top of page

Tech Safety Pt. 1

Tech Safety Planning for Everyone

Technology can be very helpful for survivors of interpersonal violence by connecting people with resources and support networks. However, it is also important to consider when technology may be misused and have strategies for what to do if you feel your technology use is being monitored.

1. Trust your instincts. If you suspect the abusive person knows too much, it is possible they are monitoring your digital presence.

2. Take precautions if you have a “techy” abuser, especially if computers or technology are a profession or hobby for the abuser.

3. Change passwords, security questions, and pin numbers frequently. Think about anything that requires a password: banking, email, social media, etc.

4. Create new email or IM accounts. If you suspect that an abusive person has access to your email or instant messaging, consider creating new accounts from a safer computer or phone. Do not create new accounts from a computer the abuser could access. Use non-identifying name and account information (not YourRealName@email.com). Deleting accounts that the abusive person may be monitoring might result in them suspecting a new account.

5. Keep personal information private. Be cautious of what info is available to employers and colleagues. And, if you give out personal info when signing up for deals or services, it could be sold to a publicly accessible database.

6. Use a safer computer or cell phone. If anyone abusive has access to your computer or phone, they might be monitoring you. Phone logs or billing records could reveal plans to an abuser. Try to use a safer computer/phone when you look for help, a new place to live, banking, etc. It may be safer to use a friend’s device, or use a computer at a public library, community center, or your workplace, or use a donated or prepaid phone.

7. Turn off GPS on all electronic devices (cell phones, digital cameras, laptops, etc.). Follow user manual instructions. And consider turning off GPS for family members and children too.

8. Talk to family and friends about tech safety needs. Ask your friends/family not to post pictures, comments, or other information that may allude to your location or other personal information.

9. Be cautious of Spyware. Spyware programs can be hard to detect, downloaded onto a computer/phone quickly, and allow someone to track everything on a cell or computer. Some spyware can allow abusers to turn on webcams, take screenshots, etc. Clues that spyware may be on your device are:

• Physical access to the phone by an abusive person or someone they know. Most phone Spyware requires someone downloading it.

• If an abusive person knows more than they should about information in digital communications.

• Strange activity on the phone/computer, such as increased battery or data usage, the phone shutting down, or dropped calls. Note: Some spyware won’t cause any operation or function changes in a device. If you think your computer or phone has spyware, keep using it for simple things others already know about you. For searches related to safety, use a safer computer or phone. To remove Spyware from a phone, try resetting it to factory settings. Removing spyware from a computer is extremely difficult, and Spyware can be transferred with files to a new device. If you need access to a file on a new device, it’s best to put that file in a cloud-based location.

10. Be cautious of cordless phones and baby monitors. Abusers can use these to overhear conversations and plans.


Here's a Safety Checklist

Passwords

  • Make a list of all devices (i.e. laptop, cell phone, Fitbit, home security system, smart car, internet connected devices, Siri/Alexa, Bluetooth connected sound systems, etc.) and accounts (i.e. social media, email, online shopping, online food services, transportation apps, cloud accounts, fitness trackers, games, etc. Note which of these the abuser has access to, knows the passwords to, or may know the passwords to.

  • Think about what information is included on those accounts (i.e. personal address, phone number, home address, credit card information, personal messages, internet search history, communication about safety planning, etc.).

  • Change all passwords to unique passphrases that the abuser would not be able to guess. Avoid using things like the names of children or animals, important dates, old addresses or old phone numbers.


A passphrase is a sentence that is easy to remember but would not be easy to guess. Adding symbols of numbers for letters can make it even more difficult to guess.

For example: P@$$phra$$e$@reH@rdT00Gue$$


  • Do not use the same password for every account. Use a unique passphrase for each account or use a password manager.

  • Change the password to your home Wi-Fi.

  • For security questions on accounts, make up fake answers or do not use questions that the abuser would be able to guess, otherwise they may be able to access the account (i.e. instead of using your mother’s maiden name, make up an answer when they ask for your mother’s maiden name and answer with something different, but remember your fake answer).

  • Turn off all automatically saved passwords on all devices and accounts.

  • Sign out of all accounts and devices when not using them.

  • Use two-factor authentication on any app or account that allows for it. Two factor authentication requires you to enter a password that is sent to your phone or email to confirm that it is actually them accessing the account. For general information on two-factor authentication see HackBlossom: https://hackblossom.org/domestic-violence/defense/two-step-verification.html

  • See this website to see which common apps use two-factor authentication: https://twofactorauth.org/#communication

  • Print out or write down several two-factor authentication one-time use codes in case you lose your phone. Store them somewhere the abuser will not find them.

  • Do not use social media accounts to sign in to other accounts (i.e. “Sign in with Facebook” or “Sign in with Google” options).

  • Remove abuser’s emails or devices from shared accounts and as “Trusted devices” on your accounts.


Blocking, deleting, and unfriending

Consider blocking or unfriending the abuser’s email address, phone number, or social media contact. Ensure that you have collected all the evidence needed from those accounts before doing this. Certain programs will delete or not allow you to access conversations and information from the other person’s account once they have been unfriended, blocked or deleted from your account.

  • When deciding to block, delete or unfriend someone consider whether this may escalate the abuse. There may be benefits to having access to the abuser’s social media (such as knowing their location) that are worth considering.

  • Consider which of your friends and family may have your abuser on their accounts. Ask friends and family not to post information about you or photos of you online and not to share information with the abuser.


Stalking, tracking and monitoring 
  • Use a camera cover on all your devices’ cameras when you are not using them.

  • If the abuser is tracking your device or accounts, consider using a different device (i.e., a friend’s computer, a work device, or a computer at a library) to look up information and to begin planning how to make changes to your devices or accounts.

  • Consider what personal information is posted online (i.e., home address on a birthday event invitation, phone number was shared on a Facebook post, or a new work place was announced on LinkedIn) and decide whether to delete that information or make it private. Remember that other people could share that information with your abuser even if you have blocked them from your accounts.

  • Turn off or limit the location functions on your devices when not in use.

  • Turn off location functions like “Find my Phone” or “Find my Friends”.

  • Delete previously stored location history, especially before and arriving at domestic violence shelters or other safe spaces.

  • Do not “check in” to locations on social media.

  • Change privacy settings on apps and social media to more private settings.

  • Do not post photos containing metadata or background information that could alter the user to your location on social media.

  • One way to remove location based metadata on a photo is to take a screenshot of the photo and post the screenshot rather than the original photo that contains the metadata.

  • Remove abuser’s emails or devices from shared accounts and remove their device from “Trusted Devices” on all your accounts.

  • Check accounts for “Last Account Activity” or “Account Activity” to see if any unusual IP addresses are accessing the account.

  • If there is concern that the abuser has access to your accounts, consider using a P.O. Box for an address on online accounts and deliveries. Consider the risk of the abuser accessing credit card information or misusing the account if they have access.

  • Untether your phone or other devices from the abuser’s devices (i.e., Bluetooth stereo in their car or home, fitness notifications to their smartwatch, etc.).

  • Search belongings (i.e., purses, cars, jackets) for GPS tracking devices or other recording devices.

  • Examine any gifts or unusual items in the home, including children’s items, for hidden cameras or recording devices.

  • Consider what information is on your children’s devices and accounts (i.e., phones, video game systems, social media accounts) and what may be shared with your abuser.

  • Consider whether the abuser may have access to home security system information, such as access to the cameras or information when people are leaving or entering the home.

  • Consider using a device or program (i.e., network scanners, port scanners, RF signal detectors) that can detect certain hidden cameras to scan your Wi-Fi or homes.

  • Look through apps on the phone and delete any unfamiliar ones.

  • If you are concerned that your abuser may have installed spyware on your devices, you may want to have an IT specialist or law enforcement check the device for spyware. Remember that if spyware is installed on the device, the abuser may be able to see whatever is being done on the device, which may escalate abuse.

  • The Clinic To End Tech Abuse also has resources to help identify spyware on a device.


Signs that a device may have spyware on it:
  • Device running slowly

  • Battery draining

  • Data being used up

  • Device getting hot

  • Device lighting up when not in use

  • Clicks or odd sounds on calls

  • Takes a long time to shut down.


Keep your devices’ operating systems up to date.

These updates often patch any insecurities found on the software that hackers could misuse and spyware. Double check your privacy settings after an update to make sure the update did not change any of them.

  • Consider replacing devices entirely. If you decide to do this, you should not back up your devices from previous devices. This may transfer any spyware installed on the previous device.

  • Look for unusual hardware attached to desktop computers, key loggers are often attached between the keyboard and the desktop.

It should be noted that experienced hackers and IT engineers may be able to access the location of a device, even when it is turned off in the settings. If your abuser has an IT background, there can be additional challenges to tech-safety.


Alternate accounts

If the abuser has access to your accounts and there is no safe way to stop this at this moment (i.e., if they require you to share your passwords by threatening to hurt you otherwise), create an alternate email account or social media account that the abuser does not have access to for sensitive communication.

Do not sign into this account on your personal or shared devices. Use a work computer, library computer or friend’s computer. Cloud storage, shared accounts, unauthorized access.

  • Remove abuser from any shared accounts, devices, or plans.

  • Remove Bluetooth connections from the abuser’s devices (i.e., connected to their home stereo, smart car, etc.).

  • Consider what content is being automatically being uploaded or connected (i.e., calendars, iCloud storage for photos and texts, Fitbit, smart watches) and whether the abuser could gain access to these accounts or information.

  • Remove all devices except your devices from “Trusted Devices” on all accounts.

  • Check “Last Account Activity” on all accounts to see if an unusual IP address or device has been accessing the account. Search history

  • If the abuser has access to the device or account, they can check your search history.

  • If looking for help or resources, use a computer not in the home (i.e., a public computer, a friend’s computer, or a work computer).

  • Selectively delete internet search history.

  • Use “private” or “incognito” options so the search history is not being recorded.

  • Turn off cookies in the browser setting.


Software updates, firewall, and anti - virus software

Update your software regularly. This includes your mobile phones. These updates often patch any insecurities found on the software that hackers could misuse.

Enable firewalls and anti-virus software on all devices.


Evidence Collection

Create a log of all experiences of technology-facilitated violence, include information such as the time, date, abuser, evidence gathered, and other useful information.

Here's how to create a Technology-Facilitated Violence Log.


How to turn Snap Maps off

While you can’t disable Snap Maps as a feature, you can certainly control whether or not people can see your location. There are two ways to hide your location: When you open Snap Maps for the first time or in the settings menu. We’ll give you instructions for both. Opening Snap Maps for the first time:

When you first open the latest version of Snapchat you’ll be invited to zoom out of the camera image, this launches Snap Maps. At this juncture you’ll be taken to a welcome screen where you can either ‘Allow’ Snapchat to access your location or to ‘Exit Map’. If you choose to ‘Exit Map’ then your location will not be shared and you can effectively pretend that Snap Maps doesn’t exist.

However if you would like to continue then press ‘Allow’. Pressing this button will not start sharing your location, but simply take you to the next screen. You’ll then be taken to a screen explaining what Snap Maps does, simply tap ‘Next’. This is where things get important. You’ll see a ‘Find Your Friends’ screen, it is here that you can control your privacy settings.

Privacy options:

1. Ghost Mode - This makes your location invisible to everyone on Snapchat.

2. My Friends - This shares your location with your entire friends list and will update your location every time you open Snapchat.

3. Select Friends... - This lets you pick individual friends that you would like to share your location with. Once you’ve selected an option tap ‘Next’. At this point you’re all set up and Snap Maps is ready to use.


How to Turn It Off-

The Settings menu: If you or your child have already turned on the location feature in Snap Maps on and you want to turn it off you can do this easily through the Settings menu. Simply open Snap Maps and then tap on this icon in the top right-hand corner. This will bring up the Settings menu. The first option you’ll see is ‘Ghost Mode’, turn this on. That will stop Snapchat from sharing your location with anyone. Alternatively you can change who sees your location below by tapping on either ‘My Friends’ or ‘Select Friends...’

Tech Safety  Pt. 1

© 2025 Sojourn Shelter & Services, Inc.

Powered and secured by Wix

bottom of page