Technology safety planning
Although technologies such as the internet, email and mobile phones have provided benefits for victims of family violence, they have also opened up new avenues for abuse.
Trust your instincts
If you suspect the abusive person knows too much, it is possible that your phone, computer, email, car use or other activities are being monitored. Abusers and stalkers can act in incredibly persistent and creative ways to maintain power and control.
Plan for safety
Dealing with violence, abuse, and stalking is very difficult and dangerous. Domestic violence services and police can discuss options and help you in your safety planning.
Use a safer computer
If anyone who is abusive has access to your computer, he/she might be monitoring your computer activities. ‘Spyware' and ‘keylogging' programs are commonly available and can track what you do on your computer without you knowing it. It is not possible to delete or clear all of the ‘tracks' of your online or computer activities. Try to use a safer computer when you look for help, a new place to live, etc. It may be safest to use a computer at apublic library, community centre, or Internet cafe.
Create a new email, Facebook or instant messaging account
If you suspect that anyone abusive can access your email, consider creating an additional email account on a safer computer. Do not create or check this new email from a computer your abuser could access, in case it is monitored. Use an anonymous name, and account: (example: firstname.lastname@example.org - not YourRealName@email.com). Look for free web-based email accounts (like yahoo or hotmail), and do not provide detailed information about yourself.
Check your mobile phone settings
If you are using a mobile phone provided by the abusive person, consider turning it off when not in use. Also many phones let you to ‘lock' the keys so a phone won't automatically answer or call if it is bumped. When on, check the phone settings; if your phone has an optional location service, you may want to switch the location feature off/on via the phone settings menu or by turning your phone on and off.
Change passwords and pin numbers
Some abusers use a victim's email and other accounts to impersonate and cause harm. If anyone abusive knows or could guess your passwords, change them quickly and frequently. Think about changing the passwords for any password protected accounts - online banking, voicemail, etc. Use a safer computer to access your accounts.
Minimize use of cordless phones or baby monitors
If you don't want others to overhear your conversations, turn baby monitors off when not in use and use a traditional corded phone for sensitive conversations.
Get your own mobile phone
When making or receiving private calls or arranging escape plans, try not to use a shared or family mobile phone because the mobile phone bill and the phone log might reveal your plans to an abuser. Consider using a prepaid phone card so that you won't get numbers listed on your bill.
Ask about your records and data
Ask government agencies about their privacy policies regarding how they protect or publish your records. Request that courts, government, post offices and others restrict access to your files to protect your safety.
Get a private postbox and don't give out your real address
When asked by businesses, doctors, and others for your address, have a private post office box address or a safer address to give them.
See if your private contact information is can be found online. Go to Google and do a search for your name in quotation marks: "Full Name"
Save evidence and consider reporting abuse or stalking
Messages left via texts/answering machines can be saved as evidence of stalking or abuse. Keep a record of all suspicious incidents. You can report abuse, violence, threats, stalking or cyber-stalking to police and the abuser can be charged with a criminal offence, or police can assist with applying for an Intervention Order. Cyberstalking is illegal in Victoria.
Legal intervention for cyberstalking
In 2003, Victoria was the first state to amend its Crimes Act to add ‘cyber-stalking'. The definition of the crime of stalking now includes stalking a person on the internet or via email, impersonating another person in cyberspace, posting false information about them on the web and publishing offensive material electronically.
For more information please follow the link below to the National Network to End Domestic Violence USA.
The information above was adapted from Technology Safety Planning with Survivors: Tips to discuss if someone you know is in danger (2005), by the Safety Net: National Safe & Strategic Technology Project at the National Network to End Domestic Violence (USA). It was adapted by CRDVS Inc. with permission from the Safety Net Project
The information contained in this website is for general information purposes only. The information is provided by CRDVS Inc. and while we endeavour to keep the information up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information, products, services, or related graphics contained on the website for any purpose. Any reliance you place on such information is therefore strictly at your own risk.
In no event will we be liable for any loss or damage including without limitation, indirect or consequential loss or damage, or any loss or damage whatsoever arising from loss of data or profits arising out of, or in connection with, the use of this website.
Through this website you are able to link to other websites which are not under the control of CRDVS Inc. We have no control over the nature, content and availability of those sites. The inclusion of any links does not necessarily imply a recommendation or endorse the views expressed within them.
Every effort is made to keep the website up and running smoothly. However, CRDVS Inc. takes no responsibility for, and will not be liable for, the website being temporarily unavailable due to technical issues beyond our control.