1. Computers create records in hundreds of ways of everything you do on the computer and on the Internet.
  2. If you are in danger, please try to use a safe computer where someone abusive does not have direct access, or remote (hacking) access.
  3. It might be safer to use a computer in a public library, at a community technology center (CTC) www.ctcnet.org (national directory), at a trusted friend’s house, or at an Internet cafĂ©.
  4. If you think your activities are being monitored, you are probably right. Abusive people are often controlling and want to know your every move. You don’t need to be a computer programmer or have special skills to monitor someone’s computer activities – anyone can do it and there are many ways to monitor.
  5. Computers can provide information about what you look at on the Internet, the emails you send, and other activities. It is not possible to delete or clear all computer “footprints”.
  6. If you think you may be monitored on your home computer, you may want to avoid using that computer or Internet access; or, choose to use “safer” Internet surfing.
    Example: If you are planning to flee to New York, don’t look at classified ads for jobs and apartments, or bus tickets for New York on a home computer or any computer an abuser has physical or remote access to. Use a safer computer to research an escape plan.

If you are in danger, please:

  1. Call 911, or
  2. Call the National Domestic Violence Hotline at: 1-800-799-SAFE.

Email is not a safe or confidential way to talk to someone about the danger or abuse in your life; please call the above hotline or DVI directly at 717-273-7190 or toll free at 1-888-686-0451.

“Corded” phones are more private than cell phones or cordless phones.