Seeking the proximity of the victim with serious detriment to the person’s lifestyle and arousing, indirectly, directly or virtually, distress, fear or harm in the targeted person. This can be done in particular by trying to establish contact by any means, misusing the victim’s personal data for the purpose of ordering goods or services or causing third persons to make contact, threatening the victim or someone close to the victim.
… sexual assault (excluding rape); sexual harassment; and stalking. For the purposes of this report, five main sectors … sources of administrative data cover sexual harassment and stalking. Intimate partner violence is broadly covered by … intimate partner violence, rape and sexual assault while stalking and sexual harassment are only covered by a limited …
… and/or sexual violence, one in five has experienced stalking, one in twenty has been raped. If you want to … includes non-consensual sharing of intimate images; cyber stalking; cyber harassment; and cyber incitement to violence …
… women and girls who have experienced sexual harassment, stalking or violence from an intimate partner in the physical … the flipside, violence that begins online, in particular stalking, can often bleed into the real world. Abusive … forms of cyber violence, such as cyber bullying, cyber stalking and cyber harassment We focus on cyber violence …
… 23, No 8, p. 727. (47) For example, the domestic abuse, stalking and harassment and honour-based violence (DASH) … tools in Sweden — SARA: SV6 (short version), SAM: SV (stalking assessment and management, short version) and … ). (84) The DASH form is the domestic abuse, stalking and harassment and honour-based violence …