A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

C

Cyberstalking

Using technology to track your activities or location, or to make you feel constantly watched and afraid. Many different kinds of technology can be used to stalk someone, including phones, social media, email, cameras, smart home devices, and more. Any kind of stalking is serious, and you can reach out for help or report to police.

Consent

An ongoing process of giving and receiving permission. Doxing: the publication of private or identifying information of a particular individual on the Internet without the individual’s consent

D

Doxing

Sharing someone’s personal information like a phone number or home address to threaten or harm them. Often part of online harassment or stalking. Sometimes also spelled “doxxing.”

Digital Evidence

The overarching term that includes evidence from digital devices including the devices themselves, as well as emails, texts, pictures, videos, voice recordings, direct messages (DMs), screenshots, account logs or billing statements, apps, GPS and location information, and “metadata” or the information embedded in emails and other electronic documents.

Digital Dating Violence

Digital dating violence is a pattern of behaviours in which one partner controls, pressures, or threatens their dating partner using digital technologies. Digital dating violence is also known as technology-facilitated gender-based violence (TFGBV), but we use the term digital dating violence to reflect teen relationships. Read more about Digital Dating Violence here.

Database

Software that holds data and allows a company, charity, or the government to search for information about a specific person or find trends across many people.

Data

Data is another word for information. Big data is a term for really large amounts of data pulled from mobile phones, emails, Internet searches, apps, and public records. Companies use big data to identify patterns about us all to predict and optimize their business.

E

Encryption

A way of scrambling information so that it can only be read by the person who created it or those they choose to share it with. End-to-end encryption protects data between the sender and the receiver (e.g. between you and a person you send a message to).

Email

Email is short for “electronic mail” and can include text, images, and attachments of other files. Read our tips on securing your email account.

F

Firewall

Either software or a piece of equipment that protects a computer network from external security risks. Firewalls monitor inbound and outbound network traffic and determine whether or not to allow the traffic through based on a set of security standards.

Find My Phone

A way to locate your phone by logging into your account from another device. In addition to seeing the location on a map, options may also include making loud sounds through the phone, remotely wiping all data, or otherwise taking control of the phone. Read our guides to learn more about turning off this feature on your phone, or in your social media accounts.

Factory Reset

Wiping all the information and settings from a phone or other device, returning it to the way it was when it was made. This is one way to remove harmful software and settings from your phone, in combination with other steps like changing account settings or creating new accounts.

G

Googling

Searching the Internet for information, specifically on Google. See also Internet Search Engine.

H

Harassment

 Harassment: the misuse of technology by a perpetrator to repeatedly contact, threaten or intimidate another person when they do not want them to and it makes them feel afraid. This may be happening to you if you’re: Being sent abusive, threatening, or insistent text messages and/or emails. Receiving persistent Facebook, WhatsApp, Snapchat, or other online platform messages. Continually being tagged on social media such as Instagram or Facebook. Receiving posts of abusive and/or continuous comments and replies to social media posts.
 

Hardware

Hardware is a piece of equipment like a computer, webcam, or printer that uses software.
 

Hacking

Breaking into an account, device, or database. The act of doing so is hacking. A person who does this can be called a hacker. When your account has been broken into, it has been hacked.

I

IP Address

A string of numbers assigned to your computer or network. These can be dynamic, meaning that they change often, or static, which means that they are always the same. If you join a Wi-Fi network away from home, you usually use a different IP address based on that Wi-Fi network.

Internet Service Provider (ISP)

A company that connects your computer or home network to the Internet (e.g. Rogers, Bell).

Internet of Things (IoT)

Devices or everyday objects that are connected to the Internet or your home network. Sometimes called “smart” or “connected” devices, examples include smart speakers (such as Google Home or Amazon Alexa), televisions, video doorbells, electrical sockets, and even cars, medical devices, and whole buildings. Read our guides to learn more about the IoT.

Impersonation

Hiding behind technology to pretend to be someone else as a tactic of further violence and control, for example, to damage a woman’s reputation or relationships

L

Log in (or Login)

The information you use to access an account; usually your username or email address and a password. Logging in is the act of going into an account.

Location Tracking

Using apps or tools to track a person’s location, such as stalkerware. It may seem like the perpetrator knows where the person is at all times.
 

M

Metadata

Data about other data. Examples include date and time, location, or other information about a file, image, video, or post. This information could reveal where a photo was taken, for example, or be used for evidence.

Malware

Malicious software that is designed to allow someone else to break into your account, network, or device. Malware includes viruses and ransomware.

O

Operating System

The software that runs a device like a phone or computer. It should be updated regularly.

P

Profile

Specific information about you stored in your account (e.g. social media or online shopping). Depending on the app or website, you can choose how much information is in your profile, and who can see that information. Read our guides to learn how to update and protect your profile information in your cloud accounts and social media accounts.

Permissions

Options that you choose once, or that are already set when you get your phone, that allow an app to access your camera, microphone, contacts, files, location, and more.

Password Manager

A service or app that stores all of your passwords and allows you to use them when you need them. Password managers help you to use strong passwords that are unique to each site or account. Privacy experts recommend against storing your passwords in your browser.

Password

A password or passcode secures your account or device. It is important to use strong passwords, or better yet “pass phrases.” They should be at least 12 or more characters long (letters, numbers, symbols). Do not use any information that others could easily guess like the name of a pet or a birthdate. Use a different password for every account, and a password manager to keep track of them. Experts say you shouldn’t share your passwords with anyone, but some abusive people may force or coerce you into sharing them – and that’s not your fault. Read our guides to learn more about password security.

R

Routers

Devices used to connect personal computers to the Internet via an Internet service provider (ISP) like cable or DSL. The device that your computer is connected to with a cable or through your Wi-Fi network.

Report (Content)

Letting a company know about inappropriate or harmful posts, images, comments, or other content, usually on social media or another online account. Read our guides to learn more about how to report abusive content or behaviour on social media accounts.

S

Stalking/Criminal Harassment

Misusing technology to knowingly and/or recklessly harass someone that causes that person to reasonably fear for their safety or the safety of someone they know.

Spyware, Stalkerware

An app or software designed to secretly monitor everything that you do on your phone or computer, including calls, images from the camera, Internet searches, messages, location, and more. It is very difficult to find and remove, and the person doing the monitoring will usually see attempts to do so. Read our Spyware info sheet to learn more.

Spam

Junk email, calls, or messages.

Software

Software is a set of instructions or a program made up of computer code that tells a computer, phone, or tablet what to do. This includes individual apps like a web browser, anti-virus, or social media, as well as system software like operating systems (e.g. Android or Windows) and drivers that communicate with hardware.

Social Media

Apps and websites that share updates, photos, and more with other people. Read our guides to learn how to secure your social media.

Smart Devices

Everyday things that are connected to the Internet. Also called the Internet of Things (IoT). Read our guides to learn more about the IoT.

Settings

Options for your app, account, or device. You can adjust your settings for greater privacy, security, accessibility, and more.

Server

Special, very large computers used to store information for websites, apps, or other data that can be accessed through the Internet. When you visit a website through the browser on your computer or smartphone, you are requesting it from a server.

Search Engine

A website or app that helps you find information on the Internet.

Search

Looking for information on the Internet. Search engines like Google store every way that people look up information online, and your own searches are usually saved in your Internet browser history. The search results or suggestions you get will be sorted based on your profile and previous searches. Sometimes you will get ads later related to your searches, as companies sell information about you to advertisers.

Screen Lock

A security feature that “locks” your device until you enter a passcode, PIN, biometric, or other verification to open it. Privacy experts recommend using a screen lock and not sharing your device with anyone, but some abusive people may force or coerce you into sharing them – and that’s not your fault. Read our guides to learn how to set up a screen lock for your phone.

T

Two-Factor Verification

A way of adding extra security to an account or device. Usually, this includes something you know, like a password, and something you have, like your smartphone. Also called Two-Factor Authentication (2FA) or Multi-Factor Authentication (MFA).

Threats

The use of language threatening to harm, extort, or humiliate someone through the use of technology.

Technology-Facilitated Gender-Based Violence

Tech-facilitated gender-based violence, or TFGBV, happens when someone uses technology to harm or control you. It can happen to anyone, but especially to women, children, and gender-diverse people. BIPOC, those with disabilities, and the 2SLGTBQIA+ community are disproportionately affected. It can look like harassing text or social media messages, restricting access to technology, non-consensually sharing intimate images, using location-tracking technology, or threatening to do any of these. TFGBV is sometimes called tech abuse, online harassment, or digital violence.

Tablet

A device that is smaller than a laptop and larger than a phone, usually with a proportionately large screen.

U

User, Username

Someone who uses an account, social media platform, computer, database, or another system. A username is a unique name you use to access an account when you log in.

Update, Upgrade

An important security step, updating your operating system, apps, anti-virus, and other software that protects your devices and accounts from hacking.

V

VPN (Virtual Private Network)

Like a secure tunnel for your information, a VPN allows you to connect over public Wi-Fi and other unsecured networks more safely. When you use a public Wi-Fi network, for instance, your device and data could be visible to someone else on the network. VPNs can be set up through some web browsers or can be accessed through paid monthly services.

Verification Code

An added security step, usually a number sent by SMS text message to your phone or your email, which you use to access your account in addition to a password or if you ask to reset your password.

W

Wi-Fi

Wireless connection between devices or to the Internet. Privacy experts recommend avoiding public Wi-Fi, and use a virtual private network (VPN) instead. See our guide to resetting your Wi-Fi network.

Webcam

A camera built into or connected to your computer, tablet, or phone. Privacy experts recommend putting a reusable sticker or other cover over your webcam when you’re not using it.