Internet Usage

On average, 24 people per minute are victims of rape, physical violence or stalking by an intimate partner in the United States — more than 12 million women and men over the course of a year.
~The National Coalition Against Domestic Violence (NCADV)​

National Domestic Violence Hotline

800-799-7233

If you think your activities are being monitored, they probably are. Abusive people are often controlling and want to know your every move. You don’t need to be a computer programmer or have special skills to monitor someone’s computer and Internet activities – anyone can do it and there are many ways to monitor with programs like Spyware, keystroke loggers and hacking tools.​

If you think your activities are being monitored, they probably are. Read More... Collapse

It is not possible to delete or clear all the “footprints” of your computer or online activities. If you are being monitored, it may be dangerous to change your computer behaviors such as suddenly deleting your entire Internet history if that is not your regular habit.​

It is not possible to delete or clear all the “footprints” of your computer or online activities. Read More... Collapse

If you think you may be monitored on your home computer, be careful how you use your computer since an abuser might become suspicious. You may want to keep using the monitored computer for innocuous activities, like looking up the weather. Use a safer computer to research an escape plan, look for new jobs or apartments, bus tickets, or ask for help.​

If you think you may be monitored on your home computer, be careful how you use your computer since an abuser might become suspicious. Read More... Collapse

Email and Instant/Text Messaging (IM) are not safe or confidential ways to talk to someone about the danger or abuse in your life. If possible, please call a hotline instead. If you use email or IM, please use a safer computer and an account your abuser does not know about.​

Email and Instant/Text Messaging (IM) are not safe or confidential ways to talk to someone about the danger or abuse in your life. Read More... Collapse

Computers can store a lot of private information about what you look at via the Internet, the emails and instant messages you send, internet-based phone and IP-TTY calls you make, web-based purchases and banking, and many other activities.​

Computers can store a lot of private information about what you look at via the Internet, Read More... Collapse

It might be safer to use a computer in a public library, at a community technology center (CTC) at a trusted friend’s house, or an Internet Café.​

It might be safer to use a computer in a public library, Read More... Collapse

If your life or your children's life is in danger, DO NOT WAIT, start planning your escape before it's too late.