Internet. Safety. Connection.

Always remember to keep your safety in mind when contacting Project Hope and be sure to clear your browser history of content you wouldn’t want your partner to see, including this website.

Note: Our advocates are available 24/7 by phone to help you identify ways to take extra precautions when using technology.

  • Computer and cell phone use can be monitored without your knowledge.

  • History can never be completely erased from a computer or device, even if you browse in “private” or “incognito” mode.

  • Emails can be intercepted, like physical mail.

  • Global Positioning System (GPS) trackers can be placed in your car or on items like your purse or cell phone.

  • Some court systems publish their records online, which could contain compromising personal information like names or addresses.

 

We Are Here To Support You.

Learn more about what safety means to you.

 
 
  • Computers store information about the websites you visit. That means bills you pay and purchases you make are tracked, and messages or emails can be retrieved. You should always consider that a computer might be monitored when you use it and be careful about what you send others or post.

    Safe computers can be found at your local library, Internet cafe, Project Hope, workplace, or computer technology center. Avoid using shared computers when researching things like travel plans, housing options, legal issues, and safety plans. Using safe browsing practices (like using a VPN) can help prevent abusive partners from tracking your Internet history.

  • Email can be a useful way to connect with trusted friends and family members who may be aware of your situation. An abusive partner is likely to know this and may have access to your email account without your knowledge. To be safe, open an account your partner doesn’t know about on a safe computer and use that email for safety planning and sensitive communications.

    Use several different methods of communication when contacting people so that you’ll know if they tried to reach you elsewhere, and keep your monitored account active with non-critical emails in order to maintain appearances. Encrypted email services can offer an extra layer of security.

  • As technology has evolved, cell phones have become increasingly embedded in our daily lives. This provides quick access to resources and information, but it can also give other people instant updates on your whereabouts, habits, and activities. Cell phones can be used to track your location and retrieve call and text history.

    If you’re in an abusive relationship, consider purchasing a pre-paid phone and keep it in a safe place for private calls. Use a password on your phone and update it regularly. If you are concerned that your partner may be secretly monitoring your phone, consider taking it into a cell phone service center to check for any spyware that may be downloaded.

  • Posts on social media are never truly private, no matter what your settings are. Once it’s online, it’s no longer under your control. Be protective of your personal information and remember that phone numbers, addresses, handles, and personal details (birth date, schools attended, employers, and photos with landmarks) may make it easier for someone to reach you.

    Set boundaries and limits, and ask people not to post personal information, photos, or check-ins you aren’t comfortable with. Check your social media settings to make sure your privacy settings are strict, and disable the ability for other people to tag you in their photos or posts. Similarly, don’t post information about people without their consent – you could jeopardize their safety or the safety of others.