Technology Safety 2017-10-16T14:03:53+00:00

Staying Safe While Using Technology

Landline

When you have finished speaking with a SASHAA advocate from a land line, hang up and then lift the receiver, dial any number and hang up again. This way if someone presses the redial button on that phone they won’t be connected to our crisis line.

Cell Phone*

Cell phones can be a beacon, tracking your exact location in real time. Call and text history can be retrieved without you realizing it or by a tech-savvy perpetrator. Additionally, a location tracking device (GPS) can be placed on your purse or other possessions. After speaking with a SASHAA Advocate from a cell phone, delete the call from your call log. Please keep in mind that although the international crisis line is toll-free, it will still use your cell phone minutes.

Internet Usage

If you are residing with the perpetrator or may see them again in the coming days or weeks, the safest way to look for resources online is to use a public computer that the perpetrator does not have access to, such as a public terminal at a library, a community center or a sexual assault/ domestic violence organization. If you must use a computer that the perpetrator has access to, please read the following instructions on how to stay safe online.

Please select your browser below for instructions on how to clear the SASHAA web site to minimize risk after viewing. Please Note: This will not erase information from spyware or key-logging devices.

Internet Explorer

Firefox

Safari

Opera

Chrome

Social Media Accounts*

Only post things you want the public to see or know. Once it’s online, it’s no longer under your control. Be protective of your personal information. Your phone numbers and addresses enable people to contact you directly, and things like your birth date, the schools you attended, your employer and photos with landmarks may make it easier for someone to find where you live, hang out, or go to school. Set boundaries and limits. Tell people not to post personal information, negative comments or check-ins about you on social media. Ask people not to post or tag pictures if you’re not comfortable with it. Keep your passwords private – there is no need to share passwords to social media accounts with anyone.

*Be diligent about not saving passwords or staying signed into public computers.

Email Accounts

Change all your passwords immediately if you think the perpetrator may have seen you entering your password into an email, social media account, or another online account. If you have a friend in an abusive relationship DO NOT post information about them without getting their permission. You could jeopardize their safety or location.

*Information on staying safe with cell phones and social media is from The National Hotline, www.thehotline.org.

Translate »

Your computer activities might be impossible to erase. If someone might be monitoring you, please use a safer computer or call our hotline for more information.

You have Successfully Subscribed!