Tech Safety


Technology can be used to coerce, control, monitor, stalk or harass another person.

Exit Website
If someone suddenly appears when you are using our website and you don't want them to see what site you are on, click on EXIT WEBSITE and you will be redirected to 

Hide Online History
When you browse the Internet, the pages you link to and visit are downloaded onto your computer and stored as temporary files in folders on your hard disk and stored as 'History' files. If you're worried that other people may be able to see where you've been on the Internet, there are ways of removing these files and in some cases not even recording where you've been.

This depends upon which Browser you use (this is the programme you use to access the internet, for example Internet Explorer or Firefox) and there are different ways to do this for each programme. Please select which browser you are using by clicking on the appropriate link below and follow the instructions to hide to history of websites you have visited.


1) Recording - Planting audio or visual devices to monitor and record conversations and activities. For example, the iphone can be used as a listening device and air pods used as receivers.  This is done by turning on the 'live listen' feature on the iphone and then leaving the iphone and listening to conversations through the airpods while being in another room. 

2) GPS Tracking Devices - Using location trackers on the victim's phone to know their location e.g. using 'find my phone' or planting a small GPS-enabled device in a person's belongings or a car.

3) Smart Appliances - Spying through smart TVs, security systems or remotely controlling smart appliances around the home, including entertainment systems and household appliances. The abuser may switch them on and off to confuse and frighten the victim and even cause financial damage e.g. turn off electricity so the refrigerator goes off or turning up heating etc.

4) Children's Toys - Giving children 'smart' toys and games such as such Xbox, Playstation, teddy bears etc., and using the technology to spy on the victim.

5) Virtual Assistants - Accessing recordings from virtual assistants such as Alexa, Siri and Google Assistant including downloading transcriptions.

6) Calls, Texts & Emails - This can range from constantly calling, texting and sending messages to installing software on the victim's phone that allows monitoring of phone calls and messages.

7) Hacking Emails and Apps - Hacking into emails or using the victim's passwords to access emails, mobile apps they have signed up to and computers and Ipads.

8) Social Media - Posting information about the victim on social media to shame them and / or to incite others to troll or harass them.

9) Changing Phone Settings - Accessing mobile phone and changing phone settings to block particular numbers e.g. friends / family so calls / texts / whats app messages cannot be received.  Or even going further to change settings to prevent outgoing calls. 


1) Turn off location sharing - on any apps your use.

2) Recordings from virtual assistants - As virtual assistants keep a record of sounds, these devices could be useful to provide evidence of verbal or physical abuse. Try and access the recording by logging into the device account.  This should be done before the abuser deletes the history.

3) Turning off microphones - Check privacy settings on virtual assistants to prevent recordings or turn off the microphone when having sensitive conversations.

4) Social media accounts - Increase privacy through your settings.

5) Do not delete emails - this may contain important information such as the sender's IP address that can help to identify them.

6) Change passwords- of emails, social media and any devices such as 'smart' home security systems etc.

7) Device Privacy Settings - Check settings of any technology given as a gift or where abuser had access to it e.g. mobile phones, ipads, laptops, children's toys / games, home appliances etc., such as location tracker, whether particular numbers have been blocked.

8) Log incidents - Record dates and times and save messages including taking screen shots, as this can help to establish a pattern of abuse.

Our Supporters