TECHNOLOGY SAFETY PLANNING WITH SURVIVORS

Stop AbuseTips to discuss if you or someone you know is in danger.

1. TRUST YOUR INSTINCTS:
If you suspect the abusive person knows too much, it is possible that your phone, computer, email, or other activities are being monitored. Abusers and stalkers can act in incredibly persistent and creative ways to maintain power and control.

2. PLAN FOR SAFETY:
Navigating violence, abuse, and stalking is very difficult and dangerous. Advocates at the National Domestic Violence Hotline have been trained on technology issues, and can discuss options and help you in your safety planning. Local hotline advocates can also help you plan for safety. (National DV Hotline – 1-800-799-7233)

3. TAKE PRECAUTIONS IF YOU HAVE A “TECHY” ABUSER:
If computers and technology are a profession or a hobby for the abuser/stalker, trust your instincts. If you think he/she may be monitoring or tracking you, talk to a hotline advocate or the police.

4. USE A SAFER COMPUTER:
If anyone abusive has access to your computer, he/she might be monitoring your computer activities. Try to use a safer computer when you look for help, a new place to live, etc. It may be safest to use a computer at a public library, community center, or Internet cafe.

5. CREATE A NEW EMAIL ACCOUNT:
If you suspect that anyone abusive can access your email, consider creating an additional email account on a safer computer. Do not create or check this new email from a computer your abuser could access, in case it is monitored. Use an anonymous name and account: (Example: bluecat@email.com, NOT YourRealName@email.com). Look for free web-based email accounts and DO NOT provide detailed information about yourself.

6. CHECK YOUR CELL PHONE SETTINGS:
If you are using a cell phone provided by the abusive person, consider turning it off when not in use. Also many phones let you “lock” the keys so a phone won’t automatically answer or call if it is bumped. When on, check the phone settings; if your phone has an optional location service, you may want to switch the location feature off/on via phone settings or by turning your phone on and off.

7. CHANGE PASSWORDS AND PIN NUMBERS:
Some abusers use victim’s email and other accounts to impersonate and cause harm. If anyone abusive knows or could guess your passwords, change them quickly and frequently. Think about any password protected accounts – online banking, voicemail, etc.

8. MINIMIZE USE OF CORDLESS PHONES OR BABY MONITORS:
If you don’t want others to overhear your conversations, turn baby monitors off when not in use and use a traditional corded phone for sensitive conversations.

9. USE A DONATED OR NEW CELL PHONE:
When making or receiving private calls or arranging escape plans, try not to use a shared or family cell phone because cell phone billing records and phone logs might reveal your plans to an abuser. Contact your local hotline program to learn about donation programs that provide new cell phones and/or prepaid phone cards to victims of abuse and stalking.

10 ASK ABOUT YOUR RECORDS AND DATA:
Many court systems and government agencies are publishing records to the internet. Ask agencies how they protect or publish your records and request that court, government, post office and others seal or restrict access to your files to protect your safety.

11 GET A PRIVATE MAILBOX AND DON’T GIVE OUT YOUR REAL ADDRESS:**
When asked by businesses, doctors, and others for your address, have a private mailbox address or a safer address to give them. Try to keep your true residential address OUT of national databases.

12 SEARCH FOR YOUR NAME ON THE INTERNET:
Major search engines such as “GOOGLE” or “YAHOO” may have links to your contact information. Search for your name in quotation marks:”FULL NAME”. Check phone directory pages because unlisted numbers might be listed if you have given the number to anyone.

**In the state of New Jersey there is a service in Trenton where your mail is sent and then they re-mail it to you.**

Comments

comments

This entry was posted in Writings and tagged , . Bookmark the permalink.