NRCDV Logo
  • Adult Children Exposed to Domestic Violence
  • Runaway & Homeless Youth Toolkit
  • Prevent Intimate Partner Violence
  • Violence Against Women Resource Library
  • Domestic Violence and Housing Technical Assistance Consortium
  • Domestic Violence Awareness Project
  • National Resource Center on Domestic Violence

img-user-picture.png

 Create an account to save and access your bookmarked materials anytime, anywhere.

  create account  |   login

An Online Resource Library on Domestic & Sexual Violence

Material Listing

Intimate Partner Violence, Technology, and Stalking

This research note describes the use of a broad range of technologies in intimate partner stalking, including cordless and cellular telephones, fax machines, e-mail, Internet-based harassment, global positioning systems, spy ware, video cameras, and online databases.

Hang Up on Harassment: Dealing with Cellular Phone Abuse

With cell phones now the primary way of communicating, harassing phone calls can be especially distressing and disruptive. This fact sheet offers steps that victims of harassing calls, text messages, or spam can take to increase safety.

Address Confidentiality Programs

Address Confidentiality Programs (ACPs) are programs administered by individual states enabling victims of domestic violence, and sometimes victims of sexual assault and/or stalking) to keep their current address hidden and use an alternate mailing address for a variety of public and official processes. The specific procedures and qualifications vary by state. The document below outlines the protections of various states' ACPs, the legislation that created or supports these ACPs and other relevant program information.

Computers and Networks

The ways in which agencies and innovative partnerships use their computers and networks impacts the safety and confidentiality of services for victims and survivors, and their children. This tip sheet briefly highlights: basics about how computers and networks work; how agencies and partnerships are or might use computers and networks; and, some benefits, risks and things to consider including issues of: technical support, essentials, training, disposal, cost, security, authorized access and user names, backups, and, security in colocated sites.

Myths & Realities of Identity Change

This 2 page handout addresses common issues for victims who are considering changing their identity (e.g. name, U.S. social security number, birth certificate, etc.) as part of an attempt to remain safe and hidden from an abuser or stalker. It dispels seven common myths by describing realities of what can happen after an identity change and by providing introductory tips on protecting your identity.

Online Privacy & Safety Tips

This 1-page handout provides tips for preventing sensitive and personal information from making its rounds on the Web. It highlights email, passwords, social networks, online accounts, and safe web browsing.

Selecting a Database

This page includes resources and information on how agencies can select the most secure and survivor-centered database for their program.

Sexting

This short tip sheet defines sexting, highlights different forms of sexting, and discusses how sexting is relevant to anti-violence agencies, partnerships and communities.