Perpetrators will often misuse technology to further abuse and control women and their children. Misuse of technology could include monitoring technology use, including computers or smartphones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of women online.
In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is.
The first step is to document everything that is happening. Documentation is important for many reasons:
WHAT TO DOCUMENT
Social Media/Internet Harassment
Harassing Phone Calls
Phone Number/Caller ID Impersonation
On a following document there is a technology-facilitated violence log that can help you document what is happening to you.
©2019 BC Society of Transition Houses, Technology Safety Project.
Adapted from and in cooperation with the Safety Net Technology Project at the National Network to End Domestic Violence, United States
If you think someone is monitoring your devices, visit this webpage from a computer, tablet or smartphone that isn’t being monitored.
EXIT NOW from this website and delete it from your browser history.