As technology develops, abusers find ways to use it to keep track of their victims. For example, emails, Internet searches, cell phone usage, and GPS services can all be used to track someone's activities. Use a safe computer whenever possible and take precautions when using all forms of technology.
- Computers can store a lot of private information about your online activities and it is not possible to delete or clear all the "footprints".
- If you think your activities are being monitored, they probably are. It might be safer to use a computer in a public library, at an educational institution, at a trusted friend's house, or an Internet Café.
- Create a new email account that the abuser doesn't know about when you use a safer computer.
- If your activities are being monitored, it may be dangerous to change your computer behaviors such as suddenly deleting your Internet history if that is not your regular habit.
- To monitor computer activities does not require special skills, anyone can do it and there are many different ways.
- Be aware that newer cell phones and cell phone plans often have location tracking (GPS) features that an abuser might try to use to learn where you are or where you have been.
For more information on technology safety, contact your local service provider or visit the Tech Safety Special Collection at the National Online Resource Center on Violence Against Women.
Additional Online Resources