- Computers create records in hundreds of ways of everything you do on the computer and on the internet.
- If you are in danger, please try to use a safer computer where someone abusive does not have direct access or remote (hacking) access .
- It might be safer to use a computer in a public library at a community technology center (CTC) www.ctnet.org for a national directory, at a trusted friends house, or at an Internet Cafe.
- If you think your activities are being monitored, you are probably right. Abusive people are often controlling and want to know your every move. You don't need to be a computer programmer or have special skills to monitor someone's computer activities-- anyone can do it and there are many ways to monitor.
- Computers can provide a lot of information about what you look at on the Internet, the emails you send, and other activities. It is not pos sible to delete or clear all computer "footprints".
- If you think you may be monitored on your home computer, consider no home internet use or "safer" Internet surfing. Example: If you are planning to flee to another state, don't look at classified ads for jobs and apartments or bus tickets for that state on a home computer or any computer an abuser has physical or remote access to. Use a safer computer to research an escape plan.
Facebook Safety Guide: Privacy & Safety on Facebook: A Guide for Survivors of Abuse
| Print |