We are busy developing a new and improved website

Stalking involves a persistent course of conduct or actions by a person which are intended to maintain contact with, or exercise power and control over another person. These actions cause distress, loss of control, fear or harassment to another person and occur more than once.

Stalking can involve threats or sexual innuendo and the stalker generally tries to intimidate or induce fear in the person they are stalking. The person being stalked may only realise they are being stalked once they identify a pattern of strange or suspicious incidents occurring, such as:

• phone calls
• text messages
• messages left on social networking sites (e.g. Facebook / Twitter)
• notes left on their car
• flowers left at their home
• an awareness that they are being followed
• being continually stared at by another person.

The person being stalked often develops a sense of loss of control over their lives and is forced into changing their life routine and behaviours.

Stalking is committed when a person:

Intentionally and persistently without legitimate reason engages in a course of conduct directed at another specific person against their will.

This causes the other person to develop fear, or to believe that harm would come to them.
Simply this means that whatever intentional actions the stalker takes to put you in fear can be considered stalking when it occurs more than once and against your will.

Digital Stalking

Digital stalking: a guide to technology risks for victims, author: Jennifer Perry

Women’s Aid has teamed up with national stalking charity Network for Surviving Stalking to launch a practical guide for victims of stalking. ‘Digital stalking: a guide to technology risks for victims’ is an important resource for all stalking victims, including the many survivors of domestic violence who are being stalked by an ex-partner. It explains the wide range of technological risks for those being stalked, including use of Spyware on personal computers, tracking devices on mobile phones, and tracking of information through social networking sites.

Click here to download the free document