Stay Safe!
It is important to stay connected with digital technology, but you also need to stay SAFE.
Technology and the internet are essential resources to stay in contact with family, friends, advocates and service providers.
However, these tools can also be just as powerful for an abusive partner to continue and even escalate the abuse. It’s crucial that you ensure your safety while online.
- Your cell phone and computer can be monitored without you knowing it.
- The browsing history can never be completely erased from your computer or other devices, even when you browse in the “private” and “incognito” modes.
- GPS (Global Positioning System) trackers can be attached to and placed in or on cars, bikes, purses, backpacks, cell phones, etc.
Remember to ALWAYS keep your safety in mind when researching. Clear your browser history of content you wouldn’t want your partner to see, including this website.
Internet Safety
Be careful to prevent an abusive partner from tracking your internet history.
Computers and other devices will store information about the websites you visit. This means that any research you do, purchases you make, and bills you pay can be tracked. All emails and messages can be restored and retrieved, even if they’ve been deleted.
It is wise to assume that your computer or other devices may be monitored after you use them. Be mindful of what you send to others and what you post on social media.
If you are uncertain, you can use a safe computer at your local library, an internet cafe, your local domestic violence organization, your workplace or at a computer technology center. Don’t use a shared computer when researching things like housing options, legal issues, travel plans and safety plans.
Using a VPN (Virtual Private Network) can give you privacy when working on a public internet connection or a wi-fi hotspot.
Email Safety
An abusive partner will most likely suspect you to be in contact with family and trusted friends with whom you may have shared your situation. They may have access to your email account and be monitoring it without your knowledge. Email can be intercepted just like physical mail and can be read or even deleted without your knowledge.
On a safe computer, open a new email account that your partner won’t know about. Then use that email address for all sensitive communications (ie housing, legal, safety planning, banking, etc.). If possible, use two-factor authentication when setting up the security preferences. Also, make sure that your phone/computer notifications are disabled for this email account. You don’t want a banner showing up on the screen of your device or a ringtone alerting you of a new email, which would arouse the suspicion of a watchful abuser.
In order to maintain appearances, continue to use the email account that is being monitored by the abusive partner for non-sensitive communication, including non-critical information with family and friends.
Cell Phone Safety
Your cell phone can give your abuser instant, real-time, precise information on your location, your whereabouts, your habits, your spending, and other activities. Cell phones can also be used to identify your call and text history, including both incoming and outgoing communication, even when these have been deleted from the device.
Be sure to put a password on your phone and change it regularly. Disable any notifications (ie ringtones and banners on both active and lock screens) in the settings for items you don’t want your partner to notice.
If you believe that your partner may be secretly monitoring your phone, you may want to take it into a cell phone service center to check for any spyware that might have been downloaded to it.
Depending on the severity of your situation, it may be wise to consider purchasing a burner (pay-as-you-go) phone and keeping it in a safe place for private and emergency calls.
Social Media
No matter what your privacy settings are, once you post something on social media, it’s out of your control. Protect your personal information. Phone numbers, addresses, handles and personal details (ie birth date, schools you attend, employers, and photos with landmarks or location tags) will make it easier for someone to reach you.
Make sure for each of your social media accounts that your privacy settings are strict. Disable the ability for other people to tag you in their posts and photos. In addition, ask people not to post your personal information, your whereabouts and activities, and photos that you are in. Likewise, don’t post information about other people unless you have their consent, as you don’t want to endanger their safety or the safety of others.