Skip to main content
SEARCH
Search
Report abuse
Key issues
Educators
Kids
Young people
Parents
Women
Seniors
About us
Report
Key issues
Safety by Design
eSafety Guide
Cyberbullying
Adult cyber abuse
Report cyber abuse to social media services
Get help from the police
Image-based abuse
Take action
Get help to remove images and video
Report to the eSafety Commissioner
Report to social media service or website
Deal with sextortion
Get help from the police
Manage abuse sent via text or email
Civil penalties scheme
Support
Talking with friends and family
10 ways to get through image-based abuse
For family and friends
Useful international websites
Quick guides
Image-based abuse
Aboriginal and Torres Strait Islander
Lesbian, gay, bi, trans, queer and/or intersex
Family, friends and bystanders
Righting the wrong
Legal assistance
Find a lawyer
Protection orders
What's the law in my state or territory?
Statements and statutory declarations
Legal case studies
Your stories
Anna
Ariba
Emily
Kate
Jess
Luca
May
Michael
Min-jun
Mitch
Priya
Steven
FAQ
Illegal and harmful content
Domestic and family violence
Know the facts
Safety quiz and interactive tour
Technology checkup quiz
Technology tour
What is technology-facilitated abuse?
Online abuse
Cyberstalking
Image-based abuse
What are the warning signs?
Online safety planning
Online safety checklist
Online safety checklist for friends and family
Social media checklist
Securing your accounts and devices
Keeping children safe
Online safety advice
Help and support
Find support
For friends and family
Get help from the police
Legal help
Collecting evidence
Get help in your language
Video library
Your stories
Alison
Lin
Bella
Sam
Alicia
Rose
Training for frontline workers
How to
Remove images, posts or other content
Use your device safely
Connect safely
Get help with technology
Balance time online
Plan your digital legacy
Protect your personal information
Use social media and online chat
Collect evidence
Taking a screenshot on a Mac
Taking a screenshot on a PC
Taking a screenshot on an Android device
Taking a screenshot on an Apple device
Staying safe
Sending nudes and sexting
Unwanted contact
Online scams and identity theft
Your digital reputation
Sextortion
Gaming
Tailored advice
Aboriginal and Torres Strait Islander peoples
Your Online Journey
Lesbian, gay, bi, trans, queer and/or intersex people
Help in languages other than English
عربي (Arabic)
Khmer (Cambodian)
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
درى (Dari)
Thuɔŋjäŋ (Dinka)
Tagalog (Filipino)
ελληνικά (Greek)
Hazaragi
हिंदी (Hindi)
Italiano (Italian)
Karen
한국어 / 조선말 (Korean)
Pacific Islands (English)
ارسی (Persian)
ਪੰਜਾਬੀ (Punjabi)
Soomaali (Somali)
South Asian (English)
Español (Spanish)
தமிழ் (Tamil)
ภาษาไทย (Thai)
Tiếng Việt (Vietnamese)
Türkçe (Turkish)
Frontline workers and support providers
Libraries and library workers
Sporting organisations and community groups
Online safety and wellbeing directory
Educators
Classroom Resources
Be Deadly Online
Student and community home
Cyberbullying
Social media and privacy
Sending nudes and sexting
Your digital footprint
Cybersmart Challenge
Student home
Cybersmart Forever
Cybersmart Detectives
Cybersmart Hero
#Game On
Student home
Meet the characters
Hector's World
Student home
Your personal information online
Computer security
Cyberbullying
The Lost Summer
Student home
Teacher support
Tagged
Student Home
Arabic versions
Chinese versions
Greek versions
Italian versions
Vietnamese versions
The YeS Project
Student home
Young and eSafe
Student home
Respect
Responsibility
Empathy
Resilience
Critical thinking
Virtual classrooms
Keeping safe in the game
Respectful chat, I can do that!
Video and resource library
School policies and guidance
Photos, video, social media and fundraising
Trusted providers
Downloads
Training for professionals
Pre-service teacher program
Professional learning program for teachers
National School Chaplaincy Program
Mental health and social workers
Law enforcement
Meet our training team
Training and presentations FAQ
Webinar support
Corporate and community education
Presentations for corporate groups
Presentations for parent and carer groups
Training for sporting organisations and clubs
Library presentations for older Australians
Kids
Young people
Cyberbullying
Be an upstander — not a bystander
Someone is creating drama online
I’m being pressured to send nudes
My nudes have been shared
Receiving unwanted nudes
Your digital reputation
Unwanted contact — signs to look out for
Violent or inappropriate content
Online hate
Catfishing
Protecting your identity
I’ve been called a bully
Banter vs bullying
Someone is threatening to share my nudes
Pressures from social media
Online gaming
Trolling
Keeping your online accounts secure
Spending too much time online
Consent and sharing photos
Helping adults get online
Parents
Gift Guide
3D printers
Drones
Gaming memberships
Gaming
Robotic toys
Smart Toys
Smart home
Smartphones
Tablets
Virtual Reality
Wearables
Wireless headphones and gaming headsets
The big issues
Cyberbullying
Online pornography
Sending nudes and sexting
Time online
Online gaming
Unwanted contact and grooming
Skills and advice
Online safety basics
Good habits start young
Are they old enough?
The hard-to-have conversations
Taming the technology
Privacy and your child
Quizzes and interactives
Online safety guide
Women
Know the facts about women online
Using your device safely
Starting out
Phones and tablets
Laptops and computers
Wearables and fitness trackers
Connecting safely
Wi-fi and hotspots
Web browsers
Apps
The cloud
Bluetooth
GPS and location-based services
Being social
Email
Social media
Online dating
Sexting and sending nudes
Blogging
Online gaming
Life admin
Online banking
Online shopping
Online abuse targeting women
Domestic and family violence
Women Influencing Tech Spaces
About WITS
Benefits of social media
Why women?
What is cyber abuse?
Psychological armour
Taking action
Seniors
Staying safer online
Online abuse and scams
Learn the basics and beyond
Looking out for the kids
Helping seniors get online
Training and resources
Be Connected Young Mentors
Frequently asked questions
About us
Who we are
About the Commissioner
Our structure
Our legislative functions
Social media Tier Scheme
What we do
Our programs
What we don't do
Consultation and cooperation
Public consultation
Working with social media
Corporate documents
Annual reports
Accountability reporting
Freedom of information
Agency Plan
Disclosure log
Privacy
Personal information collection notices
Disclaimer and copyright
Website accessibility
Jobs with eSafety
Newsroom
Latest blogposts
Events
Safer Internet Day 2020
Research
Adults who engage in image-based abuse
Online safety
Parenting in the digital age
Mentoring older Australians
Women from diverse backgrounds
Digital parenting
Digital families
Supervising preschoolers online
Parenting and screen time
Parenting and pornography
Digital behaviours of older Australians
Attitudes and motivations
Digital confidence
Fear of technology
Youth and digital dangers
Connecting online
Negative online experiences
Young people and social media usage
Youth and online gaming - state of play
Youth and online gaming
Young people and sexting
Image-based abuse
Prevalence and pathways
Impacts and needs
Bystanders
Young people and social cohesion
Online hate, bullying and violence
Trust in online information sources
Online relationships
Digital participation
Young and social online
Connected kids and teens
Cyberbullying and other digital dangers
Kids online — parent views
Parenting online
Kids and teens online
Social media use and cyberbullying
Social media and kids
Glossary of terms
How we can help
How to report online abuse to us
Counselling and support services
Report
Report cyberbullying
FAQ about making a complaint
How we handle complaints
Collecting evidence
Support for cyberbullying
Report adult cyber abuse
FAQ about making a report
How we handle reports
Collecting evidence
Support for adult cyber abuse
Report image-based abuse
FAQ about making a report
How we handle reports
Collecting evidence
Support for image-based abuse
Report illegal and harmful content
FAQ about making a report
What we can investigate
What we can't investigate
The actions we can take
Law enforcement partners
How to browse in incognito mode on Android devices