Print this pagePrint this page

Information for survivors and victims

Quick tips

If you think you may be monitored on your home computer, smartphone, or tablet, be careful how you use them since an abuser might become suspicious if you change your patterns of online activity. You may want to keep using the monitored device(s) for innocuous activities, like looking up the weather. It might be safer to use a computer in a public library, at a Community Technology Center (CTC), at a trusted friend's house, or an internet café to research an escape plan, look for new jobs or apartments, bus tickets, and finding help.

Email and Instant/Text Messaging (IM) are not safe or confidential ways to talk to someone about the danger or abuse in your life. If possible, please call a hotline instead. If you use email or IM, please use a safer computer and an account your abuser does not know about.

Computers can store a lot of private information about what you look at via the Internet, the emails and instant messages you send, VoIP (e.g. Skype, Google Hangouts) and IP-TTY calls you make, web-based purchases and banking, and many other activities. It is virtually impossible to completely erase all the history or "digital footprints" of your computer or online activities. If you are being monitored, it may be dangerous to change your computer behaviors such as suddenly deleting your entire Internet history if that is not your regular habit.

 

If you are in danger

Remember that traditional "corded" phones are more private and less interceptable than cordless phones or analog cell phones.

Be aware you may not be able to reach 9-1-1 using an Internet phone or Internet-based phone service (Vonage, Skype, etc), so you may need to be prepared to use another phone to call 911.

Contact your local domestic violence program or shelter to learn about free cell phone donation programs.

Further reading

Buni, Catherine and Soraya Chemaly. The Unsafety Net: How Social Media Turned Against WomenThe Atlantic. 9 October 2014.

Lee, Kaofeng. Love Your Technology Wisely. See the Triumph. 27 January 2015.

Rabinovitch, Maru. How Social Networking Tools Can Be Dangerous for Those Needing AnonymityThe Privacy Association. 8 April 2015.

Shahani, Aarti. Smartphones Are Used to Stalk, Control Domestic Abuse VictimsNPR.org. 15 September 2014. 

External links and resources

Technology Safety & Privacy: A Toolkit for SurvivorsNational Network to End Domestic Violence - SafetyNet Project.

Technical Safety Guide. HeartMob: Powered by Hollaback! 


For more information about technology-facilitated abuse, cyber-stalking, or integrating tech awareness into safety planning with survivors, contact Jonathan Gates, Communications and Events Coordinator, or Keri Moran-Kuhn, Associate Director at (503) 230-1951.