Someone is threatening to share my intimate image.

→ A guide for 18 years of age or older.

Tech Safety Resources

These tech safety resources provide options and steps to use tech safely.

Legal
Resources

There are legal remedies available to respond to NCDII, including Civil and Criminal options.

Personal and Relationship-based Solutions

Communication and interpersonal strategies that do not rely on formal remedies such as legal procedures.

Community Supports and Resources

Community resources are available including anti-violence organizations, hotlines, and other services.

Someone threatening to share your intimate image without your consent is not okay - it’s not your fault, and you are not alone. Learn more about your options.

In Canada, it is illegal (i.e. a criminal offence) for a person to knowingly publish, distribute, transmit, sell, make available, or advertise an intimate image of a person where the person in that image did not give their consent for it to be shared.

What if the person with your images has not yet posted but is threatening to do so if you don’t do what they want? The image does not have to be posted already for you to take action– there are options available to you.

If someone uses another person’s intimate image to pressure them to do something, they could be charged with “extortion”. Extortion is a crime and applies when someone tries to gain something using threats to make or to try to make another person do something. This means, even if they have not posted or sent the photo to anyone but are threatening to do so if you don’t do something, this could be charged as the criminal offence of extortion.

Some examples of threats to disclose images and extortion include…

  • After ending your relationship, your partner says they will share your image
  • A stranger you met online has access to intimate photos/videos of you and says they will post them online if you do not send them money
  • An ex-partner has a copy of your image and says they will send them to your parents if you do not engage in sexual activity with them

 

Here are some steps you can choose to take.

1. Reach out for help
You can reach out to someone you trust or a support worker to get help in learning about your options. Learn more

2. Save evidence of what’s happening
Save evidence of any image sharing, including if anyone has threatened to share your image or has talked about sharing the image. You can also consider if you want to explore legal options.

3. Tell them that you don’t consent to what’s happening
You can let the person who is threatening to share your image know that you don’t consent to what’s happening. Learn more

4. Use preventative support services
There are services that help remove intimate images posted online, which can also be used before an image has been posted. Learn more

5. Secure your accounts & take tech safety steps
Taking extra tech safety steps might be an option for you- this might include steps like making sure your accounts are private and can only be accessed by you, or blocking users and accounts. Learn More

Learn more about your options below.

Tech Safety Resources

You have a right to use technology safely. If someone is threatening to share your or someone else’s intimate image without consent, the following steps may be helpful.

Someone may be threatening to post or share your intimate image if you don’t do what they want. If someone uses another person’s intimate image to coerce them to do something, they could be charged with “extortion.” Extortion is a crime that applies when someone tries to gain something using threats to make or to try to make another person do something. This means that even if they have not posted or sent the photo to anyone but are threatening to do so if you don’t do something, they could be charged with the criminal offence of extortion.

Section 162.1 of the Criminal Code, “Publication of an Intimate Image Without Consent,” states that it is an offence to publish, distribute, make available, or advertise an intimate image of a person without their consent. 

1. Create a Safety Plan

You never deserve to be threatened and you are never responsible for someone’s choice to be abusive. Unfortunately, that doesn’t make dealing with threats like this any easier. So what can you do if someone is threatening you and trying to get you to do something you don’t want to do?

If you feel like it is safe for you to resist, your best option might be to stand your ground and not give in to the threats. This is often easier said than done, but giving in to the threats usually doesn’t make them stop. In fact, it can intensify their sense of control, and the threats might even become more frequent and extreme in the future.

It is possible that they won’t follow through on their threats. However, you know the situation best and talking to a trusted friend or support person such as an anti-violence worker may help with these decisions. You can find more resources to support you with safety planning in the Community Supports section.

Creating a safety plan can help you identify ways to use technology strategically to help you increase safety if you are being harassed, threatened, stalked, or abused through someone’s misuse of technology. Tech Safety Canada’s Safety Planning toolkit provides tips and guidance on how to create a safety plan.

You may want to consider ways to neutralize the threats that they are making. For example, if they are threatening to tell your parents about something you did, you could go to your parents first and be upfront and honest about what happened. It might be an uncomfortable thing to do, but they would no longer be able to control you with that threat. Or, maybe they are threatening to spread a rumor about you.

If someone is threatening to share your intimate image, part of someone’s threat might be to “out” you. “Outting” someone is when someone accidentally or intentionally publicly reveal another person’s sexual orientation (e.g., gay, straight, bisexual), gender identity (e.g., non-binary), if they are trans-gender, and/or relationship status without their permission (Qmunity, 2022, p23). If someone is threatening to out you without your consent, if it is safe to do so you might consider telling your friends or family before they have a chance to. This can be a difficult decision to make, because ideally you should be able to come out to people only when you’re ready. You might consider reaching out for support from a local support group or other resource like QMUNITY.

Read More | BCSTH:  Help! My Partner is Threatening Me

2. Preserve Digital Evidence

If someone is sending you threats via text, email, social media or voice messages, save everything. Take a screenshot or video screen recording and keep them in a safe place, like a password protected file or account, or you could send copies to a trusted friend or family member if someone has access to and is monitoring your computer or phone. This is a way to document the threats and abuse should you choose to take legal action.

Note: You may not know if you want to go to the police and that’s ok, but it is always recommended that you preserve evidence as soon as possible to keep all remedies available. You may need the evidence for other reasons other than court, for instance, for your family and friends to prove that you are the victim of criminal conduct.

Making Copies of Evidence

Take a screenshot of the image or screen recording of the message or post containing the threat. Make sure you save the screenshot or screen recording in a safe place that is not accessible to the person misusing your technology.

  • Capture the URL where the threat was posted.
  • If the URL doesn’t include it, identify which website it was posted on.
  • If the website shows who posted the threat, also capture (by taking a screenshot or screen capture) the name of the person who posted it and any other profile information available about them.
  • Try to capture the date/time the threat was posted if possible and always record the date the evidence was collected.
  • If there is any other related harassment, such as emails or texts, be sure to keep those as well.
  • If the abusive person made any statements about posting your intimate image, record that in your documentation log.
  • If you are capturing any messages, make sure you document the ENTIRE conversation, even if parts of it are not relevant. Some courts will not accept partial messages.
  • Make sure that there is a timestamp on all messages and posts
  • Document all the information you have regarding the incident. Document who the offenders are, your relationship with them, the duration of the relationship and abuse, the impact of the abuse on your life, and any actions you have taken.
    • Think through what evidence you could preserve. This might include evidence of the image being shared, but it can also include any harassing messages or threats that were made to share your image, or, for example, evidence of the devices that logged into your instagram account that day.
    • Capture any comments under the photo of video including who posted them, as these are “witnesses” to the NCDII.
  • Protect your evidence by making multiple copies and save them in secured digital locations organized by date and time. Depending on your situation, examples of a safe place to store evidence might be on a computer only you have access to, on a USB or external hard drive only you have, or on a Google Drive only you can access. Print out the screenshots and keep them in a physical evidence binder. Make sure to print all pieces of evidence, including images of the webpage where the threats are posted, the profile or account of the poster, and any surrounding conversations.
  • For some takedown services like Take it Down Now or Stop NCII, you might need to be in possession of the image being shared. If there is an image the person is threatening to share, avoid deleting your image off of your device right away.
Saving evidence from Phone / Text
  • If sent via text message: take a screenshot of the text message and include a screenshot of their contact information to show the number associated with the name in your phone.
Saving Evidence from Social Media
  • If posted on a social media platform: make sure that the image or message that contains the intimate image contains the username that posted the image and any comments. Take a screenshot of the account/profile that sent or posted the intimate image.

3. Tech Safety Tips and Securing Your Account

Here are some tips that might be helpful
  • If your photos and videos are automatically uploaded to an online cloud service, check to make sure that those accounts are secure and someone else doesn’t know the password. It is always a good idea to make sure that all your online accounts are secure and that no one else but you knows the passwords.
  • Review the privacy settings of your social media accounts, so you know who sees what you share. You may want to review your friends and followers, and if there is anyone you don’t want to see your information, you may unfriend them or remove them as a follower of your account.
  • Put passcodes on your devices, particularly devices that have photos and videos of you.
  • If you feel comfortable, consider creating a Google Alert for your name so that if anything is posted online with your name, you will get an alert. This will be best for someone with a name that isn’t very common. Also make sure you’ll be okay getting an alert, even if that means you’ll know each time your intimate image has been re-posted. Some survivors find this helpful to do, while others feel that this can be difficult.
  • Consider blocking or reporting any harassing messages or accounts. It’s important to note that after blocking or reporting you may lose access to private messages, or the ability to see what they’re posting on their account. Consider preserving evidence of this harassment first. Reviewing the privacy settings of your social media accounts might also help to limit any harassing messages.

For more information on tech safety planning or securing your devices and accounts, you can explore the following resources:

Tech Safety Canada: Technology Safety and Privacy Toolkit

Tech Safety Canada: Tech Safety Planning Toolkit

Tech Safety Canada: Digital Breakup Tool

Tech Without Violence: How to Report Abusive Accounts and Content

Tech Without Violence: Securing your Cloud

Tech Without Violence: 3 Ways to Increase Password Security

Tech Without Violence: How to Block Phone Numbers

Tech Without Violence: Securing Your Location Settings

4. Preventative Measures

Preventative Use of Stop NCII

Stop NCII is an image removal service for survivors over the age of 18. It is operated by the Revenge Porn Hotline that helps remove images posted on partner platforms (e.g., Instagram, Bumble, Only Fans). It can be used once an image is shared, or before an image has been shared. You will need to be in possession of the image that has been shared/someone is threatening to share.

Tell the person that you don’t consent to what’s happening

If someone is threatening to distribute an intimate image of you without your consent, notify them that they do not have your consent to publish or otherwise share the image and keep a copy of that communication. You can send a message like:

“I do not consent to you sending/sharing the image/video of me [add a description such as including the date sent or any other identifying factors]. I am asking you to delete it and I do not give you permission to share it.”

Or

“I do not consent to you storing or retaining in any way the image/video of me. [add a description such as including the date sent or any other identifying factors]. I am asking you to delete it and I do not give you permission to share it.”

Preserve evidence of the message you send. For more information about communicating with the person sharing your image without your consent, you can view our resources on Legal Responses and Personal and Relationship-Based solutions.

5. Important Note on Sextortion

Sextortion is when someone threatens to send a sexual image or video of you to other people if you don’t do what they want, which might include paying them or sending them more sexual content (like nude images or videos).

Example: Someone pretends to be someone they aren’t, and they convince you to share an nude image. They send nude image first to make it seem more real. When you send a picture back, they start making demands that you send another image. They say that if you don’t, they’ll send the image to your coworkers. You send another nude image, but now they are demanding a video.

If you are being sextorted, it is not your fault, and there is help available. It is important that you stop all communication with the person who is extorting you. Sextortion is illegal, and you might also choose to contact the police or an anti-violence organization to connect with an anti-violence worker. To view a list of community resources, see our Community Supports section.

Personal and Relationship-based Solutions

This section provides examples of ways you can reach out to family and friends for support, as well as ways to ask the person, or people, who are threatening to share your image not to share it and to ask them to delete it.

People experiencing non-consensual image sharing often reach out to friends, colleagues and family for support. Personal & Relationship-Based solutions are communication and interpersonal strategies that can be used to respond to NCDII that do not rely on formal remedies such as legal remedies. You might want to use entirely personal and relationship-based solutions, or a combination of legal and non-legal responses to respond to the NCDII.

A benefit of relationship-based and personal solutions is not having to go through formal legal pathways if you are not comfortable with that process. This section might also be helpful for someone looking for pevention information, for example,  you’re ending a relationship with someone and want to talk about deleting intimate images they have of you.

It’s important to note that relationship-based and personal solutions are not as enforceable by law. You can choose to use relationship-based and personal solutions where they feel right to you, and you can use them in combination with other options like legal and tech safety steps, such as image removal services like Stop NCII or Take it Down Now

Regardless, using relationship-based or personal-based approaches do not prevent you from pursuing legal options in the future. Whether or not you’re planning to pursue legal remedies now or in the future, preserving digital evidence of what’s happening can be a helpful step, whether that is for future legal action or to maintain a personal record.

Benefits of using relationship-based and personal solutions

  • You don’t need to go through formal legal pathways if you are not comfortable with it.
  • Can be used when an image has been shared, or when someone is threatening to share an image. They can also be used in preventative or safeguarding conversations about NCDII, e.g., you’re ending a relationship with someone and want to talk about deleting intimate images they have of you.
  • Can be used in combination with other tech safety steps

Considerations for using relationship and personal based solutions

  • Not always enforceable by law.
  • May not feel comfortable or safe using certain relationship-based solutions, such as asking someone to remove an image.
  • Not a formal pathway to have images removed
  • Some personal and relationship-based solutions, like restorative justice methods, may still involve the government

Starting a conversation about NCDII

Reaching out for support can connect you to resources, provide comfort, and help you take action in the way that feels right to you. Remember that this is not your fault, that you’re not alone, and that the problem is the non-consensual image sharing.

There’s no right way for you to start a conversation– it can look a lot of different ways, and you have choices for how you go about it. If you feel safe beginning a conversation, some things you might consider can include:

 

Do you want help preparing for your conversation?

You might want to talk with someone you trust, or an anti-violence worker, to help plan your conversation. If you’d like to connect to someone to talk through your options, you can find a list of community resources and hotlines here: Community Supports

 

Who do you want to start a conversation with?

Depending on your situation, you might want to reach out to your school or university, your friends, or your family. It’s up to you who you share with, and you can choose someone who feels like they will be supportive and respectful. It’s also an option to ask someone to go with you to support you in your conversation.

 

Is this a conversation you’d rather have in person or through writing?

It might feel best to start a conversation in person, over the phone, or through a text, email, or letter. It’s important to note that if you use email, text, or written communication, both you and the person sharing your image can use the communications as evidence. For more information about preserving digital evidence, see the preserving digital evidence toolkit.

 

What do you want to share?

It’s up to you what you share and when. You might want to share what has happened (e.g., your image has been shared without your consent), or you might and prefer to simply share that you’re dealing with a situation (e.g., I’m not ready to go into detail, but I am dealing with a stressful situation).

 

How can you plan to care for yourself before, during, and after the conversation?

It might be emotional or difficult to share about an experience with NCDII. It’s important to be gentle with yourself, and plan for ways to care for yourself and find support following the conversation. For example, you may consider bringing someone with you when you have the conversation or initiate the conversation close to a counselling appointment. Similarly, you may plan to write down a hotline or community service number so that you have it ready if you need it. Another option is to include self-care strategies that work for you and that feel comforting, like movement, time spent outdoors, or connecting with friends, family, or the community before or after your conversation.

 

Remember that it is not your fault, and you are not to blame for your image being shared.

  • Starting a conversation might bring up feelings for you. It’s important to remind yourself that:
  • It is not okay that your image was shared without your consent.
  • The violence is not your fault.
  • You are not alone.
  • There are options available to you.

You can find people and resources to support you and remind you of these messages too.

It’s possible that someone you share with may not react exactly the way you expected, but that does not change the fact that it is not okay for someone to share your image without your consent. The problem is not that you shared the image, it’s that someone shared it without your consent. Though it can feel discouraging or upsetting if someone responds poorly to what you share, if that person can’t support you, there are people who can, and you can share with someone else. You also have the option to contact a helpline like the Kids Help Phone (for minors), or work with a caseworker from the BC Intimate Image Protection Service (adults and minors), who will point you to resources and can help you work through your options. You can create a safety plan to prepare for unexpected reactions. For more information about safety planning, view the Tech Safety Planning Toolkit or our Community Supports Page

 

Sample Conversation Starter: Kids Help Phone

This conversation starter from the Kids Help Phone was developed to help provide an idea of how to get started when sharing about sexual abuse. It can be used to tell someone about your image being shared, and is an example of the kind of language you could use if it felt right. This is a straightforward conversation starter that can be used by both youth and adults.

From: Kids Help Phone: Sexual Abuse and How to Get Help and Heal

“How do I tell someone that I’ve been sexually abused?”

It can be scary to tell someone about the sexual abuse that you’ve experienced. Here’s how you can approach the conversation with a safe adult:

  1. Start by saying, “I need to talk to you,” or “There’s something I need to talk to you about.”
  2. ‘Find a quiet spot, take a deep breath and say, “Something’s happened to me that’s hard to talk about.”
  3. When you’re ready, explain by saying, “I was sexually abused. I need help.”
  4. If you know how you want the person to help, continue by saying, “I want you to…”

In NCDII contexts, rather than say “I was sexually abused”, you could say “someone has an intimate image of me, and they’re threatening to share it”, or “someone has shared an intimate image of me”.”

You can find more resources here:

Thorn: Getting Help for Sextortion

Kids Help Phone: Need to have a tough conversation with someone? Here’s how

Kids Help Phone: How can I talk to a parent/caregiver about something?

Reach Out: What to do if someone shares your nudes

DIY Digitally Informed Youth: Is Someone Sharing or Threatening to Share Your Intimate Image?

Talking to the person who shared your image

Ask for them to take your image down

Some people may want to contact the person who has their image and has threatened to share it to ask for the image to be taken down, or to ask that they delete the image from their devices. You can ask a friend, anti-violence worker, or trusted person to help you communicate with the person threatening to share your image. If this feels like a safe option, and you want to contact that person but don’t know where to start, it might feel helpful to use a template or outline.

Note: If you are being sextorted, it is important that you stop all communication with the person who is extorting you. If you are under 18 years old and the person in possession of your image is an adult, it’s important to reach out for support, either to a trusted adult or a resource like the Kids Help Phone. Sextortion is illegal, and you might also choose to contact the police. You can find more resources here: Threatening to Share Image – Guide for under 18

 

Option to include legal language in a letter

You might also decide that you want to use legal language in your communication with the person threatening to share your image. You can view our resources on writing a cease-and-desist letter here. The benefit to using legal language is that it might carry more weight in legal proceedings if you decide you want to pursue those actions later.

 

Tell the person that you Don’t Consent to what is Happening

Whether or not you use legal language, it’s a good idea to tell the person that you don’t consent to your image being shared. You could use language like this to express that you don’t consent to what’s happening:

“I do not consent to you sending/sharing the image/video of me [add a description such as including the date sent or any other identifying factors]. I am asking you to delete it and I do not give you permission to share it.”

 

You might also say:

“I do not consent to you storing or retaining in any way the image/video of me. [add a description such as including the date sent or any other identifying factors]. I am asking you to delete it and I do not give you permission to share it.”

 

Preserve Digital Evidence

After sending your message, it’s a good idea to preserve digital evidence of the message you send and any threats or evidence of sharing. Initially, you might not decide to pursue legal options, however, having this evidence will help if in the future you decide that you would like to pursue your legal options. Either way, it might also be helpful or meaningful on a personal level to have a record of what is happening for your own purposes.

It’s important to note that if you use email, text, or written communication, both you and the person threatening to share your image can use the communications as evidence. For more information about preserving digital evidence, see the Preserving Digital Evidence Toolkit.

Template Example: The Dear Man Method

One template you could use is the “Dear Man” method, which provides an outline to make a request and assert a boundary. You don’t have to follow every step of this method and you can modify it so that it feels right for you. Here is a version of the Dear Man method adapted from Wichita State University:

Describe: Describe the situation using facts and observation
Example: You told me that you have my intimate photos and could share them “whenever you want”; You posted an intimate photo of me on your Instagram account; you showed your friend a nude picture of me.

Express: Express how you are feeling
Example: I don’t feel safe or secure; I feel worried about what you’re saying; I am not comfortable with you storing my intimate images on your phone

Assert: Ask for what you want, and what you don’t want.
Example: I am asking you to delete the images you have of me, and that you do not send them or show them to anyone; I would like you to delete the picture you have posted to your account; I would like to meet with a facilitator to talk about this

Reinforce: Explain the effects of what you’d like, or add more information about what you do and do not consent to.
Example: It’s illegal to share someone’s intimate image without their consent, and it can be really harmful to the person; I do not consent to you sharing my images with anyone; I do not consent to you storing images of me on your device.

Mindful: Remind yourself that the violence is not your fault, and that it is not okay that someone shares or threatens to share your image. Focus on your boundaries and what you would like out of the situation.

Example #1: Someone is threatening to share an image

You told me that you kept my intimate photos after we ended our relationship, and said that they were yours to use however you choose. This was very stressful for me to hear, and I’m worried about what you’re saying. It’s illegal to share someone’s image without their consent, and I am not comfortable with you storing my intimate images, or keeping copies in any way. I only sent those images to you, and they were only for private use, and I am not okay with you sharing them with anyone in any way. I do not consent to you sending or sharing the image/video of me. I want you to delete it and I do not give you permission to share it.

Example #2: Someone forwarded an intimate image

You were sent my screenshotted image on Snapchat, and sent it to Angie without my consent. My image being shared has been really stressful and difficult for me, and I feel betrayed and hurt that you forwarded my image to someone else. It’s not just illegal to share someone’s image, it’s also illegal to forward it without their consent. It is not okay and it can be really harmful to the person in the image. I am not okay with you continuing to share my image, and I am asking you to delete it and any copies of it you have.

Example #3: Someone has shared an intimate image

You posted my image on your private Instagram page without my consent. Having my image shared without my consent has been very stressful and upsetting, and I am worried about who has access to it. It’s illegal to share someone’s image without their consent, it’s not okay and can be really harmful to the person in the image. I am asking you to delete this image and any others that you have. I am not okay with you sharing them. If anyone has screenshotted the image, I am asking you to tell them to delete any copies as well.

 

More Resources:

DIY Digitally Informed Youth: Is Someone Sharing or Threatening to Share Your Intimate Image? 

Transformative & Restorative Justice Approaches to NCDII

Some people might be interested in alternative community-based solutions to NCDII. This might include options like Transformative and Restorative Justice frameworks, which are approaches to responding to harm that focus on healing and repair for the survivor in a way that often involves community. Depending on the organization or facilitator, Transformative and Restorative approaches can include legal systems or the government to different extents. Because Transformative Justice is responsive to the needs of the community and the person harmed, it will look very different from situation to situation.

More research is being done about restorative and transformative responses to NCDII, especially for young people. A recent Paper by Dodge and Lockhart (2022) found that some survivors may find that the ways restorative and transformative methods move away from focus on punishment for the person sharing their is aligned better with their personal needs. Some survivors prefer responses that focus on meeting needs such as support through advice and counseling, and taking down their images.

There are organizations such as the Sexual Assault Centre of Edmonton (SACE) that are increasingly working with Transformative Justice Options for responding to Sexual Violence:

“We also recognize that for many valid reasons, some people who have experienced sexual abuse or assault do not feel safe, comfortable, or interested in accessing a criminal justice response. Alternatives to the criminal justice system can sound scary in the context of sexual violence, but there is actually a long lineage of BIPOC (Black, Indigenous, and People of Colour) folks practicing alternative systems of accountability and community safety in cases of sexual violence. This type of work is generally understood as part of one or both of the fields of Restorative and Transformative Justice.”

Learn more:

You can explore more Transformative & Restorative Justice resources linked through SACE

Women’s Legal Education & Action Fund | Avenues to Justice- Restorative & Transformative Justice for Sexual Violence

Ministry for Public Safety & Solicitor General: Crime Prevention Information Series, Restorative Justice
Note: Many of the services listed in this resource are facilitated by the Province.

Salal Sexual Violence Support Centre: Transformative Justice Pilot Project
Salal Sexual Violence Support Centre has a Transformative Justice Pilot Project which works with cases of sexual violence, and prioritizes support for marginalized survivors. All participants must be over the age of 19, and referrals to the program may prioritize those already accessing services through Salal. For more information, visit Salal’s Website

Tech Safety Steps

You can use relationship and personal solutions in combination with tech safety steps– these do not require you to go through legal systems (civil or criminal). You might consider actions like securing your accounts, or using take down services like Take it Down Now or Stop NCII. To learn more about these options, view the Tech Safety Resources Tab.

Community Support and Resources

You are not alone and there are confidential safe support services available for you.

 

Below are resources including anti-violence organizations, hotlines, and services specifically supporting people with experiences of NCDII.

Support for People Impacted by Non-Consensual Distribution of Intimate Images

The Intimate Image Protection Service provides support to people in BC whose images have been shared without their consent. Available by email or phone (8:30 AM-4:30PM).

Victim Link BC is a free, confidential, and multilingual 24 hour service that provides phone, text, and email support including referrals and immediate crisis support to victims of crime. You can contact Victim Link BC even if you are not sure if you’ve experienced a crime.

Salal Sexual Violence Support Centre provides free support for survivors of sexualized violence, including survivors of technology-facilitated violence (such as NCDII). They offer a 24 hour crisis line, Text and Chat support, Police and Court Accompaniment, Counseling, and Specific counseling and support for Indigenous survivors.

The Canadian Centre for Child Protection provides immediate help and prevention education to address the victimization of children and support those who have experienced violence. This includes Cybertip.ca, a tipline for reporting online child sexual abuse and exploitation. Cybertip is a resource for more information about non-consensual sharing of intimate images, online luring, and child victimization on the internet.

Need Help Now provides resources for Canadian youth who have experienced the non-consensual distribution of intimate images, luring, sextortion, or other forms of online sexual violence. Their team can help with next steps, image removal, and connect youth to services like counseling.

You can find a Transition House, Second Stage House, or Third Stage House near you on BCSTH’s membership directory.

Crisis Lines & Counseling

KUU-US Crisis Line Society is a crisis phone line for Indigenous Adults, Elders, and Youth.

VictimLink BC is a referral and information service for victims of crime.

Crisis Centre BC is a crisis phone line that offers 24 hour support in many languages. You don’t need to be thinking about suicide to use this service. 1-800-SUICIDE/ 1-800-784-2433

The National Suicide Crisis Helpline offers 24 hour support. Call or text 9-8-8 for phone or chat support.

BC Mental Health Support Line– A 24 hour line for immediate mental health support or referral. Call 310-6789 (no area code)

The Crime Victim Assistance Program may be able to help with expenses for victims of violent crime and their families, such as funds for support and counseling. You can apply to the program as soon as a crime against you has taken place, even before criminal proceedings begin.

Legal Support

Access Pro Bono Society of British Columbia offers free legal advice throughout BC. 

UBC Indigenous Community Legal Clinic provides free legal services to the Indigenous community, and is located in Vancouver’s Downtown Eastside.

The UBC Law Students’ Legal Advice Program provides free legal advice and representation to clients in the lower mainland.

Rise Women’s Legal Centre provides accessible legal services to self-identifying women and gender-diverse clients. They tend to have a focus in family law.

Tech Safety Support and Image Removal

Stop NCII is an image removal service for survivors over the age of 18.

Tech Safety Canada offers Canada-wide resources on technology-facilitated gender-based violence for survivors and frontline workers.

The BCSTH Tech Safety Project provides tech safety resources for survivors and anti-violence workers in BC.

The White Hatter provides resources and education on digital literacy and internet safety. They provide online resources and have a phone line for support.