*********** Security Alert***************
Please note that computer use can be monitored by an abuser, and there are ways for an abuser to access your email and to find out what sites you have visited on the Internet. It is impossible to completely clear all data related to your computer activity.
If you are in danger, please use a computer that the abuser cannot access (such as a public terminal at a library, community center, or domestic violence organization), and call your local domestic violence organization and/or the National Domestic Violence Hotline at 1-800-799-SAFE for help. For a list of local and national resources click on the State and Local Programs link and enter your state in the drop-down menu.
Please note that computer use can be monitored by an abuser, and there are ways for an abuser to access your email and to find out what sites you have visited on the Internet. It is impossible to completely clear all data related to your computer activity.
If you are in danger, please use a computer that the abuser cannot access (such as a public terminal at a library, community center, or domestic violence organization), and call your local domestic violence organization and/or the National Domestic Violence Hotline at 1-800-799-SAFE for help. For a list of local and national resources click on the State and Local Programs link and enter your state in the drop-down menu.
Safety When Using Email
1. Can the abuser access my email account?
2.What safety steps should I take even if I think the abuser does NOT have access to my email account?
3.What should I do if I think the abuser can access my email account?
4. How do I know if I am sending email from my account or from the abuser’s account when I click on an email link that I found on a website?
5. What should I do if I receive threatening or harassing emails from the abuser?
6. Safety when browsing the Internet
SAFETY WHEN USING EMAIL
Can the abuser access my email account?
Maybe. There are a number of ways the abuser could have access to your email account:
If you share an email account with the abuser, s/he will be able to read any of the emails in your account.
If you use a Web-based email program like Gmail or Yahoo, your email account may be visible to someone who visits those websites on your computer unless you properly log out. Just closing your browser is not enough - you must first log out of your account to make sure that when the abuser goes to the email programs website, your personal account information won’t be on the screen
If you use of one these Web-based email programs, the abuser may be able to access your email account if s/he knows your email address and password.
Note: Some people's computers save their email address and password for them. If your computer has your email address and password saved, anyone with access to your computer can read your email.
If you use a computer-based email program like Outlook, Outlook Express, Eudora or Apple Mail, anybody who has access to your computer can read your email.
If the abuser knows your email address, remember to not open any email attachments sent from the abuser and to not reply to an email sent by the abuser using your new email account, as these actions may let the abuser install spyware on your computer and track your email messages.
Most computers have a function called "AutoComplete," which stores information you've typed on your computer in the past. For example, if AutoComplete is turned on, when you go to type something into a search engine such as Google, a pop-up box will appear and list the things you've searched for in the past. (You may also see this pop-up box when entering your credit card information or your address into an online form.)
If you have AutoComplete turned on, the abuser may be able to access your email account even if you haven't told him/her your email address or password.If you're not sure whether the abuser has access to your email account, for your safety it's best to act like s/he does, and avoid sending emails you wouldn't want him/her to see.
Can the abuser access my email account?
Maybe. There are a number of ways the abuser could have access to your email account:
If you share an email account with the abuser, s/he will be able to read any of the emails in your account.
If you use a Web-based email program like Gmail or Yahoo, your email account may be visible to someone who visits those websites on your computer unless you properly log out. Just closing your browser is not enough - you must first log out of your account to make sure that when the abuser goes to the email programs website, your personal account information won’t be on the screen
If you use of one these Web-based email programs, the abuser may be able to access your email account if s/he knows your email address and password.
Note: Some people's computers save their email address and password for them. If your computer has your email address and password saved, anyone with access to your computer can read your email.
If you use a computer-based email program like Outlook, Outlook Express, Eudora or Apple Mail, anybody who has access to your computer can read your email.
If the abuser knows your email address, remember to not open any email attachments sent from the abuser and to not reply to an email sent by the abuser using your new email account, as these actions may let the abuser install spyware on your computer and track your email messages.
Most computers have a function called "AutoComplete," which stores information you've typed on your computer in the past. For example, if AutoComplete is turned on, when you go to type something into a search engine such as Google, a pop-up box will appear and list the things you've searched for in the past. (You may also see this pop-up box when entering your credit card information or your address into an online form.)
If you have AutoComplete turned on, the abuser may be able to access your email account even if you haven't told him/her your email address or password.If you're not sure whether the abuser has access to your email account, for your safety it's best to act like s/he does, and avoid sending emails you wouldn't want him/her to see.
What safety steps should I take even if I think the abuser does NOT have access to my email account?
If you believe that the abuse does NOT have access to your email account, here are a few steps that you may want to take anyway, to try to keep your email account secure:
If you believe that the abuse does NOT have access to your email account, here are a few steps that you may want to take anyway, to try to keep your email account secure:
- Make sure you have a password the abuser will not be able to guess. Pick a password that does not contain obvious information (such as your name, birthday, Social Security number, pet's name, etc.), which the abuser could guess. It may also be a good idea to change your password regularly. If you are not sure how to change the password on your email account, you can likely find that information by going to “help” or “?”.
- Do not write your password down. Make sure you change your computer settings so that it does not save your username (email address) and password. Your computer may ask you if you want to save your username and password after you enter it. Make sure to click on "no."
- When you are finished using your email, always log out or sign out. If you do not hit "log out" or "sign out," your email account may still be open due to a feature called AutoComplete, even if you close the window. See Can the abuser access my email account? for more information on AutoComplete.
- If you do decide to give the abuser your email address, remember to not open any email attachments sent from the abuser or to reply to an email sent by the abuser using your new email account, as these actions may let the abuser install spyware on your computer and track your email messages.
What should I do if I think the abuser can access my email account?
If the abuser has access to your email account or computer, s/he may be able to read the emails you send and receive, even if you delete them.
Therefore, to send and receive emails that you do not want others to see, you may want to set up an alternate email account that the abuser doesn't know about. There are a number of free, Web-based e-mail services that you can use. When signing up for a new email account, do not use any of your real identifying information if you wish to remain private and anonymous. Here is a list of a few free, web-based email programs:
Gmail: www.gmail.com
Hotmail: www.hotmail.co
AOL Mail: http://mail.aol.com
Yahoo!Mail: http://mail.yahoo.com
Mail.com: www.mail.com
Hushmail: www.hushmail.com
Mail City: http://mail.lycos.com
Fastmail: www.fastmail.fm
Keep in mind that the abuser may still be able to read your email if you create a new account if you do not log out properly or if you choose a password that s/he can guess or find. The safest way to use a new email address is from a computer that the abuser does not have any access to.
Note: If you do decide to give the abuser your email address, remember to not open any email attachments sent from the abuser or to reply to an email sent by the abuser using your new email account, as these actions may let the abuser install spyware on your computer and track your email messages.
Did you find this information helpful? back to topHow do I know if I am sending email from my account or from the abuser’s account when I click on an email link that I found on a website?
As you are browsing the Internet, you may come across an email address that you can click on in order to send an email to that address -- something that looks like this: [email protected].
If you share a computer with the abuser and click on an email link, you may be sending the email from the abuser's email address without even knowing it. This could put you in danger since whoever you wrote to might try to write you back, but will be writing to the abuser's email address instead.
It is safer to copy the email address and paste it directly into a new message from your own email account.
If the abuser has access to your email account or computer, s/he may be able to read the emails you send and receive, even if you delete them.
Therefore, to send and receive emails that you do not want others to see, you may want to set up an alternate email account that the abuser doesn't know about. There are a number of free, Web-based e-mail services that you can use. When signing up for a new email account, do not use any of your real identifying information if you wish to remain private and anonymous. Here is a list of a few free, web-based email programs:
Gmail: www.gmail.com
Hotmail: www.hotmail.co
AOL Mail: http://mail.aol.com
Yahoo!Mail: http://mail.yahoo.com
Mail.com: www.mail.com
Hushmail: www.hushmail.com
Mail City: http://mail.lycos.com
Fastmail: www.fastmail.fm
Keep in mind that the abuser may still be able to read your email if you create a new account if you do not log out properly or if you choose a password that s/he can guess or find. The safest way to use a new email address is from a computer that the abuser does not have any access to.
Note: If you do decide to give the abuser your email address, remember to not open any email attachments sent from the abuser or to reply to an email sent by the abuser using your new email account, as these actions may let the abuser install spyware on your computer and track your email messages.
Did you find this information helpful? back to topHow do I know if I am sending email from my account or from the abuser’s account when I click on an email link that I found on a website?
As you are browsing the Internet, you may come across an email address that you can click on in order to send an email to that address -- something that looks like this: [email protected].
If you share a computer with the abuser and click on an email link, you may be sending the email from the abuser's email address without even knowing it. This could put you in danger since whoever you wrote to might try to write you back, but will be writing to the abuser's email address instead.
It is safer to copy the email address and paste it directly into a new message from your own email account.
What should I do if I receive threatening or harassing emails from the abuser?
You should print and save any threatening or harassing email messages the abuser sends you, as they may be used as evidence of his/her abuse in court or with the police. To be able to prove that the abuser sent these messages, you may have to print out the messages with the “header,” which shows the account information of the sender of the email.
Additionally, depending on the content of the messages and how many s/he sends, s/he may be committing a crime, such as stalking or harassment. You can report any threatening or harassing emails to the police. For more information on online harassment, please see our Stalking/Cyberstalking page. To read the definitions of any harassment or cyberstalking crimes in your state, you can go to our Crimes page and enter your state in the drop-down menu.
Threatening or harassing emails may also be a basis for a restraining order against the abuser. To read about the types of restraining orders available in your state, select your state from the drop-down menu on our Restraining Orders page
Please visit www.WomensLaw.org for more information how to protect yourself
You should print and save any threatening or harassing email messages the abuser sends you, as they may be used as evidence of his/her abuse in court or with the police. To be able to prove that the abuser sent these messages, you may have to print out the messages with the “header,” which shows the account information of the sender of the email.
Additionally, depending on the content of the messages and how many s/he sends, s/he may be committing a crime, such as stalking or harassment. You can report any threatening or harassing emails to the police. For more information on online harassment, please see our Stalking/Cyberstalking page. To read the definitions of any harassment or cyberstalking crimes in your state, you can go to our Crimes page and enter your state in the drop-down menu.
Threatening or harassing emails may also be a basis for a restraining order against the abuser. To read about the types of restraining orders available in your state, select your state from the drop-down menu on our Restraining Orders page
Please visit www.WomensLaw.org for more information how to protect yourself
Safety When Browsing The Internet
- 1. Can the abuser see what websites I have visited? Is there spyware on my computer?
- 2. How can I make it less likely that the abuser will find my personal information on the Internet?
- 3. Can I permanently delete my Facebook profile?
- 4. Is there anything I can do to cut back on the amount of my personal information that gets onto the Internet in the first place?
- 5. I’m planning on moving. How can I keep my new address confidential?
SAFETY WHEN BROWSING THE INTERNET
Can the abuser see what websites I have visited? Is there spyware on my computer?
Yes. There are a number of different ways that the abuser can tell what websites you have visited:
National Domestic Violence Hotline at 1-800-779-SAFE (7233) or (TTY) 1-800-787-3224
Can the abuser see what websites I have visited? Is there spyware on my computer?
Yes. There are a number of different ways that the abuser can tell what websites you have visited:
- Your computer automatically saves a list of pages that you have visited in your Internet history and cache files (data that is temporarily stored on your computer such as websites, graphics etc.).
- Your computer may save copies of some of the websites you have visited in something called a
- temp file.
- Some websites contain “cookies,” files that automatically save onto your computer that show which websites you've visited, and any information you may have entered onto the site, such as your name, address etc. You can prevent cookies from saving onto your computer by changing the privacy settings on your Internet browser, which are often located in the "Tools" or "Options" menu.
- If your computer has an AutoComplete function and it's turned on, your computer may remember things you have typed into your web browser.
- The abuser may have installed spyware on your computer, which may keep track of where you have been on the Internet and who you have sent email to. To read more information about spyware, such as how to detect it, and what to do about it, you can read Who's Spying on Your Computer?
- which was written by the National Network to End Domestic Violence's Safety Net Project.
- There are things you can do to hide your Internet activity, such as deleting your Internet history, but be aware that if the abuser has access to your computer, s/he may be able to check and see that you've done so. It is impossible to completely hide your tracks -- especially if the abuser knows a lot about computers, since there are other ways Internet activity can be monitored. The safest way to find information on the Internet is at a computer that the abuser cannot access. Try a domestic violence organization in your area, a local library, a community center, a friend's house, or another computer that you know is not monitored.
National Domestic Violence Hotline at 1-800-779-SAFE (7233) or (TTY) 1-800-787-3224
How can I make it less likely that the abuser will find my personal information on the Internet?
There is no way to completely remove all of your personal information from the Internet. However, here are a few steps you can take to remove as much of it as you can.
First, you should try to delete as much of your personal information off the Internet as you can on your own. You may want to write down all of the websites that contain any of your personal information (for example: Flickr, Facebook, an old blog, etc.) and go through and change your privacy settings or delete personal information that you do not want on the Internet. If you are not sure where your information appears, you may want to use a search engine such as Google to enter your name and see what comes up. Then you can go to those sites to see if your personal information is listed and delete it if you can. For additional information about this please read our page on Safety with Social Media.
Second, if there are websites that contain some of your personal information that you cannot delete yourself, you can ask the person in charge of the site (the “webmaster”) to remove the information for you. Most of the time you will be able to find a contact email address on the site and email the webmaster directly to request that the information be taken down. If you can’t find the webmaster’s email address on the site, look for a phone number or mailing address and contact the website that way. If it is not done the first time you request it, follow up and contact them again.
Can I permanently delete my Facebook profile?
Yes - but this cannot be done by just “deactivating” your account. When you deactivate your account, your entire profile (photos, interests, friends, etc.) are still saved and may still be found during an Internet search. To delete your entire profile permanently:
Yes - but this cannot be done by just “deactivating” your account. When you deactivate your account, your entire profile (photos, interests, friends, etc.) are still saved and may still be found during an Internet search. To delete your entire profile permanently:
- Go to this address: http://www.facebook.com/help/contact.php?show_form=delete_account
- Click “Submit” and follow the instructions
- Your account will be deactivated for two weeks. If you don’t log in during that time, your profile will be deleted permanently.*
Is there anything I can do to cut back on the amount of my personal information that gets onto the Internet in the first place?
Yes - there are a few things you can do. Using a made-up name and email address when you post any sort of comments on blogs or other sites that are accessible to the public can cut down on sites that the abuser can find if s/he searches for you on the Internet.
Before buying anything off of the Internet, check to make sure that the site is secure. The site’s web address should start with https:// and there should be a lock icon on the page somewhere (a little picture of a padlock). If you only put your information into a secure website, you can decrease the chances that an abuser who knows how to get information from an unsecured site can get access to your personal information. If you are particularly concerned about the abuser accessing your personal information through the Internet, you might consider asking a friend or family member to purchase items for you online using his/her name and address.
If asked by a website if they can share your information with “associates of the site” or “selected partners,” say “No.” If you agree to let them share your information, you will have no control over how any site that is given your information will use it.
Be aware of how much identifying information you are posting on any of your social networking sites like Facebook, Instagram, or blogs. Please read Safety with Social Media. Remember to consider what information you want everyone, including an abuser, to be able to see. If you moved to get away from the abuser, there is a possibility s/he could identify your location through pictures, videos, or general information on profiles. If you post information to the Internet from your mobile device, it is possible that the picture has what is called "geotagging". Geotagging is data imbedded in the image that contains your general or exact location.
With this feature, many applications may collect and share your location information. However, many smartphones give you the option of managing your location sharing under the “settings.” You can pick and choose which applications may access your location or you can opt to turn off the location setting altogether. Minimizing the location access can also help increase the battery life on your phone. If your phone doesn’t offer specific location-sharing settings, choose carefully when downloading new apps so you’re not sharing your location unknowingly.
To find instructions on disabling geotagging, you can search for “disable geotagging” along with the name of the type of electronic device you have in your Internet search engine.
Also, anytime you buy a magazine subscription, give your name and phone number to a cashier at a store, or provide your personal information to any company, that information could find its way onto the Internet. Think carefully before giving out your personal information to anyone.
Yes - there are a few things you can do. Using a made-up name and email address when you post any sort of comments on blogs or other sites that are accessible to the public can cut down on sites that the abuser can find if s/he searches for you on the Internet.
Before buying anything off of the Internet, check to make sure that the site is secure. The site’s web address should start with https:// and there should be a lock icon on the page somewhere (a little picture of a padlock). If you only put your information into a secure website, you can decrease the chances that an abuser who knows how to get information from an unsecured site can get access to your personal information. If you are particularly concerned about the abuser accessing your personal information through the Internet, you might consider asking a friend or family member to purchase items for you online using his/her name and address.
If asked by a website if they can share your information with “associates of the site” or “selected partners,” say “No.” If you agree to let them share your information, you will have no control over how any site that is given your information will use it.
Be aware of how much identifying information you are posting on any of your social networking sites like Facebook, Instagram, or blogs. Please read Safety with Social Media. Remember to consider what information you want everyone, including an abuser, to be able to see. If you moved to get away from the abuser, there is a possibility s/he could identify your location through pictures, videos, or general information on profiles. If you post information to the Internet from your mobile device, it is possible that the picture has what is called "geotagging". Geotagging is data imbedded in the image that contains your general or exact location.
With this feature, many applications may collect and share your location information. However, many smartphones give you the option of managing your location sharing under the “settings.” You can pick and choose which applications may access your location or you can opt to turn off the location setting altogether. Minimizing the location access can also help increase the battery life on your phone. If your phone doesn’t offer specific location-sharing settings, choose carefully when downloading new apps so you’re not sharing your location unknowingly.
To find instructions on disabling geotagging, you can search for “disable geotagging” along with the name of the type of electronic device you have in your Internet search engine.
Also, anytime you buy a magazine subscription, give your name and phone number to a cashier at a store, or provide your personal information to any company, that information could find its way onto the Internet. Think carefully before giving out your personal information to anyone.
I’m planning on moving. How can I keep my new address confidential?
It is difficult to really keep your new address completely confidential, but there are some things you can do to lessen the number of individuals or businesses that have access to it.
Many states now have address confidentiality programs set up for victims of domestic violence, sexual harassment, and stalking. Generally, in these programs, all your mail will be sent to a safe location and will then be forwarded to your new address so that you do not have to give your new address to anyone. To find out more about the program in your specific state: type “address confidentiality program” plus the name of your state into a search engine such as Google. If your state has a program like this, it might be a better option than filling out a change of address form with the post office. The U.S. Postal Service enters all of these addresses into the National Change of Address Database, which would likely provide them to marketing companies, lenders, magazines, etc. The more companies that get your information, the higher the chance that your new address could end up on the Internet and in the hands of the abuser
For more information regarding your rights, please visit our partners website by clicking on the link below. .
It is difficult to really keep your new address completely confidential, but there are some things you can do to lessen the number of individuals or businesses that have access to it.
Many states now have address confidentiality programs set up for victims of domestic violence, sexual harassment, and stalking. Generally, in these programs, all your mail will be sent to a safe location and will then be forwarded to your new address so that you do not have to give your new address to anyone. To find out more about the program in your specific state: type “address confidentiality program” plus the name of your state into a search engine such as Google. If your state has a program like this, it might be a better option than filling out a change of address form with the post office. The U.S. Postal Service enters all of these addresses into the National Change of Address Database, which would likely provide them to marketing companies, lenders, magazines, etc. The more companies that get your information, the higher the chance that your new address could end up on the Internet and in the hands of the abuser
For more information regarding your rights, please visit our partners website by clicking on the link below. .
Copyright ©2013 The Diane L. Parker Educational Resource Fund. All Rights Reserved
See Our Privacy Policy
See Our Privacy Policy
If you are in danger call 911 or reach the The National Domestic Violence Hotline at 1−800−799−SAFE(7233) or TTY 1−800−787−3224.