Barbara Hartwell

My Photo
Independent Investigator, Intelligence Analyst, Journalist. Former CIA (NOC, Psychological Operations.) Black Ops Survivor. Sovereign Child of God. Believer in the Gospel of Jesus Christ. Exposing Government Lies, Crimes, Corruption and Cover-ups.

Sunday, September 21, 2008

STOP INVASIONS OF PRIVACY, FORGERY & CRIMINAL HARASSMENT



PUT STALKERS OUT OF BUSINESS!


GENERAL DEFINITIONS

As related to telephone and Internet communications, etc.


INVASION OF PRIVACY: Publishing UNLISTED, PRIVATE information about an individual on the Internet or using other venues.


E-mail addresses; telephone numbers; street addresses. Publishing other unauthorized PRIVATE INFORMATION.


(To "publish" may include sending even ONE e-mail to a third party, especially to a person involved in media, a "public figure" or "limited public figure". The recipient may then distribute the private information to a few, or many others.)


HARASSMENT: Sending unsolicited, unwanted e-mails to a person, once he/she has issued a directive (privately or publicly) to cease and desist.


Telephone calls to a person, once he/she has issued a directive (publicly or privately) to cease and desist.


Attempting any form of unwanted contact/communication with a person, once he/she has issued a directive (privately or publicly) to cease and desist.


CYBER-STALKING: Aggressive/intrusive behavior whereby a person is stalked by unwanted e-mail, including of a harassing and/or threatening nature. "Harassment" may be determined as ANY form of unwanted communication.

Stalking by using public message boards, to post libelous, harassing and/or threatening messages to/about the target.


FORGERY & IDENTITY THEFT: Unauthorized use of a person's name for any unlawful/malicious purpose; stealing a name for use in committing a crime; or for any form of solicitation (including of crimes against the targeted person); the use of a name on bogus documents/written material, which the identity thief/forger may falsely claim was written and/or posted and/or otherwise distributed by the target.


RESOURCES: SEE THESE LINKS

STALKING LAWS BY STATE

CYBER-STALKING

Note: The above is only a general summary for information purposes, and not intended as legal advice. See resources for more detailed information.