Follow you and show up wherever you are.
Send unwanted gifts, letters, cards, or e-mails.
Damage your home, car, or other property.
Monitor your phone calls or computer use.
Use technology, like hidden cameras or global positioning systems (GPS), to track where you go.
Drive by or hang out at your home, school, or work.
Threaten to hurt you, your family, friends, or pets.
Find out about you by using public records or online search services, hiring investigators, going through your garbage, or contacting friends, family, neighbors, or co-workers.
Posting information or spreading rumors about you on the Internet, in a public place, or by word of mouth.
Other actions that control, track, or frighten you.
Repeated, unwanted, intrusive, and frightening communications from the perpetrator by phone, mail, and/or email.
Repeatedly leaving or sending victim unwanted items, presents, or flowers.
Following or laying-in-wait for the victim at places such as home, school, work, or recreation place.
Making direct or indirect threats to harm the victim, the victim's children, relatives, friends, or pets.
Damaging or threatening to damage the victim's property.
Harassing victim through the internet.
Posting information or spreading rumors about the victim on the internet, in a public place, or by word of mouth.
Obtaining personal information about the victim by accessing public records, using internet search services, hiring private investigators, going through the victim's garbage, following the victim, contacting victim's friends, family work, or neighbors, etc.