Using Instant Messaging and Chat Rooms Safely
This article offers information on the dangers associated with tools that allow real-time communication.& It also provides tips on how to use these tools safely.
Create an account to save and access your bookmarked materials anytime, anywhere.
An Online Resource Library on Domestic & Sexual Violence
This article offers information on the dangers associated with tools that allow real-time communication.& It also provides tips on how to use these tools safely.
This article describes what social engineering and phishing attacks are and provides tips on how to avoid being a victim and what to do if you are a victim of these attacks.
"This report provides an overview of promising violence prevention initiatives across the nation, with special focus on the primary prevention of violence affecting youth and adult intimate partner violence. Specific attention is given to initiatives directed at particularly vulnerable populations, including racial/ethnic groups, immigrants, low-income populations, girls and women, and others.
For more information on Technology Safety and Violence Against Women, please contact Safety Net: the National Safe & Strategic Technology Project of the National Network to End Domestic Violence Fund.
This article describes several tactics employed by abusers to track victims using technology. 'Technology may be ushering in a golden age of stalking, in which predators use GPS, cellphones and other devices to track and terrorize.'
This article describes efforts to use technology to assist victims of domestic violence through online protection order forms, electronic filing, statewide registries, automated victim notification programs, and other applications. Includes many resources.
This tip sheet includes steps to take to guard personal information from appearing in directory listings and public records. Includes a detailed listing of data vendors with complete contact information for each.
Discusses the privacy implications of making public records containing personal information available on the Internet. Lists 9 negative consequences and offers 11 recommendations for safeguarding personal privacy while upholding public policy requirements.
This paper examines the laws, policies and procedures surrounding technological crimes; addresses the lack of technology crime victims' services; and recommends the creation of reporting, referral and support service for victims of Internet crimes.
This article contains an overview of cyberstalking and offers tips for those who have been victimized.