When it comes to domestic violence, sexual assaults, and stalking, many people do not realize the dangers that lie within the many types of technology in our culture. Having a safety plan that prepares you for physical safety is an excellent way to start being safe, but there are many other ways that an abuser can make contact with you.
Using technology related to cell phones, GPS, computers and internet, such as social medias and certain websites, is another way that an abuser can continue the cycle of power and control. Using these methods can allow the abuser to "keep tabs" on where you are going, what you are doing, who you are with, and more. Cell phones and messaging systems can allow the abuser to continue to reach out to their victim with apologies (meant to lure the victim back into a relationship), harrassment, and threats.
The additional information provided on the drop down tabs to the left are meant to help prevent an abuser from remaining in control by instilling fear through technology over their victim. With technology, it is important that privacy and security is not breached, but to understand that there are programs such as Key Loggers and others that can "hack" into email accounts, social media accounts, or other files.
We have broken down the type of technology as follows: Cellular Phones GPS Computers Internet - Social Media and Emails Click on the links above or go to the drop down tabs for more information. If you have questions on any of these suggestions, please contact a Safe Space advocate on the 24 hour Crisis and Information Hotline at 406-782-8511.