BucketOrange Magazine http://bucketorange.com.au Law For All Sat, 29 Oct 2022 04:11:19 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.3 http://bucketorange.com.au/wp-content/uploads/2015/09/cropped-11162059_848435651860568_6898301859744567521_o-32x32.jpg BucketOrange Magazine http://bucketorange.com.au 32 32 249117990 #LongReads: Everything Your Social Media Stalker Wishes You Didn’t Know http://bucketorange.com.au/how-to-prevent-and-report-a-cyberstalker/ http://bucketorange.com.au/how-to-prevent-and-report-a-cyberstalker/#respond Thu, 15 Dec 2016 03:13:29 +0000 http://bucketorange.com.au/?p=4451 Signs you're being cyberstalked

Social media stalking – we are all guilty of it, and some of us indulge ourselves a little more frequently than we care to admit. Come on, you know that you have looked at your ex’s Facebook profile at least three times this week, just to confirm that their life is hellish and miserable without you.

Of course, it is human nature to be curious. While technology allows us to satisfy inquiring minds, it has also opened up our lives in ways that we couldn’t imagine a decade ago. People can contact us even when we don’t want to be contacted.

Even corporations do it! It’s now commonplace for employers to seek out information on applicants or employees through social media and use it to decide whether you are good fit for their company. Why wouldn’t they? Your internet usage reveals much about who you are: your likes, dislikes, political leanings, religious views, sexual preferences, whether you have an active social life, the places you like to go, and even how frequently you enjoy a nice drop of red or a frothy ale.

Looking up social media profiles has become something of a societal norm – whether for social or professional screening purposes. But there is a difference between harmless curiosity and obsessive (potentially unlawful) cyber stalking. Unlike stalking in the physical sense, the rapid evolution of technology has given those with nefarious intentions the opportunity and luxury to monitor your every thought, feeling and movement from the comfort of their couch.

What protection do privacy settings offer?

In most cases, privacy settings are a great way to protect yourself.

Facebook lets you to tailor your audience for each update, to decide which pictures you want to share with your friends and which ones you want to share publicly. You can also block someone from seeing or searching for your profile entirely.

Identifying and preventing cyberstalking

The thing is, most of our internet usage is not restricted to one social media platform so limited privacy settings can only go so far. Every time you use any form of online technology you leave a trail of digital breadcrumbs. It doesn’t take much for someone to collect these crumbs and piece together a complete picture of your most personal and identifiable information.

Social media is a cyber stalker’s dream

If we dig a little deeper, it’s almost as though certain Facebook features have been created specifically to facilitate and encourage undetected observation by others.

Ways in which you can be cyberstalked

1. Getting notifications every time you do something 

Facebook’s ‘close friends’ function is a perfect example. Others can add you as a ‘close friend’ which means they are notified the minute that you like or comment on a photo, update your status or check in somewhere. The scary part is that there is no way to know who has added you to their ‘close friends’ list and, therefore, who receives real-time notifications about where you are or what you are doing.

2. Viewing every photo you have ever liked (even if you are not friends)

Another feature sure to be over utilised by stalking aficionados is Facebook ‘search.’ Regardless of whether or not you are Facebook friends, it is possible to search for and gain access to the history of all photos someone has liked or commented on simply by typing the following into the search bar:

  • photos liked by [insert name]; or
  • photos commented on by [insert name]; or
  • pages liked by [insert name].

3. Stalking your friends and networks

Even if someone cannot view your profile page, they can go to the pages of your best friends (the nine people on your profile page that Facebook considers you are closest to).

Depending on your friend’s privacy settings, anyone can learn more about you by viewing their photos or your posts on their page.

Are you are being cyberstalked?

Sometimes the signs can be subtle and easy to overlook. The key thing to remember is that it may not necessarily be somebody you know who is tracking your online activity – it could be a complete stranger who has become fixated with you.

Warning signs may include situations where:

  • Someone keeps track of when you are online. They may regularly initiate contact via Google Hangouts, Facebook chat or they may follow you around Reddit forums they did not participate in before you met them. If the same person seems to be turning up wherever you go online, it is likely that they know your schedule and it is not a mere coincidence.
  • You may receive emails or messages with increasing frequency. When you don’t reply, the person might send another message that covers different topics.
  • Someone may persistently engage with every social media update you post, tag you in comments or other posts or direct their comments to you personally. You may feel singled out because that person always responds to what you have posted in a way that makes you feel uncomfortable.

Persistent online behaviour can quickly morph into a real world stalking scenario.

If someone you know is cyberstalking you, their behaviour may become obvious during face-to-face interactions. It may be that:

  • A particularly persistent work colleague reveals personal information about you during
    a conversation – information that you did not tell them yourself. It could be something innocuous like what you did over the weekend, the names of your close friends or whether you are dating anyone. Pay attention to these types of warning signs as they could indicate this person has a deeper underlying fixation with you.

How to know if you are being cyberstalked

  • An acquaintance continually shows up at the same places as you. For example, while you are out at lunch or Friday night drinks with friends. This could be a coincidence but if it happens more than a few times, it could mean that they are using social media or other technology to learn where you will be and to follow you there.

The key to understanding unlawful cyberstalking is that the unwanted behaviour must be repeated.

The Australian Institute of Criminology defines cyberstalking as any persistent online behaviour that instils apprehension and fear.

This might include situations where:

  • You are harassed by abusive emails or instant messages
  • You are singled out and repeatedly tagged in posts or have comments directed at you
  • Someone impersonates you or spreads rumours about you that are untrue (for example, by hacking your social media or email accounts or sending abusive messages to your family or friends)
  • Someone threatens to share or actually shares intimate or embarrassing pictures or videos of you online
  • Someone repeatedly and persistently contacts you across various social media or other online platforms

If the someone’s online behaviour makes you feel scared or intimidated then you are being cyberstalked.

What does the law say?

Under current Australian law, stalking (including cyberstalking), is a serious offence in all states and territories and carries a maximum penalty is 5 years in jail or a fine of $5000.

Each jurisdiction treats stalking in their criminal legislation differently, but essentially you are being stalked when you receive repeated attention that intimidates or frightens you. In some states and territories, it can still be considered an offence even where you are not actually intimidated or frightened by the stalking behaviour.

In NSW, under the Crimes (Domestic and Personal Violence) Act 2007, it is a crime for someone who you are (or were) in a relationship with to stalk or intimidate you with the intention of causing you to fear physical or mental harm. If the police decide to prosecute, it is not necessary to prove that you actually feared physical or mental harm.

Steps you can take to protect yourself from cyberstalking

Stalking can include someone making numerous unwanted phone calls, sending you threatening or abusive text messages or emails, contacting you through the internet, social media, computers and surveillance devices with the intention of causing you mental or physical harm.

Commonwealth legislation criminalises cyber-harassment but does not provide for a general offence of harassment. The Commonwealth Criminal Code makes it an offence to ‘use a carriage service to menace, harass or cause offence’ and to ‘use a carriage service to make a threat’. This captures harassment through the internet, social media, and telephone. The maximum penalty is three years imprisonment or a fine of $19,800.

Time for legislative reform? 

Use of technology-facilitated violence is a developing area of law.

The offence of cyberstalking currently falls within the existing offence of stalking in state and territory legislation and cyber-harassment provisions under the Commonwealth Criminal Code.

However, given the distinctive nature of cyberstalking and the highly damaging impact it can have on victims, as well as the ease in which technology allows perpetrators to harass and intimidate others with relative impunity, it is perhaps time for legislative reform.

Misuse of social media and technology is likely to see a steady increase in insidious cases of technology-facilitated stalking and violence. If left unchecked, this behaviour has the potential to flow on to other serious offences.

Australian cyberstalking legislation

In the case of victims fleeing domestic violence, the ability of abusers to track the physical location of victims (and to act on that information) with ease, can and does result in serious and potentially life-threatening scenarios. It is only a matter of time before social media and other technology is exploited far more extensively.

To address the issue, urgent harmonisation of disparate state and territory stalking provisions, together with tougher penalties and more active enforcement is essential.

A uniform and stand-alone cyberstalking criminal offence may go some way towards the better regulation of intimidating, damaging and unwanted online activity.

What can you do if you are being cyberstalked?

Collect Evidence

As a first step, record or take screenshots of any abusive, harassing or intimidating material that is directed at you. This allows you to verify your claims if it gets to the point where you need to make a complaint to the police and for them to commence an investigation.

Block

If you are being harassed on social media one of your first steps should be to block the person from all of your social media accounts.

Report

If you are being stalked, harassed or bullied through social media you can utilise the social media carrier’s ‘reporting’ function. Most carriers have a feature for reporting abusive or harassing behaviour. You can also report it to the Australian Cybercrime Online Reporting Network (ACORN).

If there is found to have been an infringement of any state or federal law, ACORN refers your matter to the relevant law enforcement agency.

How to report cyberstalking in Australia | BucketOrange Magazine

Make a complaint to the police

If you have genuine fears for your safety, you should report it to the police as soon as possible. Being able to provide the police with a timeline of events and evidence such as screenshots will ensure that your complaint is taken seriously.

Make sure you have a timeline of events, and evidence such as screenshots. This will ensure that your complaint is taken seriously.

Prevention

Constantly shifting social media landscapes mean that, in many ways, it is inevitable that your personal and business information will be more accessible to the world at large.

You can, however, start to practise greater awareness of others’ online behaviour and your own. If someone’s interactions with you seem strange or repetitive, don’t assume it is harmless because it happened online. Just because something starts online, does not mean it will end there.

While some legislative protections and deterrents are in place, the only real way to protect yourself is to exercise constant vigilance and to be mindful of the information you choose to share.

Further Information

If you or someone you know has been a victim of cyberstalking contact:

  • Australian Cybercrime Online Reporting Network (ACORN) to make a report.

If it is in breach of Australian law, your incident will be referred to the relevant government agencies or law enforcement for further investigation.

  • Local police assistance line: 131444
  • National Counselling Helpline: 1800 737 732 (for assistance and practical strategies on how to cope with the ongoing effects of online harassment).

Legal Resources:

Download the Smartsafe app to record evidence of family violence safely:

Have you, or someone you know, been a victim of cyberstalking? What was your experience and how did you go about handling it? Let us know in the comments!

]]>
http://bucketorange.com.au/how-to-prevent-and-report-a-cyberstalker/feed/ 0 4451
Someone Used Your Photo Without Permission? Here’s What You Do http://bucketorange.com.au/what-to-do-if-your-photo-is-used-without-your-permission/ http://bucketorange.com.au/what-to-do-if-your-photo-is-used-without-your-permission/#comments Wed, 26 Feb 2014 12:05:33 +0000 http://bucketorange.com.au/?p=740 How protecting your images is a lot like surviving a wild bear attack. 
 
 
 “Bears are opportunistic animals, they take food at the easiest place to get it” – Marko Jonozovic
 

The internet is littered with bears.

The difference is that web bears are not after your food.

They’re after your content.

A seemingly harmless way to access and download pictures, Google Image Search has become a popular ‘go to’ solution for a range of individual and company needs. But without proper permission, or licensing a person or company cannot use your photo without your approval.

Here we show what to do if you meet a bear consuming your content, how to fend off a grizzly attack on your photos and other options that may be available to you.

How to survive a cyber attack

When faced with a threat to your content your chosen course of action will depend on your circumstances and the ideal outcome you seek.

Below is a checklist with some suggested strategies:

1. Identify the bear quickly upon your encounter

Is it a ferocious grizzly (a corporation making a profit from your image) or a lone black bear (a private blogger)? Recognising the species of offending animal early will ensure your next steps are not only deliberate and informed but also guarantee your survival.

If you suspect someone is using your photo without permission, first locate the name of the individual or company. You can do this by entering the website name into whois.net. This will arm you with information on the site’s owner/administrator.

Many amateur and professional photographers now take proactive measures to protect their content by undertaking regular reverse searches using Google Image Search. A detailed tracking document that records the date, website, name and contact details of sites using your photos without permission will give you a number of options and also streamline the legal process should you decide to take things further.

2. Deal with the attack as calmly as possible

Avoid making any sudden movements. Bears don’t like surprises.

Aggressively tweeting, facebooking, emailing or phoning will only antagonise the giant.

Step back from the situation, moving slowly and deliberately. Think about the outcome you would like to achieve before sending an initial email.

Below is a short template you may wish to consider using:

Dear [insert relevant name]

I trust this note finds you well.

I have to draw to your attention a matter of concern to me.

I have noticed that an image of mine has been published on your [website / merchandise / advertisement / social media / blog] without my knowledge or approval.

As the sole copyright owner of this image, I would appreciate if you could [remove the image from your website / credit the image with my name].

I regret to have to advise you that if you continue to use my image without my permission, I will be forced to pursue legal action.

Regards,

[insert your name]

3. Pick your battles – Know when to play dead and when not to

In Australia, copyright protection is automatic as soon as your original photo is captured.

If you take an image, you own it.

There is no formal step (such as registration in the US) required to protect your photo under copyright law. Most countries including Canada, China, France, Germany, the UK and the US grant copyright protection to Australian work under international treaties.

Lone opportunists

While no case of your picture being used without permission is ideal, it may be a case of genuine mistaken identity. Early identification means you are in a better position to decide on a course of action.

In most cases it’s likely that an individual has inadvertently consumed your content without realising they were infringing your copyright.

If this is the case, a few strategic displays such as speaking in a low, calm voice and slowly raising your arms in the air to make you appear bigger should make the animal back away.

A simple email or social media message requesting your desired outcome will ordinarily suffice.

Most private individuals will be horrified to hear that they have used your content or published incorrect information and happy to either correctly credit the source; include a live link back to your site; or remove the image altogether.

In Australia, although there is little guidance on what constitutes copyright infringement in the digital age, a recent Federal Circuit Court case established that being ignorant to the owner or need to correctly attribute a photo is no defence to copyright infringement.

This means that it is not possible for someone to argue that they did not know they were infringing copyright regulations by using your photo.

Knowing consumption

If a commercial entity or a mainstream media outlet has knowingly infringed your copyright and is profiting from unauthorised consumption of your photo you may wish to take things further by sending a bill for compensation or seeking damages.

Many professional photographers are successfully suing corporations for breach of copyright and loss of profits for use of their images on websites, magazines, books, t-shirts, advertising or merchandise without seeking permission or paying licensing fees.

To ensure you’re still standing after a face-off with a grizzly corporation you will need to significantly increase your arsenal by contacting a lawyer who specialises in copyright law.

Copyright lawyers hunt bears for a living.

They will advise you on your rights, whether your claim is worth pursuing, the best course of action based on your circumstances and possible remedies you may be awarded based on the loss you have suffered. This could mean an injunction that stops the person or company using, or continuing to use, your image or damages as compensation for the infringement.

The court will take into consideration the seriousness of the infringement and whether it was highly profitable in assessing the amount of damages to award.

5. Exploit the bear’s weaknesses

Understanding your basic rights puts you in a position of power to protect yourself against potential aggressors.

Plan your best possible survival strategy and fight to survive.

In Australia, if you are the owner of copyright in an artistic work (such a as a photo) you have exclusive rights to:

  • reproduce your work;
  • publish your work; and
  • communicate your work to the public.

Copyright protection lasts for 70 years after the photographer’s death.

The Copyright Act also provides you with three moral rights (separate from copyright protection) over your work, including:

  1. right of attribution of authorship (the right to be named as the author of your work);
  2. right against false attribution (the right not to have someone else named as the author of your work); and
  3. right of integrity of authorship (the right not to have your work detrimentally affect your reputation).

If your moral rights are infringed, you may seek damages, an injunction or a public apology.

6. Move quickly and outsmart would-be web bears

While there are a range of remedies available to right a loss suffered from unauthorised use of your pictures, it is worthwhile exploring preventative measures to reduce your risk of an unpleasant encounter.

Some strategies you may wish to consider are:

  • clearly watermarking images with your copyright details. For example, © [your name/brand/site/year]. While this strategy is not 100% effective it does require an additional layer of effort, such as cropping, which will go some way towards discouraging opportunists;
  • only posting low resolution versions of your photos. This makes your content less attractive as a potential target;
  • if you own a website, try disabling right click download options from your pictures. Again, this approach is not completely effective but it does serve as a clear warning;

Julianna Koh-Blackwell, an award-winning Sydney-based pet photographer uses the ‘disable right click download’ approach.

A 'right click' warning on Blackwell’s site.

A ‘right click’ warning on Blackwell’s site.

If you are based in Australia, you may also wish to consider registering your images under the US copyright system – particularly if they are likely to be used overseas. This serves to remove any question of ownership rights if a US-based publication or company happens to use your image.

Happy endings

In the digital age, unpleasant encounters with opportunistic internet feeders are not just likely … they are inevitable.

It may be a case of an individual accidentally foraging for content in the wrong place, or it could be something more serious.

In either case, how you choose to deal with the situation will largely depend on the outcome you seek.

Stay informed and take proactive steps to protect yourself and your pictures.

Think you’re ready to tackle a bear head on?

  • Make things easier for yourself and seek out a professional based in your area; or contact
  • Arts Law Centre – for more information on your rights as a photographer and access to legal professionals specialising in copyright law.

What experiences have you had with people using your images online and how did you deal with it? Tell us about it in the comments section below!

]]>
http://bucketorange.com.au/what-to-do-if-your-photo-is-used-without-your-permission/feed/ 1 740