Fillable Printable Technology Safety Plan
Fillable Printable Technology Safety Plan
Technology Safety Plan
T
s
a
a
t
T
t
i
G
v
V
H
L
u
i
N
G
s
o
This documen
stalking and t
and suggestio
a particular te
thorough safe
Trust your ins
technology, it
n maintaining
Get more info
victim advoca
Violence Hotl
Human Traffic
Look for patte
used to haras
n your house
Narrowing do
General safet
sources. The a
online accoun
Use a
activit
you’re
Chang
the sa
monit
non‐id
accou
Check
conne
allow
don’t
indica
locati
nt contains ge
rafficking in s
ons. For more
echnology or
ety plan.
stincts. If you
t is possible a
g control and
ormation. Na
ate to discuss
ine at 1‐800‐7
cking hotline
erns to ident
s, stalk, or mo
? If you suspe
own the poten
ty tips. If it se
abuser could
nts or gatherin
safer compu
ties try using
e doing.
ge passwords
afe computer
tored. Consid
dentifying use
unts.
k your cell ph
ected to the p
s apps to be d
know what it
ate that a pro
on settings o
A Gui
eneral inform
situations of t
specific safet
situation and
suspect that
nd likely. Abu
technology i
vigating viole
your options
799‐7233, the
at 1‐888‐373
ify misused t
onitor you. Fo
ect you’re be
ntial source o
ems like the
be monitorin
ng informatio
uter/device. I
a safer comp
s and usernam
r. Don’t use th
der creating b
ername inste
hone settings
phone and th
downloaded,
t is, delete th
ogram may be
r third‐part a
Technolo
ide for Sur
ation about s
technology ab
ty planning st
d please conta
t the abusive
users, stalkers
s another too
ence, abuse, a
s and to help y
e National Se
‐7888.
technology. C
or example, if
ing followed,
of technology
person know
ng your comp
on about you
f you suspect
puter, tablet,
mes. Change
he new usern
rand new acc
ead of your ac
. Go through
at Bluetooth
make sure yo
e app. Pay at
e in use on yo
pplications.
ogy Safety
rvivors and
safety plannin
buse. As an ov
trategies, ple
act a local vic
person is har
s and perpetr
ol for them to
and stalking is
you plan for y
xual Assault H
Carefully try to
f you suspect
is it just whe
will help you
s too much a
uter or cell p
online. Or th
t that the abu
or device to p
the usernam
ame and pas
counts, such a
ctual name an
your phone’s
and location
ou know wha
ttention to ex
our phone con
y Plan
d Advocate
ng with victim
verview, this
ease consult o
tim advocate
rassing, stalki
rators can be
o misuse.
s very difficul
your safety. Y
Hotline at 1‐8
o figure out h
t you’re being
en you’re in y
u create a mo
bout your ac
hone. The pe
e stalker cou
usive person i
prevent the a
mes and passw
ssword on the
as a new ema
nd don’t use t
s settings to e
access is limi
at each of the
xcessive batte
nstantly. Call
es
ms of domesti
document pr
one of our saf
e who can hel
ng, or monito
incredibly pe
lt and danger
You can call th
800‐656‐4673
how or which
g watched, is
your car or wh
re precise saf
tivity, it could
erpetrator cou
ld be monito
is monitoring
abusive perso
words of your
e computer th
ail address. A
the same pas
ensure that o
ited or turned
e apps do; if y
ery or data us
your phone c
ic and sexual
rovides gener
fety planning
lp you with a
oring you usin
ersistent and
rous. Work w
he National D
3, or the Natio
technology i
it in a particu
herever you g
fety plan.
d be from a v
uld be access
ring your loca
g your compu
on from seein
r online accou
hat is being li
lso consider u
ssword for yo
other devices
d off. If your
you don’t use
sage as that m
carrier to ask
Page 1
violence,
ral tips
guides to
more
ng
creative
ith a
Domestic
onal
s being
ular room
go?
ariety of
sing your
ation.
ter
g what
unts on
kely
using a
ur
aren’t
phone
it or
may
about
D
lo
i
R
r
a
T
t
t
r
t
e
Get a
new p
inexp
settin
Have
may c
enfor
Limit
identi
Limit
Get a
know
confid
if you
Hidde
the in
what
the ab
some
may b
built‐
came
Document the
og for an exa
ncidences wi
Report the in
report. If the
abusive conte
Think about y
technology. H
they feel their
remove the ca
to use a safer
evidence.
new cell pho
phone with an
ensive altern
ngs are turned
your car che
consider havin
cement to ch
the informat
ifying informa
the informat
P.O. Box or i
ing your actu
dentiality pro
have recentl
en cameras. I
nformation sh
you’re doing
busive person
detectors wi
be dangerous
in web camer
ra with a piec
e incidences.
mple. Somet
ll show a patt
cidences. If y
harassing beh
ent.
your safety. O
However, for s
r control is th
amera or the
computer, d
A Gui
one. If you su
n account tha
ative. Put a p
d off.
cked. If the a
ng your car ch
heck the car th
tion you give
ation—wheth
ion that you p
inquire about
ual address, yo
ogram, check t
ly moved or t
f you suspect
hared by the a
when you’re
n. Some came
ill only locate
s, limit what y
ra, consider d
ce of removab
. If possible, d
imes, a haras
tern of behav
you feel safe i
havior is onlin
Oftentimes, m
some abusive
hreatened and
GPS. Incorpo
evice or phon
Technolo
ide for Sur
spect that yo
at the abusive
passcode on y
busive perso
hecked for hi
horoughly.
out about yo
her it is to ma
provide since
t Address Co
ou can open a
to see if you
the abusive pe
t cameras in y
abusive perso
e in the living
era detectors
wireless cam
you do in the
disabling the c
ble tape.
document the
ssing or stalki
vior that can b
n doing so, re
ne, report it t
many victims w
e individuals,
d you are rem
orate that into
ne, but not di
ogy Safety
rvivors and
our cell phone
e person does
your phone an
n knows whe
dden location
ourself. Most
ake a purchas
e you don’t kn
nfidentiality
a private mai
can be a part
erson doesn’t
your home, fi
on (for examp
room) or gift
may be help
meras or wired
room that is
camera when
e stalking or h
ng incident b
be proved as
eport the inci
o the website
want to stop
this may esca
moving all acc
o your safety
sabling to the
y Plan
d Advocate
e is being mon
sn’t have acce
nd ensure tha
ere you are w
n devices. Ask
t things we do
se, open a dis
now who else
Programs. If
il box or if you
t of that prog
t already kno
igure out whe
ple, the abusiv
s to you or m
pful in locating
d cameras. Ei
being monito
n you aren’t u
harassing beh
y itself may s
criminal stalk
idences to law
e. Many sites
the abusive b
alate their co
cess. Think ab
planning. Fo
e monitored
es
nitored, the s
ess to. A pay‐
at location se
whenever you
k a trusted m
o these days a
count card or
e they will sha
you’re conce
ur state has a
ram. (Note th
ow your addre
ere the came
ve person see
members of yo
g the camera
ither remove
ored. If your c
using it. Or yo
havior. Check
seem minor. B
king or harass
w enforceme
have links w
behavior by g
ntrolling and
bout what ma
r example, so
device to con
safest thing is
‐as‐you‐go ph
ettings and Bl
are in your c
mechanic or la
asks for perso
r create an ac
are your infor
erned about s
an address
hat this is mo
ess.)
ra is hidden b
ems to know
our househol
s, but remem
the camera o
computer/tab
ou can cover t
out NNEDV’s
But a series o
sment.
nt and ask fo
here you can
getting rid of t
dangerous b
ay happen if y
ome survivors
ntinue collect
Page 2
s to get a
hone is an
uetooth
ar, you
w
onally
ccount.
rmation.
someone
st helpful
based on
details of
d from
mber that
or, if that
blet has a
the
s stalking
of
r a police
n report
the
behavior if
you
s choose
ing