Victims and survivors of sexual violence are often concerned about maintaining their privacy concerning the assault or abuse. It’s important to realize that there are hundreds of ways that computers, smartphones and other devices can undermine your privacy. Everything you do on the internet can be tracked and recorded.
ASK CT is a user-friendly personal security and bystander intervention app that provides critical crisis and reporting resources. ASK CT is free, confidential and available on iPhone and Android platforms. It was made in partnership with Men Can Stop Rape and Verizon HopeLine.Learn More
If you think someone may be monitoring your internet activity, consider using a different computer: one at your local library, at a friend’s house, or at work.
Remember that email is not a confidential means of communication. To discuss confidential issues, you can call our statewide hotline to be connected with a sexual assault counselor in your area.
Review and delete emails as necessary in all folders: Inbox, Drafts, Sent, Deleted, Spam, Archived, etc.
Empty the Recycle Bin of your computer before shutting down. The Recycle Bin holds all deleted files until it is manually emptied.
Cell phones and cordless phones can be intercepted, allowing someone to overhear your conversation. Corded landline phones are more private.
Consider buying access to a Virtual Private Network. A VPN encrypts the data you send through the internet, making it more difficult for attackers to decipher your messages.
Take a look at the Privacy Settings on your apps and social media accounts, and configure them as necessary.
Change your passwords often and do not store them on your computer.
Choose passwords that are not easy to guess, such as a combination of letters and numbers.
Never use identifying information as your password: your mother’s maiden name, children’s names, your birthday or the last four digits of your social security number.
Keep all personal files on a separate disk and set options to require a password to access each folder or file.
Use a web-based email service like Yahoo or Gmail that you can access from anywhere. These systems are more strictly regulated and therefore may be safer than personal services like Outlook or AOL.
Review all the apps installed on your smartphone and tablet. If any apps look suspicious, read up about them online and determine if you should remove it from your device. Some apps can be deceptive and pose as harmless games or widgets, but can actually be secretly monitoring your activity.
When not in use, tape over any device that has a camera or microphone hole. Some devices, like laptops with built-in web cameras, can be hacked remotely to record audio or even video without your knowledge.