(8) “Reasonable person” means an individual in the target’s situation.

(8) “Reasonable person” means an individual in the target’s situation.

(9) “Transmits a hazard” means a verbal or written hazard or a danger suggested by way of a pattern of conduct or a mixture of spoken or written statements or conduct.

(1) This area will not affect any specific or company (i) monitoring or attentive to compliance with public or worker security guidelines, wage and hour needs, or other statutory needs, or (ii) picketing occurring during the workplace that is otherwise legal and arises away from a bona fide work dispute, including any debate concerning wages, salaries, hours, working conditions or advantages, including health insurance and welfare, sick leave, insurance coverage, and retirement or your your retirement conditions, the making or maintaining of collective bargaining agreements, while the terms become a part of those agreements.

(2) This area will not affect a fitness for the straight to speech that is free construction this is certainly otherwise lawful.

(3) Telecommunications providers, commercial mobile providers, and providers of data solutions, including, although not limited by, online sites providers and hosting companies, are not liable under this area, with the exception of willful and wanton misconduct, by virtue associated with transmission, storage space, or caching of electronic communications or communications of other people or by virtue associated with supply of other associated telecommunications, commercial mobile solutions, or information services employed by other people in breach with this area.

Aggravated Stalking, 720 ILCS 5/12-7.4

(a) someone commits aggravated stalking as he or she commits stalking and: (1) causes harm that is bodily the target; (2) confines or restrains the victim; or (3) violates a short-term restraining purchase, an purchase of security, a stalking no contact purchase, a civil no contact purchase, or an injunction prohibiting the behavior described in subsection (b)(1) of part 214 regarding the Illinois Domestic Violence Act of 1986.

(a-1) an individual commits aggravated stalking as he or she’s needed to register underneath the Intercourse Offender Registration Act or is formerly expected to register under that Act and commits the offense of stalking as soon as the target associated with stalking can also be the target of this offense which is why the intercourse offender is needed to register beneath the Intercourse Offender Registration Act or a relative associated with the victim.

(1) This part will not connect with any specific or company (i) monitoring or attentive to compliance with public or worker security guidelines, wage and hour needs, or any other statutory needs, or (ii) picketing occurring during the workplace this is certainly otherwise legal and arises away from a bona fide work dispute including any debate concerning wages, salaries, hours, working conditions or advantages, including health insurance and welfare, sick leave, insurance coverage, and retirement or your retirement conditions, the handling or sustaining of collective bargaining agreements, while the terms become incorporated into those agreements.

(2) This area will not connect with a fitness for the straight to free message or installation that is otherwise lawful.

(3) Telecommunications providers, commercial mobile providers, and providers of data solutions, including, although not restricted to, online sites providers and web hosting providers, aren’t liable under this area, with the exception of willful and wanton misconduct, by virtue for the transmission, storage space, or caching of electronic communications or communications of other people or by virtue regarding the supply of other associated telecommunications, commercial mobile solutions, or information solutions utilized by other people in violation for this part.

Cyberstalking, 720 ILCS 5/12-7.5

(a) someone commits cyberstalking as he or she partcipates in a program of conduct making use of electronic interaction fond of a particular individual, in which he or she understands or should be aware of that will cause an acceptable individual to: (1) fear for their security or the security of a 3rd person; or (2) suffer other emotional stress.

(a-3) someone commits cyberstalking as he or she, knowingly and without legal reason, on at the very least 2 split occasions, harasses another individual by using electronic interaction and: (1) at any moment transmits a risk of immediate or future physical damage, intimate attack, confinement, or discipline in addition to risk is directed towards that individual or a relative of the individual; or (2) puts that person or a relative of this individual in reasonable apprehension of immediate or future physical damage, intimate attack, confinement, or discipline; or (3) at any moment knowingly solicits the payment of a work by anyone which will be a breach with this Code directed towards see your face or a relative of that individual.

(a-5) A person commits cyberstalking as he or she, knowingly and without legal justification, produces and maintains an online web site or website that will be available to more than one parties that are third a duration with a minimum of twenty four hours, and containing statements harassing another individual and:

(1) which communicates a risk of immediate or future physical damage, intimate attack, confinement, or discipline, where in fact the hazard is directed towards that individual or a relative of the individual, or

(2) which locations where individual or a relative of that individual in reasonable apprehension of immediate or future physical damage, intimate attack, confinement, or discipline, or

(3) which knowingly solicits the commission of a work by anybody which will be a breach for this Code directed towards that individual or a relative of this person.

(c) For purposes with this part:

(1) “span of conduct” means 2 or maybe more functions, including not restricted to functions by which a defendant straight, indirectly, or through 3rd events, by any action, technique, unit, or means follows, monitors, observes, surveils, threatens, or communicates to or around, an individual, partcipates in other contact that is non-consensual or inhibits or damages an individual’s home or animal. The incarceration in a penal organization of a individual whom commits this course of conduct is certainly not a bar to prosecution under this part.

(2) “Electronic communication” means any transfer of indications, signals, writings, noises, information, or cleverness of any nature sent in entire or in component with a cable, radio, electromagnetic, photoelectric, or system that is photo-optical. “Electronic interaction” includes transmissions through an electric device including, although not limited by, a phone, mobile phone, computer, or pager, which interaction includes, it is not restricted to, email, immediate message, text, or sound mail.

(3) “Emotional distress” means significant psychological suffering, anxiety or security.

(4) “Harass” way to take part in a once you understand and willful length of conduct fond of a specific individual that alarms, torments, or terrorizes that person.

(5) “Non-consensual contact” means any experience of the target that is initiated or proceeded with no target’s consent, including although not restricted to being within the real existence associated with target; showing up in the sight of this target; approaching or confronting the target in a general general public destination or on personal home; showing up during the workplace or residence associated with the target; entering onto or staying on property owned, leased, or occupied by the target; or putting an object on, or delivering an item to, home owned, leased, or occupied by the target.

(6) “Reasonable person” means an individual within the victim’s circumstances, aided by the target’s familiarity with the defendant plus the defendant’s previous functions.

(7) “3rd party” means anyone except that anyone breaking these conditions in addition to individual or people towards who the violator’s actions are directed.

(d) Telecommunications providers, commercial mobile providers, and providers of data solutions, including, although not limited by, websites providers and web web web hosting companies, aren’t liable under this area, aside from willful and wanton misconduct, by virtue associated with the transmission, storage space, or caching of electronic communications or communications of other people or by virtue associated with the supply of other associated telecommunications, commercial mobile services, or information solutions utilized by other people in breach for this area.

Federal Definitions (from 34 C.F.R. Component 668)

Sexual Attack

An offense that fulfills this is of rape, fondling, incest, or statutory rape as found in the FBI’s UCR system and incorporated into Appendix an of this subpart.

Dating sexier Violence

Physical physical Violence committed by an individual who is or has been around a social relationship of an intimate or nature that is intimate the target.

(i) the presence of this kind of relationship will probably be determined based on the party that is reporting statement along with consideration associated with amount of relationship, the sort of the relationship, additionally the regularity for the conversation amongst the individuals active in the relationship.

(ii) For the purposes of the definition—

(A) Dating physical violence includes, it is not limited to, sexual or abuse that is physical the risk of such punishment.