Technology Safety Plan
A Guide for Women Experiencing Violence and DFV/SA Agencies and Services
This document contains general information about safety planning with victims of domestic and sexual violence, stalking and trafficking in situations of technology abuse. As an overview, this document provides general tips and suggestions. For more specific safety planning strategies, please consult one of our safety planning guides to a particular technology or situation and please contact a local domestic violence or sexual assault service who can help you with a more thorough safety plan.
Trust your instincts. If you suspect that the abusive person is harassing, stalking, or monitoring you using technology, it is possible and likely. Abusers, stalkers and perpetrators can be incredibly persistent and creative in maintaining control and technology is another tool for them to misuse.
Get more information. Navigating violence, abuse, and stalking is very difficult and dangerous. Work with a specialist Domestic/Family Violence service to discuss your options and to help you plan for your safety. You can call the National Sexual Assault, Domestic Family Violence Counselling Service on 1800 RESPECT (1800 737 732).
Look for patterns to identify misused technology. Carefully try to figure out how or which technology is being used to harass, stalk, or monitor you. For example, if you suspect you’re being watched, is it in a particular room in your house? If you suspect you’re being followed, is it just when you’re in your car or wherever you go? Narrowing down the potential source of technology will help you create a more precise safety plan.
General safety tips. If it seems like the person knows too much about your activity, it could be from a variety of sources. The abuser could be monitoring your computer or mobile phone. The perpetrator could be accessing your online accounts or gathering information about you online. Or the stalker could be monitoring your location.
Use a safer computer/device. If you suspect that the abusive person is monitoring your computer activities try using a safer computer, tablet, or device to prevent the abusive person from seeing what you’re doing.
Change passwords and usernames. Change the usernames and passwords of your online accounts on the safe computer. Don’t use the new username and password on the computer that might be being monitored. Consider creating brand new accounts, such as a new email address. Also consider using a non?identifying username instead of your actual name and don’t use the same password for your accounts.
Check your mobile phone settings. Go through your phone’s settings to ensure that other devices aren’t connected to the phone and that Bluetooth and location access is limited or turned off. If your phone allows apps to be downloaded, make sure you know what each of the apps do; if you don’t use it or don’t know what an app is for, delete the app. Pay attention to excessive battery or data usage as that may indicate that a app may be in use on your phone constantly. Call your phone company to ask about location settings or third?party applications.
Get a new mobile phone. If you suspect that your mobile phone is being monitored, the safest thing is to get a new phone with an account that the abusive person doesn’t have access to. A pre-paid mobile phone is an inexpensive alternative. Put a passcode on your phone and ensure that location settings and Bluetooth settings are turned off.
Have your car checked. If the abusive person knows where you are whenever you are in your car, you may consider having your car checked for hidden location devices. Ask a trusted mechanic or the police to check the car thoroughly.
Limit the information you give out about yourself. Most things we do these days ask for personally identifying information—whether it is to make a purchase, open a loyalty card or create an account. Limit the information that you provide since you don’t know who else they will share your information.
Get a P.O. Box and become a Silent Elector. If you’re concerned about someone knowing your actual address, you can open a PO Box. You can apply to become a silent elector if you believe having your address on the Australian electoral roll would put you or your family’s safety at risk.
Hidden cameras. If you suspect cameras in your home, figure out where the camera is hidden based on the information shared by the abusive person (for example, the abusive person seems to know details of what you’re doing when you’re in the living room) or carefully check any gifts you or members of your household may have received from the abusive person. Some camera detectors may be helpful in locating the cameras, but remember that some detectors will only locate wireless cameras or wired cameras. Either remove the camera or, if that may be dangerous, limit what you do in the room that is being monitored. If your computer/tablet has a built?in web camera, consider disabling the camera when you aren’t using it. Or you can cover the camera with a piece of removable tape or a small bit of post-it note.
Document the incidences. If possible, document the stalking or harassing behavior. Sometimes, a harassing or stalking incident by itself may seem minor. But a series of incidences will show a pattern of behavior that can be proved as criminal stalking or harassment.
Report the incidences. If you feel safe in doing so, report the incidences to the police and ask for a police report. If the harassing behavior is online, report it to the website. Many sites have links where you can report abusive content.
Think about your safety. Often, victims want to stop the abusive behavior by getting rid of the technology. However, for some abusive individuals, this may escalate their controlling and dangerous behavior if they feel their control is threatened and you are removing all access. Think about what may happen if you remove the camera or the GPS. Incorporate that into your safety planning. For example, some survivors choose to use a safer computer, device or phone, but not disabling to the monitored device to continue collecting evidence.
For additional technology tip sheets and handouts, visit our website at development.wesnet.org.au/safetynetdocs