Click here for tips on how to stay safe while using the internet
Domestic Violence often includes a range of behaviors that include threats, intimidation, and physical violence. Batterers establish a pattern to control victims by creating financial and psychological dependence and isolation to keep victims away from their friends and loved ones. This pattern of control includes limiting the use of technology. Abusers often limit victims’ access to transportation, monitor telephone calls and letters and engage in stalking to track the victim’s location. As technology has expanded to include cell phones, internet, email, and GPS devices, abusers have found ways to use these tools to frighten, stalk, monitor, and control their victims.
Did you know?
- Someone can monitor your computer use without you knowing it?
- A “history” cannot be completely erased from your computer?
- Your cell phone use can be monitored?
- A global positioning system (GPS) can be placed on your car, in your purse or in your cell phone to track you?
- Did you know that e-mail is like a postcard and can be intercepted?
If you think your activities are being monitored, they probably are. Abusive people are often controlling and want to know your every move. You don't need to be a computer programmer or have special skills to monitor someone's computer and Internet activities - anyone can do it and there are many ways to monitor with programs like Spyware, keystroke loggers and hacking tools. It is not possible to delete or clear all the "footprints" of your computer or online activities.
Click here for some quick tips about internet safety.
• “Intimate Partner Violence, Technology, and Stalking” : This article describes a broad range of technologies in intimate partner stalking, including cordless and cellular telephones, fax machines, e-mail, internet-based harassment, global positioning systems, spy ware, video cameras, and online databases.