My Technology Safety Plan

My Technology Safety Plan

 

·       Trust your instincts. If you suspect the abusive person knows too much, it is possible that your phone number, computer, email, driving or other activities are being monitored.

 

·       Plan for safety. Navigating violence, abuse and stalking is very difficult and dangerous.

 

·       Take precautions if your have a “techy” abuser. If computers and technology are a profession or hobby for the abuser/stalker.

 

1.     If I feel my computer is not safe, I can ____________________________________________________ (It may be safe to use a computer at a public library, community center, or internet café). I will not use my own.

 

2.     If I suspect someone can access my email or IM, I can ________________________________________ (Create new email/IM from a free web-based email account, use non identifying name & account information).

 

3.     If I am using a cell phone provided by the abuser, I can _______________________________________ (Keep the phone off when not in use, switch the location feature off/on, get a different phone).

 

4.     If someone knows my password & pin number, I can _________________________________________ (Change them quickly and frequently).

 

5.     Minimize use of cordless phones & baby monitors, I can ______________________________________ (Turn off baby monitors and use traditional corded phone for sensitive conversations, sometimes others can hear a conversation with the use of cell phones or baby monitors).

 

6.     When having private calls, arranging escape plans, I will not ___________________________________ (Using shared phones/family phones, billing records might reveal my plans).

 

7.     Many court systems and government agencies publish records to the internet;

I will _____________________________________________ (check).

I can _____________________________________________ (Ask agencies to seal or restrict access to my files for safety).

 

8.     When asked for my address, I can ________________________________________________________ (I do not have to give out my address and can have a private mailbox).

 

9.     Major search engines may have links to my contact information, I can ___________________________ (Search for my name, check phone directory pages, unlisted numbers might be listed if I gave my number to anyone).

 

 

Signature___________________________________________                        Date _________________________         

 

Revised 3-2014 kjm