- Computers create records in hundreds of ways of everything you do on the computer and on the Internet.
- If you are in danger, please try to use a safe computer where someone abusive does not have direct access, or remote (hacking) access.
- It might be safer to use a computer in a public library, at a community technology center (CTC) www.ctcnet.org (national directory), at a trusted friend’s house, or at an Internet cafĂ©.
- If you think your activities are being monitored, you are probably right. Abusive people are often controlling and want to know your every move. You don’t need to be a computer programmer or have special skills to monitor someone’s computer activities – anyone can do it and there are many ways to monitor.
- Computers can provide information about what you look at on the Internet, the emails you send, and other activities. It is not possible to delete or clear all computer “footprints”.
- If you think you may be monitored on your home computer, you may want to avoid using that computer or Internet access; or, choose to use “safer” Internet surfing.
Example: If you are planning to flee to New York, don’t look at classified ads for jobs and apartments, or bus tickets for New York on a home computer or any computer an abuser has physical or remote access to. Use a safer computer to research an escape plan.
If you are in danger, please:
- Call 911, or
- Call the National Domestic Violence Hotline at: 1-800-799-SAFE.
Email is not a safe or confidential way to talk to someone about the danger or abuse in your life; please call the above hotline or DVI directly at 717-273-7190 or toll free at 1-888-686-0451.
“Corded” phones are more private than cell phones or cordless phones.