A data breach is an incident that involves the unauthorized or illegal viewing, access or retrieval of data by an individual, application or service. It is a type of security breach specifically designed to steal and/or publish data to an unsecured or illegal location. A data breach is also known as a data spill or data leak.
Cyberstalking is a criminal practice where an individual uses the Internet to systematically harass or threaten someone. This crime can be perpetrated through email, social media, chat rooms, instant messaging clients and any other online medium. Cyberstalking can also occur in conjunction with the more traditional form of stalking, where the offender harasses the victim offline. There is no unified legal approach to cyberstalking, but many governments have moved toward making these practices punishable by law.
Cyberstalking is sometimes referred to as Internet stalking, e-stalking or online stalking.
Cyberstalking is one of several cybercrimes that have been enabled by the Internet. It overlaps with cyberbullying and cyberluring in that many of the same techniques are used. Social media, blogs, photo sharing sites and many other commonly used online sharing activities provide cyberstalkers with a wealth of information that helps them plan their harassment. By collecting personal data (profile pages) and making notes of frequented locations (photo tags, blog posts), the cyberstalker can begin to keeping tabs on an individual’s daily life.
The National Center for Victims of Crime (NCVC) suggests that victims of cyberstalking take the following steps:
The NCVC also emphasizes that a victim of cyberstalking should never agree to meet the stalker in person.
Read More »
Join 138,000+ IT pros on our weekly newsletter
Home | Advertising Info | Write for Us | About | Contact Us
2010 - 2014
Partner Sites :