Computer & Internet Safety
IF YOU ARE IN DANGER OR NEED EMERGENCY ASSISTANCE, CALL 9-1-1 IMMEDIATELY.
If you are looking for sexual assault survivor advocacy and other support services, please click here for a list of services near you. There is always a computer trail leading back to websites you visit, but you can click the “ESCAPE!” here or the link at the top of the page to be immediately redirected to Google.com.
Abusive people are often controlling and insist on knowing everything you do, which can include what you look at on your computer. Special skills or expertise are not required to monitor computer activities – anyone can do it and there are numerous ways an abusive person can monitor what information has been accessed on a computer.
It is impossible to erase all traces of your online activities. If an abusive person is monitoring your computer, it may be dangerous to suddenly delete your entire internet browsing history, as this will not cover all of your tracks and the abusive person may become suspicious. Additionally, some web browsers feature a “private browsing” or “incognito” mode, which (when activated) claim to not save information about websites you visit. However, you should not solely rely on this to ensure your privacy, because they will not hide your activities from some types of monitoring.
Use a safer computer if you can. It may be a better idea to use the monitored computer for innocuous purposes (e.g.: checking the weather) while using a different computer (at a public library, a trusted friend’s house, internet cafe, etc.) to research escape plans and advocacy services.
Instant Messaging (IM) and email are neither safe nor confidential. The safest way to get help is to call an advocacy hotline from a phone the abusive person cannot access. If you must use IM or email, use a safer computer and an IM or email account the abusive person does not know about.
This information was retrieved from: Source:
Copyright 2013 | Sexual Assault Task Force of Oregon