Tech abuse and tech safety resources

Whether you’re a survivor of tech abuse or a professional working with a survivor, the resources below will equip you to understand how to use different devices, apps, websites and networks safely. Click on the links below to see the list of guides and tips relevant to you.

 

 

Guides and tips for survivors

Click on the titles below to download PDFs of these resources, with the exception of the Twitter and Facebook guides which are hosted on our US partner NNEDV Safety Net’s external website. 

Technology safety quick tips summarises different types of technologies that can be used to facilitate abuse. There is also information about how the devices can be recognised and how to lower the risk they pose.

Documenting tech abuse – Documenting experiences of abuse can be crucial for many reasons. This resource provides information on how and what to record.

Technology abuse log template is a useful tool to organise experiences of technological abuse in a simple and concise format.

 

 

 

Technology safety quick tips summarises different types of technologies that can be used to facilitate abuse. There is also information about how the devices can be recognised and how to lower the risk they pose.

Documenting tech abuse – Documenting experiences of abuse can be crucial for many reasons. This resource provides information on how and what to record.

Technology abuse log template PDF is a useful tool to organise experiences of technological abuse in a simple and concise format.

 

 

iPhone privacy and security guide – Mobile phones are the personal devices that many of us take everywhere, so it’s important to ensure we use them safely and securely. This guide details all aspects of iPhone privacy and security, alongside helpful tips about how to increase safety on an iPhone.

Staying safe on Facebook – This guide sets out important privacy and security features on Facebook and how they can be used to stay safe on the platform. Facebook has over a billion users so it’s important to make sure that what we post is only viewable by those we want to share information with.

Safety and privacy on Twitter – This guide provides useful information on how Twitter account holders can review and increase their privacy and security features. It also explains how to respond if you experience abuse on the platform.

Online gaming: privacy risks and strategies – Worldwide, adults and children play games online. With such a wide and diverse user base, it is important to stay safe. This guide describes instances where privacy could be compromised on online gaming platforms. Information is also provided on how to maximise security and privacy across online gaming devices and accounts.

Spyware, surveillance and safety details the increasing risk posed by software and hardware that has been created solely to gather information from a technology user non-consensually. The resource also explains how breached privacy and security can be re-established.

Technology safety plan – Each experience of technological abuse is unique to the individual. One of the first steps towards ending these experiences is by creating a safety plan. This resource sets out a simple plan on how a technology user can identify the abuse and increase their safety, security, and privacy.

 

 

 

Choosing and using apps: Considerations for survivors – There are many smartphone and tablet apps available that attempt to address the issues of domestic violence, sexual assault, and stalking. Survivors often need to take into account their safety and privacy when communicating and accessing information; this is true when determining which app to download and use. This resource lists questions and considerations to go through when looking at using any of these available apps.

Internet of Things (IoT) Home Automation: Survivor Privacy Risks & Strategies – ‘Smart devices’ are becoming more integrated into our lives; in our cars, homes and at work. Though they make life easier, it is important to know how they can be misused to facilitate tech abuse. This resource explains what these devices are, how they can be connected, and steps to set them up with survivors’ privacy and safety in mind.

 

 

 

 

 

 

 

 

 

 

 

 

 

Tools for professionals working with survivors

Click on the titles below to download PDFs of these resources.

Assessing for technology misuse and privacy concerns with sexual assault survivors is aimed at professionals who support sexual assault survivors, but it may also be useful if you have experienced sexual assault and are concerned you may be experiencing technological abuse. This guide helps you identify if technological abuse is happening, how it is experienced and the different ways it can occur.

Assessing for technology abuse and privacy concerns supports best practice when working with individuals who have experienced technological abuse. It details safety planning, how technology is used to facilitate abuse and includes questions to ask clients who may be experiencing this type of abuse.

Internet browser privacy tips – Most of us use an internet browser to access the majority of resources online. Therefore, it is important to ensure security and privacy is at its best at the very base level of technology use. This resource describes how users can review the security and privacy settings on a variety of internet browsers.

 

 

About tech abuse

Click on the titles below to download PDFs of these resources.

Blog – A glimpse from the field: how abusers are misusing technology – This article details what forms of technology are used most often by abusive individuals and the current legal response to these crimes.

Technology and sexual assault – Sexual abuse perpetrators uniquely use technology to facilitate the crimes they commit. This page explores the ways that sexual abusers may use technology and how online culture can even support these crimes.

 

 

 

 

 

 

 

Thanks to NNEDV Safety Net for allowing us to share these invaluable resources.

 

Further information on tech abuse

A close-up of a man on a laptop

What is tech abuse?

Modern technology gives abusers ever-growing ways to control, isolate, humiliate and dominate women using the tools of everyday life.

Learn more >

A male hand holding an iPhone and pointing towards the screen.

Our tech abuse service

Find out about our nationwide tech abuse and empowerment service and the support we offer survivors.

Learn more >

Euleen and Beth, survivors of tech abuse

Survivors’ stories

Hear the stories of two survivors of tech abuse, Euleen and Beth, who spoke at our Technological Abuse Project launch in 2017.

Learn more >