If you are in danger, please use a safer computer that someone abusive does not have director or remote (hacking) access to.
* If you think that your activities are being monitored, they probably are. Abusive people are often controlling and want to know your every move. You don’t need to be a computer programmer or have special skills to monitor someones computer and Internet activities – anyone can do it.
* It is not possible to clear or delete all the “footprints” of your computer or online activities. If you are being monitored, it may be dangerous to change your computer behaviors such as suddenly deleting your entire Internet history if that is not your regular habit.
* If you think you may be monitored on your home computer, be careful how you use your computer since an abuser might become suspicious.
* E-mail and text message are not safe or confidential ways to talk to someone about the danger or abuse in your life. If possible, please call a hotline instead. If you use e-mail or IM, please use a safer computer and an account your abuser does not know about.
* It may not be safe to use a computer in a public library, at a community center, at a trusted friends house or an Internet cafe.
Information taken from PCADV, http://www.pcadv.org/ 8/2012