Prioritizing Your Digital Safety:
- violenceprevention
- Jul 31
- 2 min read
Navigating technology when experiencing abuse can feel overwhelming, but your safety is paramount. Abusers often exploit digital tools to maintain control. This guide offers concise, immediate steps and key strategies to help you regain your privacy and security.
Urgent Steps for Immediate Safety
Use a safer device: If possible, use a new phone or computer the abuser has never accessed. Public library computers or a trusted friend's device are safer for sensitive tasks.
Contact a hotline: For immediate support and personalized safety planning, call the National Domestic Violence Hotline (1-800-799-SAFE) or text START to 88788. They can help you create a technology safety plan.
Use "Safe Exit" features: Many domestic violence websites have quick exit buttons (often a red "X" or double "Escape" key) to redirect to a harmless site if an abuser appears.
Core Strategies for Device and Account Security
Change ALL passwords on a safe device: Create strong, unique passwords for every account. Enable two-factor authentication, ensuring verification codes go to a new, secure email or device.
Create new, private accounts: Set up new email and social media accounts that the abuser has no knowledge of or access to.
Review and unlink shared accounts: Close or unlink any joint accounts (banking, phone plans, streaming, cloud storage, "Family Sharing" features) that the abuser could access.
Check device settings:
Location Services: Turn off location sharing unless absolutely necessary.
App Permissions: Delete unfamiliar apps and review permissions for all others.
Automatic Updates: Keep operating systems and apps updated for the latest security.
Consider a new device: If you strongly suspect your current device is compromised, a new, "clean" device is often the safest option.
Physical protection: Use physical covers for webcams and phone cameras when not in use.
Protecting Your Online Presence
Social media privacy: Set all profiles to the strictest privacy settings. Limit what others can see and approve all tags.
Be aware of public information: Understand that some personal information may be publicly available online (e.g., court records). Discuss privacy restrictions with a legal advocate at the VPC.
Check for email forwarding: Review your email settings for any unknown forwarding rules and disable them.
What to Look For (Signs of Monitoring)
Unexpected knowledge: The abuser knows private details they shouldn't.
Device changes: Passwords reset, new apps, or unusual restrictions.
Performance issues: Battery drains quickly, device overheating, or slow performance.
Constant location tracking: The abuser always knows your whereabouts.
Remember, you are not alone.
Trust your instincts. If something feels off, it likely is. Taking these steps can empower you to regain control over your digital life.
If you need assistance, we are here to help. Call us at 618-235-0892.
Comments