Technology Safety Plan Tip Sheet for Women and Anti-Violence Workers

PRIORITIZE SAFETY

  • Consider using a safer device. If you think that someone is monitoring your computer, tablet or smart phone, try using a different device that the person hasn’t had physical or remote access to in the past and doesn’t have access to now (like a computer at a library or a friend’s phone). This will be the most likely way to reduce the risk of being monitored by this person.
  • Get more information. Navigating violence, abuse and stalking can be very difficult and dangerous. Anti-violence workers in your area can tell you about options and local resources, and help you create a plan for your safety. You can call your local anti-violence program to be connected with a support worker near you.
  • Trust your instincts. Abusers, stalkers, and perpetrators are often very determined to maintain control over women and technology is one of many tools they use to do this. If it seems like the person knows too much about you, they could be getting that information from a variety of sources, like monitoring your devices, accessing your online accounts, tracking your location or gathering information about you online.
  • Strategically plan around your tech. When perpetrator misuse technology, it’s often a natural reaction to want to throw away devices or close online accounts to make it stop. However, some abusive individuals may escalate their controlling and dangerous behavior if they feel they’ve lost access to the victim. So before removing a hidden camera that you’ve found, or a GPS tracker, think through how the perpetrator may respond and plan for your safety. For example, some women choose to use a safer device for certain interactions, but also keep using the monitored device as a way to collect evidence.

IDENTIFY THE ABUSE

  • Look for patterns. Take some time to think through what kind of technology may being used to stalk, monitor, or harass you. For example, if the perpetrator has hinted that they are watching you, think about what they know.

Do they only know what you are doing in a certain area of your home? If so, there may be a hidden camera in that room.

If you suspect you’re being followed, is it just when you’re in your car, or is it also when you are on foot? If it’s just in your car, then there may be a device hidden in your car. If it’s everywhere, it may be something you are carrying with you, such as your phone or a tracker in your bag.

Narrowing down the potential source of technology can help you create a safety plan and to document the abuse. Read more about Assessing for Technology-Facilitated Violence.

  • Document the incidents. Documenting a series of incidents can show police or the court a pattern of behavior that fits a legal definition of stalking or harassment. Documentation can also help you see if things are escalating, and help you with safety planning. For more information, check out Documentation Tips for Women Experiencing Technology-Facilitated Violence.
  • Report the incidents. You may also want to report the incidents to law enforcement or seek a Peace Bond or Family Protection Order. If the harassing behavior is online, you can also report it to the website or app where the harassment is happening. If the behavior violates the platform’s terms of service, the content may be removed or the person may be banned. It’s important to recognize that reporting content may remove it completely so it should be documented prior to reports for evidence.

STEPS TO INCREASE SECURITY

  • Change passwords and usernames. If you think your online accounts are being accessed, you can change your usernames and passwords using a safer device. Once you’ve updated the account information, it’s important not to access those accounts from a device you think is being monitored. You can also consider creating brand new accounts, such as a new email address with a non-identifying username instead of your actual name or other revealing information. It’s important to not link these new accounts to any old accounts or numbers, and not to use the same password for all of your accounts. Read more tips about Password Safety.
  • Check your devices & settings. Go through your smartphone, apps, and online accounts to check the privacy settings making sure that other devices or accounts aren’t connected to yours and that any device-to-device access, like Bluetooth, is turned off when you’re not using it. Make sure you know what each of your apps are and what they do. Delete any apps on your device that you’re unfamiliar with or that you don’t use. Look for spikes in data usage – these may indicate that monitoring software such as spyware may be in use.
  • Get a new device. If you suspect that your actual device is being monitored, the safest thing may be to get a new device with an account that the perpetrator doesn’t have access to. A pay-as-you-go phone is a less expensive option. Put a passcode on the new device and don’t link it to your old cloud accounts like iCloud or Google that the person might have access to. Consider turning off location and Bluetooth sharing. You also might keep the old device so that the perpetrator thinks you are still using it and doesn’t try to get access to the new device.
  • Protect your location. If the perpetrator seems to always know where you are, they might be tracking you through your smartphone, your vehicle or by using a location tracker. You can check your smartphone, apps and accounts to see if location sharing is turned on and update the settings to best suit your needs. You can also call your wireless provider to ask if any location sharing services are in use, especially if you were/are on a family plan with the perpetrator. Location tracking through your car might be through a roadside assistance or safe driver service. If you are concerned about a hidden tracking device in your car or other belongings, a law enforcement agency, private investigator or a car mechanic may be able to check for you. It’s important to safety plan and document evidence before removing a device or changing the perpetrator’s access to your location information.
  • Consider cameras and audio devices. If you suspect that you’re being monitored through cameras or audio recorders, it may be happening through hidden devices, gifts received from the perpetrator or, even, everyday devices like webcams, personal assistants (such as Google Home or Alexa) or security systems. If you’re concerned about hidden cameras, you may consider trying a camera detector, though some will locate only wireless cameras, not wired cameras or vice versa. Everyday devices or gifts may be able to be secured by changing account settings or passwords. Built-in web cameras can be covered up with a piece of removable tape (although this only addresses the camera, not the spyware on the computer). Remember to consider making a safety plan and documenting evidence before removing devices or cutting off the perpetrator’s access.

STEPS TO INCREASE PRIVACY

  • Protect your address. If you’re concerned about someone finding your home address, you might open a private mail box. (Note that this is most helpful if you have recently moved or the perpetrator doesn’t already know your address.) Tell friends and family not to share your address, and be cautious around giving it out to local business. Also, look into what information is public in your community if you were to purchase a home so you know your options.
  • Limit the information you give out about yourself. Most everything we do these days asks for personally identifying information—whether it’s to make a purchase, open a discount card, or create an online account. The information we provide is often sold to third parties, and later ends up online in search engines and with data brokers. When possible, opt out of information collection, or only provide the minimum amount necessary. You can get creative – for instance, instead of using your first and last name, use your first and last initials. You can also use a free virtual phone number, such as Google Voice, to give yourself an alternative number to share when you need to.
  • Control your offline & online privacy. Our Technology Safety and Privacy Toolkit has Online Privacy & Safety Tips, including more information about changing settings on your electronic devices, social media accounts such as Facebook and Twitter, and your home WiFi Follow those steps to increase your privacy and decrease risks for the perpetrator to misuse those technologies, locate you, or monitor your activity.

 

©2019 BC Society of Transition Houses, Technology Safety Project.

Adapted from and in cooperation with the Safety Net Technology Project at the National Network to End Domestic Violence, United States

Download this page in PDF

Safety Check!

If you think someone is monitoring your devices, visit this webpage from a computer, tablet or smartphone that isn’t being monitored.

EXIT NOW from this website and delete it from your browser history.

Find out more with our Technology Safety Quick Tips