- If you are in immediate danger, call 911.
- For help at any time, call our 24-Hour hotline: Violence Intervention Project Crisis Line: 1-800-660-6667
Email is not a safe or confidential way to talk to someone about the danger or abuse in your life; please call one of the above hotlines or Violence Intervention Project at 1-800-660-6667 instead.
- Computers create records in hundreds of ways of everything you do on the computer and on the Internet.
- If you are in danger, please try to use a safer computer where someone abusive does not have direct access, or even remote (hacking) access.
- It might be safer to use a computer in a public library, at a community technology center (CTC) org (national directory), at a trusted friend’s house, or at an Internet café.
- If you think your activities are being monitored, you are probably right. Abusive people are often controlling and want to know your every move. You don’t need to be a computer programmer or have special skills to monitor someone’s computer activities – anyone can do it and there are many ways to monitor.
- Computers can provide a lot of information about what you look at on the Internet, the emails you send, and other activities. It is not possible to delete or clear all computer “footprints”.
- If you think you may be monitored on your home computer, you might consider no home Internet use or “safer” Internet surfing. Example:If you are planning to flee to Califonia, don’t look at classified ads for jobs and apartments, or bus tickets for California on a home computer or any computer an abuser has physical or remote access to. Use a safer computer to research an escape plan.
- “Corded” phones are more private than cell phones or cordless phones.