Technology Safety Tip Sheet
Although technologies such as the internet, email and mobile phones have provided benefits for victims of family violence, they have also opened up new avenues for abusers.
The following tip sheet was provides courtesy of our IT Support Partner Bremmar IT Consultatnts
1 -Trust your instincts. If you suspect the abusive person knows too much, it is possible that your phone, computer, email, car use or other activities are being monitored. Abusers and stalkers can act in incredibly persistent and creative ways to maintain power and control.
2 -Plan for safety. Dealing with violence, abuse, and stalking is very difficult and dangerous. Domestic violence services and police can discuss options and help you in your safety planning.
3 -Use a safer computer. If anyone who is abusive has access to your computer, he/she might be monitoring your computer activities. ‘Spyware’ and ‘keylogging’ programs are commonly available and can track what you do on your computer without you knowing it. It is not possible to delete or clear all of the ‘tracks’ of your online or computer activities. Try to use a safer computer when you look for help, a new place to live, etc. It may be safest to use a computer at a public library, community centre, or Internet café.
4 -Create a new email or instant messaging account. If you suspect that anyone abusive can access your email, consider creating an additional email account on a safer computer. Do not create or check this new email from a computer your abuser could access, in case it is monitored. Use an anonymous name, and account: (example: firstname.lastname@example.org - not YourRealName@email.com). Look for free web-based email accounts (like yahoo or hotmail), and do not provide detailed information about yourself.
5 -Check your mobile phone settings. If you are using a mobile phone provided by the abusive person, consider turning it off when not in use. Also many phones let you to ‘lock’ the keys so a phone won’t automatically answer or call if it is bumped. When on, check the phone settings; if your phone has an optional location service, you may want to switch the location feature off/on via the phone settings menu or by turning your phone on and off.
6 -Change passwords and pin numbers. Some abusers use a victim’s email and other accounts to impersonate and cause harm. If anyone abusive knows or could guess your passwords, change them quickly and frequently. Think about changing the passwords for any password protected accounts - online banking, voicemail, etc. Use a safer computer to access your accounts.
7 -Minimize use of cordless phones or baby monitors. If you don’t want others to overhear your conversations, turn baby monitors off when not in use and use a traditional corded phone for sensitive conversations.
8 -Get your own mobile phone. When making or receiving private calls or arranging escape plans, try not to use a shared or family mobile phone because the mobile phone bill and the phone log might reveal your plans to an abuser. Consider using a prepaid phone card so that you won’t get numbers listed on your bill.
9 -Ask about your records and data. Ask government agencies about their privacy policies regarding how they protect or publish your records. Request that courts, government, post offices and others restrict access to your files to protect your safety.
10 -Get a private mailbox and don’t give out your real address. When asked by businesses, doctors, and others for your address, have a private post office box address or a safer address to give them.
11 -Search for your name on the Internet. Major search engines such as Google or Yahoo may have links to your contact information. Do a search for your name in quotation marks: ‘Full Name’.
12 -Save evidence and consider reporting abuse or stalking. Messages left via texts/answering machines can be saved as evidence of stalking or abuse. Keep a record of all suspicious incidents. You can report abuse, violence, threats, stalking or cyber-stalking to police and the abuser can be charged with a criminal offence, or police can assist with applying for an Intervention Order. Cyberstalking is illegal.