{"id":6942,"date":"2024-08-28T10:37:14","date_gmt":"2024-08-28T14:37:14","guid":{"rendered":"https:\/\/www.digitalforensics.com\/blog\/?p=6942"},"modified":"2025-07-23T17:10:43","modified_gmt":"2025-07-23T17:10:43","slug":"how-to-stop-someone-from-harassing-you-legally","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/","title":{"rendered":"How to Stop Harassment Legally"},"content":{"rendered":"\n<p>Experiencing harassment can be detrimental to your physical and mental health. These attacks can happen anywhere \u2014 at work, in a public space, or even anonymously online. If you can\u2019t stop harassment legally, it can have long lasting emotional ramifications and may even threaten your physical wellbeing.<\/p>\n\n\n\n<p>Harassment happens more than you may think and attacks different demographics at disproportionate rates. Over 80% of both <a href=\"https:\/\/www.npr.org\/sections\/thetwo-way\/2018\/02\/21\/587671849\/a-new-survey-finds-eighty-percent-of-women-have-experienced-sexual-harassment\" target=\"_blank\" rel=\"noopener\">Women<\/a> and members of the <a href=\"https:\/\/www.nbcnews.com\/nbc-out\/out-news\/transgender-workplace-discrimination-harassment-report-rcna181079\" target=\"_blank\" rel=\"noopener\">LGBTQ+ community<\/a> reported they had previously been harassed. <sup>&nbsp;<\/sup>Roughly two-thirds of <a href=\"https:\/\/www.pewresearch.org\/internet\/2021\/01\/13\/the-state-of-online-harassment\/\" target=\"_blank\" rel=\"noopener\">adults under the age of 30<\/a> have experienced some form of online harassment. With figures like these, it\u2019s important to be able to recognize and stop harassment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-constitutes-harassment\"><span class=\"ez-toc-section\" id=\"What_Constitutes_Harassment\"><\/span>What Constitutes Harassment?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Before you begin seeking legal representation, we suggest taking the time to understand the definition of harassment. Harassment is the intentional and continual execution of actions intended to degrade, perturb, harm, or threaten a victim. Regardless of how it\u2019s conducted, most legal cases require evidence of the perpetrator\u2019s intentions, the repetition of harmful actions, and the jeopardy of the victim\u2019s wellbeing.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-types-of-harassment\"><span class=\"ez-toc-section\" id=\"Types_of_Harassment\"><\/span>Types of Harassment<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Harassment can come in many different forms. The methods differ based on the perpetrator\u2019s path of action, but the intent remains the same. Knowing the differences is crucial to your ability to stop harassment.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-types-of-cyber-harassment\"><span class=\"ez-toc-section\" id=\"Types_of_Cyber_Harassment\"><\/span>Types of Cyber Harassment<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Threatening Messages.<\/strong>\u202fSending intimidating messages promising some type of harm.<\/li>\n\n\n\n<li><a href=\"\/blog\/harassment\/stop-cyberbullying\/\"><strong>Cyber Bullying<\/strong><\/a>. Insulting, ridiculing, or bullying in a digital space. This includes offensive comments, hate speech, and trolling to elicit an angry response.<\/li>\n\n\n\n<li><a href=\"\/blog\/harassment\/stop-cyberstalking\/\"><strong>Cyber Stalking<\/strong><\/a>.&nbsp;Monitoring someone\u2019s activity, tracking their location, investigating public records, or continuous unwanted contact.<\/li>\n\n\n\n<li><a href=\"\/blog\/harassment\/what-to-do-if-you-get-doxxed\/\"><strong>Doxxing<\/strong><\/a>. Exposing private information, such as addresses, phone numbers, emails, or places of work or school. While there are many arguments about the legality of <strong>it<\/strong>, many jurisdictions consider it a crime.<\/li>\n\n\n\n<li><a href=\"\/blog\/harassment\/revenge-porn\/\"><strong>Revenge Porn<\/strong><\/a>.&nbsp;Non-consensual distribution of explicit media by an ex-partner or significant other with the intent to humiliate the victim.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-types-of-in-person-harassment\"><span class=\"ez-toc-section\" id=\"Types_of_In-Person_Harassment\"><\/span>Types of In-Person Harassment<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Sexual Harassment<\/strong>. Unwelcome sexual advances, requests, and other verbal or physical actions of a sexual nature.<\/li>\n\n\n\n<li><strong>Workplace Harassment<\/strong>. Any behavior by coworkers, superiors, or clients that creates a hostile work environment.<\/li>\n\n\n\n<li><strong>Verbal Abuse<\/strong>. Insults or offensive remarks meant to degrade the target.<\/li>\n\n\n\n<li><strong>Threats of Violence<\/strong>. Communication of intent to cause physical harm.<\/li>\n\n\n\n<li><strong>Stalking.<\/strong>&nbsp;Following, watching, or contacting someone repeatedly.<\/li>\n<\/ol>\n\n\n\n<figure>\n  <picture>\n    <!-- Mobile image -->\n    <source \n      srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/01\/Types_of_Cyber_Harassment-1-scaled.jpg\"\n      media=\"(max-width: 767px)\"\n    >\n\n    <!-- Desktop fallback (required) -->\n    <img decoding=\"async\" \n      src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/01\/Types_of_Cyber_Harassment-scaled.jpg\"\n      alt=\"Types of Cyber Harassment - Infographics\"\n      style=\"width:100%; height:auto;\"\n    >\n  <\/picture>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-stop-someone-from-harassing-you-legally\"><span class=\"ez-toc-section\" id=\"How_to_Stop_Someone_From_Harassing_You_Legally\"><\/span>How to Stop Someone From Harassing You Legally?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>While many states vary on what compromises harassment, each has laws that deem the act to be illegal. However, the majority of states need you to properly identify your harasser to&nbsp;<a href=\"\/blog\/online-blackmail\/what-can-the-police-do-about-blackmail\/\">report the incident to law enforcement<\/a>.<\/p>\n\n\n\n<p>With the obscurity of online crimes, there are many unique difficulties in combating cyber harassment. However, there are organizations that can help you take action to stop harassment.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-express-your-boundaries\"><span class=\"ez-toc-section\" id=\"Express_Your_Boundaries\"><\/span>Express Your Boundaries<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Begin by making it clear to your harasser that their behavior is uninvited and needs to stop. While harassment can be overwhelming, it\u2019s important to remain calm and collected. You should address them directly. If you are in public, it may be beneficial to make others aware of the situation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-document-the-incident\"><span class=\"ez-toc-section\" id=\"Document_the_Incident\"><\/span>Document the Incident<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It\u2019s critical that you record details of the harassment if you plan to take legal action. Document the person\u2019s name or physical description, the action they committed, and the time and location of the harassment. For cyber harassment, you should take note of the account, platform, and any messages that display their unauthorized behavior.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-contact-law-enforcement\"><span class=\"ez-toc-section\" id=\"Contact_Law_Enforcement\"><\/span>Contact Law Enforcement<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Your next step should be <a href=\"\/blog\/harassment\/how-to-report-cyber-harassment\/\">reporting the harasser<\/a> to the police with whatever evidence you have. Their ability to stop harassment may be limited if you don\u2019t know the identity and location of the perpetrator. However, a <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/what-can-the-police-do-about-blackmail\/\">police report will be useful<\/a> in the next steps of the investigation.\u00a0If you believe the situation is an emergency, you should call 9-1-1.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-are-your-legal-options-to-stop-harassment\"><span class=\"ez-toc-section\" id=\"What_are_Your_Legal_Options_to_Stop_Harassment\"><\/span>What are Your Legal Options to Stop Harassment?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Legislation varies from region to region, and the actions you can take often differ accordingly. However, there are legal measures you can take that are generally available in most cases. You may find it helpful to seek the assistance of legal counsel before deciding which action to pursue.&nbsp; They can advise you on harassment laws, help file for legal protections, and assist you in building your case.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-cease-and-desist-letter\"><span class=\"ez-toc-section\" id=\"Cease-and-Desist_Letter\"><\/span>Cease-and-Desist Letter<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>While it\u2019s not a legally enforceable document, a cease-and-desist letter can be a valuable tool to stop harassment. It serves as a warning to the perpetrator that further action will be taken if their behavior persists. Furthermore, it documents that you have expressed your disapproval of the harassment. This can be extremely beneficial when trying to prove the perpetrator had the intent to cause you distress.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-restraining-order\"><span class=\"ez-toc-section\" id=\"Restraining_Order\"><\/span>Restraining Order<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>If the harassment continues after you\u2019ve issued a cease-and-desist letter, you should consider filing a restraining order. Unlike the cease-and-desist letter, a restraining order is legally binding, and violations can result in fines and imprisonment. If you are in immediate danger, the court may issue you a temporary protective order until a hearing is held.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-civil-lawsuit\"><span class=\"ez-toc-section\" id=\"Civil_Lawsuit\"><\/span>Civil Lawsuit<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>You can seek litigation for damages that result from harassment. The laws vary by state, but you can typically sue on the grounds of discrimination or emotional distress. To sue your harasser, you need to prove that it is more likely than not that the following occurred:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The perpetrator acted with the intention of inflicting emotional distress.<\/li>\n\n\n\n<li>Their behavior was extreme and outrageous.<\/li>\n\n\n\n<li>The emotional distress was severe enough to disrupt your daily life.<\/li>\n<\/ul>\n\n\n\n<p>Judges often award compensatory damages to victims in successful civil suits, and sometimes punitive damages in severe cases.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-criminal-charges\"><span class=\"ez-toc-section\" id=\"Criminal_Charges\"><\/span>Criminal Charges<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Criminal cases require the same proof and then some, with a higher level of burden on the prosecution. In addition to the requirements of a civil case, you must also prove the harasser\u2019s actions are explicitly criminalized. This includes behaviors such as stalking or threats of violence. Furthermore, criminal cases shift the burden of proof from \u201cmore likely than not\u201d to \u201cbeyond a reasonable doubt\u201d. Penalties for a successful criminal harassment conviction can include misdemeanor and even felony charges.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-leveraging-the-help-of-digital-investigators-to-stop-harassment\"><span class=\"ez-toc-section\" id=\"Leveraging_the_Help_of_Digital_Investigators_to_Stop_Harassment\"><\/span>Leveraging the Help of Digital Investigators to Stop Harassment<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Collecting evidence of cyber harassment can be more difficult than cases of in-person harassment. In cases where you can\u2019t&nbsp;<a href=\"\/blog\/extortion\/catch-a-cybercriminal\/\">uncover your cyber harasser\u2019s identity<\/a>, digital investigators can help. They employ innovative forensic techniques to help track the sources of malicious conduct and stop harassment.<\/p>\n\n\n\n<p>At Digital Forensics Corp., we employ rigorous analysis to locate and stop cyber harassment. We assist in identifying offenders and improving your safety by analyzing digital footprints. Our team is dedicated to providing accurate guidance throughout the entire investigation and ongoing protection after its conclusion.<\/p>\n\n\n\n<p>If you need professional assistance to stop harassment, DFC is a phone call away. We are available 24\/7 to combat different cybercrimes across the globe. You can either use our website chat or call directly into our&nbsp;<a href=\"\/blog\/harassment\/how-to-report-cyber-harassment\/\">Harassment Helpline<\/a> for a free consultation.<\/p>\n","protected":false},"excerpt":{"rendered":"Experiencing harassment can be detrimental to your physical and mental health. These attacks can happen anywhere \u2014 at&hellip;","protected":false},"author":131,"featured_media":11628,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[769],"tags":[],"class_list":{"0":"post-6942","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-harassment","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Stop Someone From Harassing You Legally?<\/title>\n<meta name=\"description\" content=\"Get expert harassment help and learn how to stop someone from harassing you legally with clear steps, expert advice, and essential resources\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Expert Harassment Help: Stop Harassment Legally Today\" \/>\n<meta property=\"og:description\" content=\"Get expert harassment help and learn how to stop harassment legally with clear steps, empathetic advice, and essential resources.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-28T14:37:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-23T17:10:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/08\/Stop_Harassment__Help_and_Support.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jack Gillespie\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Expert Harassment Help: Stop Harassment Legally Today\" \/>\n<meta name=\"twitter:description\" content=\"Get expert harassment help and learn how to stop harassment legally with clear steps, empathetic advice, and essential resources.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/08\/How_to_stop_sextoStop_Harassment__Help_and_Supportrtion_emails_.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jack Gillespie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/how-to-stop-someone-from-harassing-you-legally\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/how-to-stop-someone-from-harassing-you-legally\\\/\"},\"author\":{\"name\":\"Jack Gillespie\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/4eb49f01ff515fad38e835a9b9497fba\"},\"headline\":\"How to Stop Harassment Legally\",\"datePublished\":\"2024-08-28T14:37:14+00:00\",\"dateModified\":\"2025-07-23T17:10:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/how-to-stop-someone-from-harassing-you-legally\\\/\"},\"wordCount\":1165,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/how-to-stop-someone-from-harassing-you-legally\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/How_to_stop_sextoStop_Harassment__Help_and_Supportrtion_emails_.jpg\",\"articleSection\":[\"Resources for Victims of Internet Harassment\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/how-to-stop-someone-from-harassing-you-legally\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/how-to-stop-someone-from-harassing-you-legally\\\/\",\"name\":\"How to Stop Someone From Harassing You Legally?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/how-to-stop-someone-from-harassing-you-legally\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/how-to-stop-someone-from-harassing-you-legally\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/How_to_stop_sextoStop_Harassment__Help_and_Supportrtion_emails_.jpg\",\"datePublished\":\"2024-08-28T14:37:14+00:00\",\"dateModified\":\"2025-07-23T17:10:43+00:00\",\"description\":\"Get expert harassment help and learn how to stop someone from harassing you legally with clear steps, expert advice, and essential resources\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/how-to-stop-someone-from-harassing-you-legally\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/how-to-stop-someone-from-harassing-you-legally\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/how-to-stop-someone-from-harassing-you-legally\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/How_to_stop_sextoStop_Harassment__Help_and_Supportrtion_emails_.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/How_to_stop_sextoStop_Harassment__Help_and_Supportrtion_emails_.jpg\",\"width\":2560,\"height\":1120,\"caption\":\"Harassment Help\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/how-to-stop-someone-from-harassing-you-legally\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources for Victims of Internet Harassment\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/harassment\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Stop Harassment Legally\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/4eb49f01ff515fad38e835a9b9497fba\",\"name\":\"Jack Gillespie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"caption\":\"Jack Gillespie\"},\"description\":\"Cybercrime Writer & Awareness Advocate \\\"You don\u2019t need to be a tech expert to protect yourself online \u2014 but you do need the right information.\\\" \u2014 Jack Gillespie \u00a0 Jack Gillespie is a cybersecurity content writer who specializes in explaining the human, emotional, and technical elements behind modern online threats. With a background in journalism and a passion for digital safety, Jack creates high-impact, approachable content that helps readers of all experience levels understand, recognize, and respond to cybercrime. \u00a0 Areas of Expertise Jack\u2019s work aims for the sweet spot at the intersection of technology and psychology, helping readers stay informed and protected through education that\u2019s delivered in a digestible manner: \u2022 Social engineering scams \u2013 how manipulation tactics fuel phishing, sextortion, and online fraud. \u2022 Data breach scenarios \u2013 why they happen, how they spread, and how readers can proactively minimize exposure. \u2022 Malware and ransomware \u2013 plain-language breakdowns of how malicious software works and what to do if affected. \u00a0 Role at Digital Forensics Corp. At Digital Forensics Corp., Jack blends editorial clarity with technical accuracy to produce content that educates, supports, and engages. He contributes to both writing and editing efforts, working closely with cybersecurity experts and legal professionals to ensure each piece meets high standards of credibility and readability. His priority is helping people recognize threats before they arise \u2014 and empowering those already affected to take the next steps with confidence through expert advice. \u00a0 Key Publications & Projects \u2022 \\\"Sextortion Awareness for Children\\\" Booklet \u2013 A youth-focused educational guide distributed through local schools to help minors identify, avoid, and report this rapidly expanding cybercrime. \u2022 Sextortion Explained \u2013 A detailed resource for sextortion victims that explains common tactics, recovery strategies, legal protections, and examples of real-life cases. \u2022 \u201cOperation Artemis\u201d Coverage \u2013 \u201cFive Ws\u201d breaking news style coverage of a major FBI investigation that led to the extradition of 22 Nigerian nationals involved in an international sextortion ring. \u00a0 Professional Perspective Jack is committed to making cybersecurity education accessible to all, regardless of background or technical skill. Whether writing for victims, parents, small business owners, or curious readers, he combines journalistic integrity with a human-centered approach to ensure each message resonates with a broad audience. \u00a0 Education & Credentials \u2022 B.A. in Journalism and Promotional Communications Cleveland State University \u2022 SEO Principles Certification Semrush Academy \u00a0 Additional Background Jack began his career as a freelance sports journalist, where he sharpened his storytelling skills and editorial discipline: \u2022 Contributor at Ohio Varsity \u2022 Reporter for Geauga County Maple Leaf\u00a0 This experience has strengthened his ability to adapt his voice across formats and audiences \u2014 from breaking news to educational deep-dives.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/jack-gillespie-21aa85222\\\/\"],\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/jack-gillespie\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Stop Someone From Harassing You Legally?","description":"Get expert harassment help and learn how to stop someone from harassing you legally with clear steps, expert advice, and essential resources","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/","og_locale":"en_US","og_type":"article","og_title":"Expert Harassment Help: Stop Harassment Legally Today","og_description":"Get expert harassment help and learn how to stop harassment legally with clear steps, empathetic advice, and essential resources.","og_url":"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2024-08-28T14:37:14+00:00","article_modified_time":"2025-07-23T17:10:43+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/08\/Stop_Harassment__Help_and_Support.jpg","type":"image\/jpeg"}],"author":"Jack Gillespie","twitter_card":"summary_large_image","twitter_title":"Expert Harassment Help: Stop Harassment Legally Today","twitter_description":"Get expert harassment help and learn how to stop harassment legally with clear steps, empathetic advice, and essential resources.","twitter_image":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/08\/How_to_stop_sextoStop_Harassment__Help_and_Supportrtion_emails_.jpg","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Jack Gillespie","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/"},"author":{"name":"Jack Gillespie","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/4eb49f01ff515fad38e835a9b9497fba"},"headline":"How to Stop Harassment Legally","datePublished":"2024-08-28T14:37:14+00:00","dateModified":"2025-07-23T17:10:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/"},"wordCount":1165,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/08\/How_to_stop_sextoStop_Harassment__Help_and_Supportrtion_emails_.jpg","articleSection":["Resources for Victims of Internet Harassment"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/","url":"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/","name":"How to Stop Someone From Harassing You Legally?","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/08\/How_to_stop_sextoStop_Harassment__Help_and_Supportrtion_emails_.jpg","datePublished":"2024-08-28T14:37:14+00:00","dateModified":"2025-07-23T17:10:43+00:00","description":"Get expert harassment help and learn how to stop someone from harassing you legally with clear steps, expert advice, and essential resources","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/08\/How_to_stop_sextoStop_Harassment__Help_and_Supportrtion_emails_.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/08\/How_to_stop_sextoStop_Harassment__Help_and_Supportrtion_emails_.jpg","width":2560,"height":1120,"caption":"Harassment Help"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Resources for Victims of Internet Harassment","item":"https:\/\/www.digitalforensics.com\/blog\/harassment\/"},{"@type":"ListItem","position":3,"name":"How to Stop Harassment Legally"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/4eb49f01ff515fad38e835a9b9497fba","name":"Jack Gillespie","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","caption":"Jack Gillespie"},"description":"Cybercrime Writer & Awareness Advocate \"You don\u2019t need to be a tech expert to protect yourself online \u2014 but you do need the right information.\" \u2014 Jack Gillespie \u00a0 Jack Gillespie is a cybersecurity content writer who specializes in explaining the human, emotional, and technical elements behind modern online threats. With a background in journalism and a passion for digital safety, Jack creates high-impact, approachable content that helps readers of all experience levels understand, recognize, and respond to cybercrime. \u00a0 Areas of Expertise Jack\u2019s work aims for the sweet spot at the intersection of technology and psychology, helping readers stay informed and protected through education that\u2019s delivered in a digestible manner: \u2022 Social engineering scams \u2013 how manipulation tactics fuel phishing, sextortion, and online fraud. \u2022 Data breach scenarios \u2013 why they happen, how they spread, and how readers can proactively minimize exposure. \u2022 Malware and ransomware \u2013 plain-language breakdowns of how malicious software works and what to do if affected. \u00a0 Role at Digital Forensics Corp. At Digital Forensics Corp., Jack blends editorial clarity with technical accuracy to produce content that educates, supports, and engages. He contributes to both writing and editing efforts, working closely with cybersecurity experts and legal professionals to ensure each piece meets high standards of credibility and readability. His priority is helping people recognize threats before they arise \u2014 and empowering those already affected to take the next steps with confidence through expert advice. \u00a0 Key Publications & Projects \u2022 \"Sextortion Awareness for Children\" Booklet \u2013 A youth-focused educational guide distributed through local schools to help minors identify, avoid, and report this rapidly expanding cybercrime. \u2022 Sextortion Explained \u2013 A detailed resource for sextortion victims that explains common tactics, recovery strategies, legal protections, and examples of real-life cases. \u2022 \u201cOperation Artemis\u201d Coverage \u2013 \u201cFive Ws\u201d breaking news style coverage of a major FBI investigation that led to the extradition of 22 Nigerian nationals involved in an international sextortion ring. \u00a0 Professional Perspective Jack is committed to making cybersecurity education accessible to all, regardless of background or technical skill. Whether writing for victims, parents, small business owners, or curious readers, he combines journalistic integrity with a human-centered approach to ensure each message resonates with a broad audience. \u00a0 Education & Credentials \u2022 B.A. in Journalism and Promotional Communications Cleveland State University \u2022 SEO Principles Certification Semrush Academy \u00a0 Additional Background Jack began his career as a freelance sports journalist, where he sharpened his storytelling skills and editorial discipline: \u2022 Contributor at Ohio Varsity \u2022 Reporter for Geauga County Maple Leaf\u00a0 This experience has strengthened his ability to adapt his voice across formats and audiences \u2014 from breaking news to educational deep-dives.","sameAs":["https:\/\/www.linkedin.com\/in\/jack-gillespie-21aa85222\/"],"url":"https:\/\/www.digitalforensics.com\/blog\/author\/jack-gillespie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/6942","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/131"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=6942"}],"version-history":[{"count":21,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/6942\/revisions"}],"predecessor-version":[{"id":12839,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/6942\/revisions\/12839"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/11628"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=6942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=6942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=6942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}