain ongoing threat pressure. Federal cyberstalking law (18 U.S.C. § 2261A) criminalizes harassment using electronic communications that causes substantial emotional distress. Many states have separate cyberbullying and cyber harassment statutes. Platform reporting, civil protection orders, and law enforcement involvement are the primary responses.
Key facts about this term
-
Document every incident with timestamps Screenshot, date-stamp, and preserve all harassing communications, posts, and content. This record is essential for law enforcement, civil protection orders, and platform trust and safety reports.
-
Report to the platform and law enforcement simultaneously File trust and safety reports on every platform where harassment occurs. File a report with local law enforcement and the FBI's IC3, especially when threats are included.
-
Seek a civil protection order if the harasser is identifiable A restraining order prohibiting contact and content distribution can provide legal protection and create criminal consequences for continued harassment.
Frequently asked questions
Is cyber harassment a criminal offense?
Federal cyberstalking law (18 U.S.C. § 2261A) criminalizes cyber harassment that causes substantial emotional distress. Most states also have criminal cyber harassment or cyberbullying statutes.
What if my harasser is anonymous?
Platform subpoenas (obtained through a privacy attorney or law enforcement) can often unmask anonymous perpetrators by linking accounts to IP addresses and device identifiers.
Find and remove your photos now
Upload a photo. We scan 2.4 billion face embeddings and send legal removal notices in 48 hours.
Remove photos now
ScanErase