Securing your Cloud

People experiencing gender-based violence may be monitored through online cloud-based accounts. Anyone who has access to your devices or knows your login information could see the information stored in your cloud accounts, like messages and photos. If your cloud account is shared or linked to other people’s accounts, then they may also be able to see the information saved to your cloud. Depending on their situations, survivors may decide that it is safe and helpful to change their Cloud account settings. Here’s a few ways to secure your cloud.

This video uses an iPhone and iCloud, but the steps are very similar on Android phones that use Google Drive.

Step 1

review access to your accounts. Start by opening your phone’s settings.

  1. Tap on your name- this should be right at the top of your settings
  2. Scroll down to the bottom of this menu- you should see a list of devices that are connected to your account. If you see an unknown device accessing your account, you can take a screenshot or a picture of the list before you make any changes if you want to document what’s happening. If you don’t recognize a device or see one that shouldn’t be connected, you might decide that you want to remove its access if it is safe for you to do so. To do this, tap the device, and select “remove from account.”
  3. If you’re accessing your cloud information from a browser, go to Apple ID settings , select “Devices” from the menu. You can see which devices are connected to your account, and “Remove from account” any untrusted devices.
  4. From your browser, you can also choose “sign out of all browsers”, which will “Immediately sign out of all browsers currently signed in to iCloud.com with this Apple ID.”

Step 2

strengthen your account security. There are a few changes you can make- choose those that work best for you.

  1. In your phone’s settings, tap on your name.
  2. In the next menu, choose “name, phone numbers, and email”. Here you can check to make sure the details about your contact information are right.
  3. Return to the previous menu, and choose “passwords and security”. Here, you can change your cloud password if you would like.
  4. If you’d like to set up two-factor authentication, tap this menu item. Check to see what phone numbers, devices, and emails are listed as trusted and remove any that shouldn’t be there or that you don’t recognize. You can also update your notification email to make sure it’s right, and change your recovery settings in case something happens to your account.


Before making changes to your account settings, think through potential safety risks. Consider if your device is being monitored by an abuser and whether violence will escalate if you make changes. Check that the right contact information is connected to your account before adjusting its settings, and update the linked email and phone number if they aren’t the right ones. If you suspect your device is being monitored by an abuser and you have the option, consider using a different device or connect with an anti-violence worker who can help you come up with a safety plan.

It’s possible to use technology safely. You don’t have to give up your devices or online presence if tech-facilitated violence is happening to you. It is not your fault. You are not alone. Visit BCSTH.ca to find a safe confidential support service in your community.

If you are in immediate danger,
call your local police
or dial 9-1-1

Safety Check!

If you think someone is monitoring your devices, visit this webpage from a computer, tablet or smartphone that isn’t being monitored.

EXIT NOW from this website and delete it from your browser history.

Find out more with our Technology Safety Quick Tips