Technology Safety Plan: A Guide for Survivors and Advocates
This guide includes information about safety planning with survivors of domestic and sexual violence, stalking and trafficking in situations of technology abuse.
Create an account to save and access your bookmarked materials anytime, anywhere.
An Online Resource Library on Domestic & Sexual Violence
This guide includes information about safety planning with survivors of domestic and sexual violence, stalking and trafficking in situations of technology abuse.
This paper highlights published literature and survivor's reports on the use of technology in intimate partner stalking. It includes safety strategies and a resource list for victim advocates.
U.S. Postal Service
65 FR 3857-3859 (effective: Feb. 24, 2000)(codified as 39 CFR Part 265)
Published:2000 January 25
Fearing for their safety, victims of domestic violence who leave their abusers often need to keep their addresses and other contact information confidential. With the Internet making personal information more accessible than ever, the state of California has passed legislation that helps victims of abuse keep their addresses and other contact information out of the public domain.
Some starting points:
Why Cookies Came to Be
You simply type in the web address OR cut and paste text into the BabelFish text box.
To try it, go to:
http://www.babelfish.altavista.com/
You may want to also try the new BabelFish version at:
http://babel.altavista.com/translate.dyn
The languages presently available to translate to/from are English, French, German, Italian, Portuguese, and Spanish.
This publication provides U.S. national information for victims of domestic violence, harassment and stalking about their options in blocking telephone calls using "Caller ID", "Taking a Call", "line blocking", and "per call blocking".
The print version of this information is available as a 5.5" by 8" inch laminated card with Spanish (Espanol) information on one side and English information on the other.
This paper focuses on the nature of help-seeking emails and recommends that a strategic plan be developed to address safety, confidentiality and liability concerns of online advocacy. It explores some of the implications around responding to requests from survivors online.
When safety planning, advocates and survivors are encouraged to familiarize themselves with a growing number of technology options. It is important to consider ways technological tools might be used to help increase a survivor's safety and privacy, as well as to anticipate ways an abuser might misuse a tool to perpetrate further harm (e.g. to monitor communications or activities, to impersonate, etc.). This page provides a few examples but is not reflective of the myriad of safety and privacy issues that can be impacted by technology (e.g.