V locked out of her Microsoft account and A is using it.
Responding to your other question about your Microsoft account that you’re locked out of and the cyberstalker is using, you will first want to create a new Microsoft account. Using this new account, you will then go to Microsoft.com and look for the chat option, and tell a customer service representative about your other account getting stolen and that you want them to lock the account while they look into your case. The faster you do this, the better. They will give you a case number and will get back to you in 2 or 3 business days. If the abuser doesn’t change the “alias” which is the username associated with the account, and also doesn’t change the backup security information, there’s a chance of recovering the account. However, if the abuser changes that information, there’s a good chance Microsoft will not be able to recover the account for you - but it can stay permanently locked, which would prevent the abuser from accessing it. If that happens, you will want to ask the representative if the account contents can be copied to your new Microsoft account, such as any software purchased with the account.
You can tell if the abuser changed the alias or other account information if you try to login on Microsoft.com, and after putting in the email login and the password, you get the message that “there’s no account by that name.”
A colleague from the Safety Net Project, another project at our organization that focuses on technology and abuse, suggested using this interactive form, which is also what the Federal Trade Commission (FTC) suggests in their How To Recover Your Hacked Email or Social Media Account guide, if someone gets locked out of a Microsoft account.
More generally, you might be interested in reading about Abuse Using Technology, including Impersonation and Computer Crimes. And we have some information about Safety While Using the Internet and Safety While Using Social Media.
I also wondered if you have a restraining order against your cyberstalker or if you are considering getting one. I can’t speak to your specific situation, but generally, if there’s an existing protective order or restraining order, a person could potentially claim a violation if they can demonstrate that the abuser is responsible for using their account without their permission. Also, even if someone doesn’t have a restraining order, new bad conduct using technology could possibly still be a crime in and off itself.
In every state there is a computer crimes law. On our Crimes [HYPERLINK] page, you might find see the legal definition of [link to any state crime(s) like hacking] and other crimes that an abuser may have committed in your state. However, I can’t say whether these crimes or any others may apply to your situation. Also, please know that this Crimes page does not list every single crime in your state.
Hopefully, you’ll be able to speak with a lawyer in your state [HYPERLINK] to help you figure out if your abuser’s actions violated any state laws.
Additionally, if someone has a court case or is considering taking some kind of legal action because of tech abuse, it may be helpful to think about ways to document the abuse. We have information about digital evidence on our website. Additionally, the Cyber Civil Rights Initiative has information about using something called a “litigation hold request” if someone may need digital evidence from a third party, like a websites or email service provider. (They focus on helping victims of intimate image abuse, but the information about documenting could be useful for victims of other types of tech abuse, too.) Again, WomensLaw can’t vouch for the information on this outside website. I share the links for your information only, and you may want to check with, or get advice from, a lawyer in your state.
Finally, if you’re concerned that this person has gotten access to other personal information of yours, you may also want to contact the non-profit organization called the Identity Theft Resource Center. They have a free hotline listed on their website that you can call to see what tips and help they can offer. And the Safety Net Project that I mentioned earlier also has a guide to Securing Devices & Accounts in case that might help you take steps to increase your privacy and security moving forward.