… access to a phone or transport; controlling access to technology and/ or monitoring online behaviour, including … status). All appropriate and available sources of information including the victim, the perpetrator, case files … of both the victim and the perpetrator. Collecting this information provides more precise knowledge about the …