SAFETY ALERT
If you are in danger, call 911.
There is always a computer trail, but you can
leave this site quickly.

Safety Planning
Safety planning should be dynamic, changing with your changing circumstances. Forms can be used for guides and should not be seen as the whole process of safety planning.

Safety plans for domestic violence, sexual assault, dating violence, and stalking are similar in many regards. Each focuses on looking at options, developing strategies and accessing formal and informal resources. However, there are differences that should be taken into account depending on the kind of violence you experienced.

Stacks Image 96
SAFETY ALERT:
There is always a computer trail, but you can leave this site quickly.
Safety planning is a process. It becomes a way of thinking when you are living a situation that can be harmful to your safety.
Anonymous Advocate
One of your best resources for safety planning is your advocate.

Be sure to talk with your advocate about your safety.
They will help you think about options for improving safety and identifying strategies for quick responses as necessary.

Safety and Technology

If you think your activities are being monitored, they probably are. Abusive people are often controlling and want to know your every move. You don't need to be a computer programmer or have special skills to monitor someones computer and Internet activities anyone can do it and there are many ways to monitor with programs like Spyware, keystroke loggers and hacking tools.

It is not possible to delete or clear all the "footprints" off your computer or online activities. If you are being monitored, it may be dangerous to change your computer behaviors such as suddenly deleting your entire Internet history if that is not your regular habit.

If you think you may be monitored on your home computer, be careful how you use your computer since an abuser might become suspicious. You may want to keep using the monitored computer for innocuous activities, like looking up the weather.
Use a safer computer to research an escape plan, look for new jobs or apartments, bus tickets, or ask for help.

Email and Instant/Text Messaging (IM) are not safe or confidential ways to talk to someone about the danger or abuse in your life. If possible, please call a hotline instead. If you use email or IM, please use a safer computer and an account your abuser does not know about.

Computers can store a lot of private information about what you look at via the Internet, the emails and instant messages you send, internet-based phone and IP-TTY calls you make, web-based purchases and banking, and many other activities.
Stacks Image 81
Stacks Image 77
It might be safer to use a computer in a public library, at a community technology center (CTC), at a trusted friends house, or an Internet Cafe.