<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[Cyberstalking - David Lindsey, Attorney at Law]]></title>
        <atom:link href="https://www.mdavidlindsey.com/blog/tags/cyberstalking/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.mdavidlindsey.com/blog/tags/cyberstalking/</link>
        <description><![CDATA[David Lindsey's Website]]></description>
        <lastBuildDate>Mon, 26 Aug 2024 19:06:26 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Top Five Computer Crimes and What to Do If You are Accused of Any of Them]]></title>
                <link>https://www.mdavidlindsey.com/blog/top-five-computer-crimes-and-what-to-do-if-you-are-accused-of-any-of-them/</link>
                <guid isPermaLink="true">https://www.mdavidlindsey.com/blog/top-five-computer-crimes-and-what-to-do-if-you-are-accused-of-any-of-them/</guid>
                <dc:creator><![CDATA[David Lindsey, Attorney at Law]]></dc:creator>
                <pubDate>Tue, 07 Apr 2015 18:51:52 GMT</pubDate>
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                    <category><![CDATA[Cyberstalking]]></category>
                
                    <category><![CDATA[Hacking]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                
                
                <description><![CDATA[<p>Computer crime is on the rise and as more people do more things online, the incidence of criminal activity is expected to continue. In addition to not falling victim to computer crimes, you also need to ensure what you are doing online is not illegal. Technology is constantly changing and it can be difficult to&hellip;</p>
]]></description>
                <content:encoded><![CDATA[ <p><a href="/contact-us/">Computer crime</a> is on the rise and as more people do more things online, the incidence of criminal activity is expected to continue. In addition to not falling victim to computer crimes, you also need to ensure what you are doing online is not illegal. Technology is constantly changing and it can be difficult to keep up with what is and is not legal.</p>  <p>What are the five most common computer crimes?</p>  <p><strong>Use of Malware</strong></p>  <p>Malware is an umbrella term for viruses, worms, and other nefarious software programs intended to separate a computer user and his or her information or money. Some of the more popular malware programs appear to be virus software alerting users to an infection and asking that they purchase a related product to remove the virus. In reality, the seemingly helpful alert message is actually the virus and when you enter your payment information into the system to purchase “protection,” you are actually supplying that information to criminals.</p>  <p>To avoid falling victim to malware, do not download software from sites you do not trust. Avoid pirated software and do not open files unless you know their source. Avoiding accusations of law breaking when it comes to malware is simple: do not send viruses to other computer users and do not attempt to gain access to anyone’s information without their permission.</p>  <p><strong>Stealing a Person’s Identity</strong></p>  <p>Millions of people each year fall victim to identity theft. Someone gains access to their personal information and uses it for his or her own benefit. Hackers have the ability to gain access to financial accounts or social security numbers and destroy a person’s life.</p>  <p>To avoid having your identity stolen, never log into financial accounts using a public computer. Never share personal information in email, instant messaging, or any type of unencrypted communication. Any time you make a purchase online, check to ensure the site is secure and never provide your credit card information to a site that is not known to be reputable.</p>  <p>Chances are good you will not be accused of identity theft unless you step over the line and intend to commit a crime. If accusations do arise, you should contact an attorney familiar with computer crimes immediately.</p>  <p>The final three most common computer crimes on the list are the type that are more likely to trigger unwarranted accusations.</p>  <p><strong>Cyberstalking</strong></p>  <p>Cyber stalking is exactly what it sounds like: using the computer to stalk someone, harass them, and gain uninvited access to their life. Stalking is a common accusation in domestic violence cases and other family legal disputes, so if you are in the midst of ending a relationship, it is better to avoid interacting with your former romantic partner online. Any interaction can be twisted to look like an unwanted advance, so the less time you spend on social media sites the better. And never, under any circumstances, attempt to gain access to a former love interest’s email or other personal information online.</p>  <p><strong>Child Pornography</strong></p>  <p>It is no secret the Internet is a hot bed for pornographic material. Much of it is perfectly legal to access, but just as much of it is illegal because it features underage participants. Exploiting children online is big business and if you are accused of viewing child pornography without realizing you are doing anything wrong, you would not be the first person. To avoid breaking the law regarding child pornography, use common sense: never click on anything suspicious and if you cannot be 100% sure what you are downloading or viewing, avoid it.</p>  <p>Spam</p>  <p>The best way to avoid breaking laws associated with spam is to never send anyone an email without that person’s permission. If you operate any sort of organization or business online, make sure you offer an opt-in and opt-out feature for email and keep careful records of recipient requests. If you are accused of spamming, put your current email methods on hold and contact an attorney.</p>  <p>If you would like to learn more about these and other computer crimes, check out the <a href="http://www.fbi.gov/about-us/investigate/cyber/cyber" target="_blank" rel="noopener noreferrer">FBI’s cybercrimes website</a>.</p>  <p>Worried you might be accused of a computer crime? Think someone is trying to trick you into breaking the law online? You need legal support. David Lindsey can help. Contact him to schedule a consultation to discuss your case.</p>  <p> </p>  ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What is Cyber stalking?]]></title>
                <link>https://www.mdavidlindsey.com/blog/what-is-cyber-stalking/</link>
                <guid isPermaLink="true">https://www.mdavidlindsey.com/blog/what-is-cyber-stalking/</guid>
                <dc:creator><![CDATA[David Lindsey, Attorney at Law]]></dc:creator>
                <pubDate>Tue, 10 Feb 2015 16:15:25 GMT</pubDate>
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                    <category><![CDATA[Cyberstalking]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                    <category><![CDATA[Stalking]]></category>
                
                
                
                <description><![CDATA[<p>What is Cyber stalking? Most people think of stalking as something that involves in-person scenarios. An ex-boyfriend or girlfriend might follow you to work or show up at your home uninvited. A stranger struggling with mental health issues could see you in public and become obsessed with you. These are all frightening scenarios that describe&hellip;</p>
]]></description>
                <content:encoded><![CDATA[ <p>What is Cyber stalking?</p>  <p>Most people think of stalking as something that involves in-person scenarios. An ex-boyfriend or girlfriend might follow you to work or show up at your home uninvited. A stranger struggling with mental health issues could see you in public and become obsessed with you. These are all frightening scenarios that describe stalking, but there is another place in which stalking can occur and be just as invasive: the Internet.</p>  <p><strong>Cyber Stalking vs. Identity Theft</strong></p>  <p>Online stalking can have a romantic bent, but its goal is generally to destroy the life of the victim. Any attack on a single person in an effort to exact control or revenge is considered cyber stalking. It can include harassment or humiliation of the victim or the victim’s loved ones, theft, threat of harm, or a combination of all three.</p>  <p>Sometimes cyber stalking is a component of traditional stalking. For instance, a former significant other might harass you online as well as in person. However, most cases of cyber stalking allow the perpetrator to remain somewhat anonymous. There are many instances in which cyber stalking victims never learn the real-life identify of their stalkers.</p>  <p>Cyber stalking differs from identify theft because the goal of identify theft is strictly financial gain. Though there are instances in which a cyber stalker steals from his or her victim, the goal is to destroy the victim’s life. They have a single target, whereas most criminals who commit identity theft care little about the individual victims, of which there are many.</p>  <p>Are you concerned you are at risk of being a victim of cyber stalking? <a href="http://womensissues.about.com/od/violenceagainstwomen/a/CyberPrevention.htm" target="_blank" rel="noopener noreferrer">These tips</a> can protect you online.</p>  <p>The personal aspect of cyber stalking means it can be easier for a person to be accused of this crime than identity theft. Whether or not you steal money from someone using the Internet is fairly cut and dry. There is unlikely to be an instance in which you enjoy financial gain illegally without intending to teal from someone online.</p>  <p>Cyber stalking is a different matter. It is possible to cause someone to feel threatened without intending to do so. This line is often crossed when it comes to the end of a romantic relationship. What you view as an attempt to regain your significant other’s affection could be interpreted as a threat.</p>  <p><strong>Accused of Cyber Stalking?</strong></p>  <p>How do you avoid being accused of cyber stalking and what should you do if you are accused?</p>  <p>First, if you are in the midst of ending a relationship and things are tumultuous, avoid interacting online. End social media interactions and consider severing links completely. If you must interact, make sure discussions are factual in nature. For instance, emailing an ex to let him or her know you want your DVD collection mailed to your new address is fine. Including a threat to harm your ex if he or she does not do so could get you into legal trouble. Assume that any interaction you have with someone online will be made public if it is not already and act accordingly. If saying something could later paint you in a negative light to law enforcement, do not say or write it.</p>  <p>Have you been accused of cyber stalking? Are you concerned interacting with someone online could get you into legal trouble? I can help. <a href="/contact-us/">Contact David Lindsey</a>, Denver criminal law attorney.</p>  ]]></content:encoded>
            </item>
        
    </channel>
</rss>