Online Targeting and Harassment
Some people do. In a precedent setting case in 2006, a Florida woman, Susan Scheff, successfully sued for defamation over the internet and was awarded $11.3 million. The defendant was unhappy with the referral service offered by the plaintiff and posted complaints and insults on the internet, accusing Ms Scheff of being a"crook" and a "fraud".
Another 2006 case in the UK suggests that tolerances are rapidly changing. Internet users are becoming less willing to put up with personal attacks, and in some cases are taking it all the way to the top. In the UK case, a Tracy Williams was ordered to pay damages of 10,000 pounds plus 7,200 pounds in costs for accusing a male acquaintance, Michael Keith-Smith, of being a "sex offender" and "racist blogger". She also accused his wife of being a prostitute.
I'm not wholly enthusiastic about these cases, because a legal chill is liable to act as a powerful disincentive when it comes to simple use of language. After all, part of the power of the net is that it is a lot less regulated than many other aspects of our lives. This is why we need to police ourselves and avoiding indulging in behavior that will provide justification for those who are eager for excuses to increase regulation and control.
If you do become a target of harassment or defamation, stay cool. Don't react or get into a flame war with the people doing the harassing. Make a point though of keeping a record - emails, posted comments etc, along with dates, times and any identifying information that may come in handy at a later date.
Depending on the stealth method used, you might be able to acquire additional info about the source of the attack. Legitimate services such as "nslookup" and "tracert" enable users to track hosts, IP addresses and MAC addresses. There are also professional services you can enlist that use the information you provide to dig for additional info. Make sure they operate within the law, as some are little more than hackers-for-hire.
As in any ordinary case of harassment, it's important to build the case and gather the evidence. Don't release any of this material to the person you suspect is behind the abuse, until and if you are prepared to go the distance.
If you are concerned about your privacy and reputation, it may be advisable lower your profile. Often disengagement and non-reaction stops harassment because most cyber trolls and bullies get their jollies from the belief that they are ruining your life.
If there is no hidden history or baggage you are anxious to keep confidential i.e. criminal record, then continue to put your best foot forward. Most users savvy with the ways of the net are well aware that defamation is a weapon that can be used for any one of a number of malicious reasons. There are outspoken politicians and pundits online who attract pages of gossip and speculation on Google. Most of them remain unaffected by it and keep on trucking.
Over time, defamatory commentary loses its edge when it becomes apparent that nothing has come of it. It gets to be old news. In a way you will be stronger for it. Other net users get to know who is being harassed and look to see how the target is reacting. In the case of bloggers, it's important not to allow harassment to become an obsession, and especially not a subject for constant posts. To most readers this comes across as a bit unhinged and obsessive. Not helpful, since the average visitor has little or no interest in a blogger's personal online angst.
It really comes down to the individual in the end. If you've nothing to hide - you have nothing to fear except fear itself.
Related Tags: computer harassment defamation
Aidan Maconachy is a freelance writer and artist based in Ontario. You can visit his blog at http://aidanmaconachyblog.blogspot.com/
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- Troubling New"spam" to Cell Phones Discovered
Troubling new"Spam" to Cell Phones Discovered In a day and age when spam is rampant on the interne - Sex Offenders - Keep Your Family Protected From Sex Offenders
As a parent, it is your responsibility to protect your family from any type of harm. Most especiall - Criminal Defense Attorney
You've seen them on TV in their black coats; the formidable forces of law, the strong and intense - Critical Analysis of Cyber Law
Critical Analysis of Information Technology Act, 2000 Till year 2000, India did not have any legis - Finding a Good Lawyer Referral
Perform An Online Attorney Search When You Need To lawyer referralHere is a common scenario: You ar - Usa Can Copy All You Have on Your Laptop
USA can copy all you have on your Laptop.American authorities has given airport security control mor - Best And Top New York Immigration Lawyer Of NY?
The term Immigration Lawyer is another very common term people are becoming aware of. But most of th - Domain Name Theft
Are you losing visitors to your domain? Are your search engine rankings still yours?Other people mi - Domain Name Dispute, What To Expect after You've Won
You file a UDRP complaint under ICANN and a panel has ordered a transfer of the stolen domain name. - Is Your Spouse Lying?
You may have noticed some unusual behavior from your significant other such as spending a lot of tim
Most viewed articles in this category:
- Protecting your Website's Content: Just Don't Bother
The internet is the best place if you want to steal content. It makes it really easy to copy any inf - Malaysian Internet Marketer; The Constraints On Internet Transaction
The Problems;There is always an obstacle for everyone when dealing with internet transaction, Malays - A New Music Copyright Lawsuit Against YouTube
In the middle of November, Universal Music filed an extensive copyright lawsuit against YouTube, not - How To Use Metadata As An Examination Tool
In today's computer dependent world, the zealous advocate must be able to navigate his way through - Viacom Sues Google
Viacom, a media company, has recently sued Google for $1 billion, for the copyright infringement on - A Short Synopsis Of Cybercrime
To many involved in criminal dense, cyber crime is the bane of the 21st Century. It accounts for mi - Internet Law in 2007
As we start off the 2007 year, many in the web community probably have questions about what developm - Are We Able to Completely Stop Software Piracy
Software piracy is the illegal reproduction and distribution of software applications, whether for b - Defamation and Slander on the Internet
As social networking sites and internet blogs continue to increase in both popularity and use, the o - Anti-Cyber Squatting Consumer Protection Act Update
Our law firm receives a lot of calls from people and companies who are being threatened with an Anti