Behind the Screens: Reducing Tech Footprints

behind-screens-footprintsThis is a post in our Behind the Screens series, which explores issues related to digital abuse. This post was written by Lauren, a Hotline advocate.

When navigating an abusive relationship it is important to have safe access to online resources and communication. Sometimes an abusive partner might monitor computer usage by checking web browsing history or even using tracking software on the computer. Ideally, connecting online should be done on a safe computer that the abusive partner can’t access, such as the computer of a trusted friend or a public computer at a library or community center. When it is not possible to use the internet from a safe device, there are still ways to reduce the technological footprints left on your computer. (Keep in mind that there is no way to completely delete internet history. If your partner is using spyware on your device, they will likely still have access to your browsing history. Learn more about spyware in this post.)

Below we are going to explore safety options in four common web browsers. A web browser is the software that allows someone to connect to the internet, such as Internet Explorer or Safari. For each of the four browsers there are steps for how to delete all browsing history, delete selective browsing history, and use a private browsing mode that does not record browsing history. This information is based off the latest version of the browsers at the time this post is published. If you are unsure of which browser or version you are using, will help you identify your browser. If your browser is not listed below or you are using an older version of a browser, information on how to take these precautions may be found in the support section of your browser’s website.

Internet Explorer: Version IE 11

Private browsing mode is referred to as InPrivate Browsing. An InPrivate Browsing session needs to be activated each time a session is begun.

  1. Once a browser window is open select Tools from the browser’s menu
  2. Select Safety
  3. Select InPrivate Browsing to start an InPrivate Browsing session

Delete All Internet History

  1. Once a browser window is open select Tools or the Tool Icon from the top of the browser window.
  2. Select Safety
  3. Select Delete Browsing History
  4. A pop up will appear, select Delete

Selectively Delete History

  1. Click Favorites Button
  2. Select History Tab
  3. Select the options of how you would like to view your history. The options View by Date and View by Order Visited Today may be the most helpful.
  4. Right click on the site you would like to delete and select Delete

Safari: Version Safari 7

Private browsing mode is referred to as Private Browsing. A Private Browsing session needs to be activated each time a session is begun

  1. Select Safari from the top menu for the browser
  2. Select Private Browsing

Delete All Internet History

  1. Select History from the top menu for the browser
  2. Select Clear History

Selectively Delete History

  1. Select History from the top menu for the browser
  2. Select Show History
  3. Select the websites you would like to delete and then press Delete

Chrome: Version Chrome 39

Private Browsing mode is referred to as Incognito. An Incognito session needs to be activated each time a session is begun

  1. Select the Chrome Menu from the browser window. It looks like three horizontal lines and is usually in the top right of the browser
  2. Select New Incognito Window

Delete All Internet History

  1. Select the Chrome Menu from the browser window. It looks like three horizontal lines and is usually in the top right of the browser
  2. Select Tools
  3. Select Clear Browsing Data
  4. A pop up will appear and select what you want to have deleted
  5. Select Clear Browsing Data

Selectively Delete History

  1. Select the Chrome Menu from the browser window. It looks like three horizontal lines and is usually in the top right of the browser
  2. Select History
  3. Select the pages you would like to delete
  4. At the top right of the page select Remove Selected Items
  5. Select Remove

Firefox: Version Firefox 34

Private Browsing mode is accessed by opening a Private Window. A Private Window needs to be activated each time a session is begun

  1. Select the Firefox Menu button at the top of the browser. It looks like three horizontal lines.
  2. Select New Private Window

Delete All Internet History

  1. Select the Firefox Menu button at the top of the browser. It looks like three horizontal lines
  2. Select History
  3. Select Clear Recent History
  4. Select the time range that you would like to delete all history from
  5. Select Clear Now

Selectively Delete History

  1. Select the Firefox Menu button at the top of the browser. It looks like three horizontal lines
  2. Select History
  3. Select Show All History
  4. Hold down the Control key on your keyboard as you click on the website you would like to delete.
  5. Select Forget About the Site

Again, these are just some precautions you can take to help reduce your web footprint, but these steps don’t guarantee your safety. You know your situation best, so do what feels right for you. If you’d like to develop a personal safety plan, our advocates are here to help! Call us at 1-800-799-SAFE (7233) or chat via this website from 7am-2am CST everyday.


Behind the Screens: Spyware and Domestic Violence

behindthescreens-spywareThis is a post in our Behind the Screens series, which explores issues related to digital/online abuse.

Technology opens up so many possibilities to connect with people around the world, but unfortunately the other side of the coin is the potential for abuse. As we’ve been discussing in our Behind the Screens series, mobile devices and computers can become tools for an abusive partner to manipulate, control, and shame a victim. They can also be used to spy.

According to the National Network to End Domestic Violence, “spyware is a computer software program or hardware device that enables an unauthorized person (such as an abusive partner) to secretly monitor and gather information about your computer [or cell phone] use.” Spyware can track everything you do, from keystrokes, to the sites you visit, to documents you print, to messages you send. In some cases, a person does not need physical access to your device to install spyware, and it can be very difficult to detect.

Spyware is starting to play a larger role in cases of digital abuse, thanks to easy-to-install and inexpensive technology. Much of the spyware software and apps available today are aimed at parents for monitoring kids and teens, but there are companies that market their products specifically for spying on spouses or partners. This issue has become so prevalent in domestic violence cases that Senator Al Franken (D-MN) has introduced legislation that would ban mobile spying apps.

How can you tell if spyware is being used on your devices?

As we previously noted, spyware can be difficult to detect. However, if you think your activities are being monitored by your abusive partner, there’s a good chance you are correct. For example, your partner might:

  • know your whereabouts when you haven’t told them specifically where you’ve been

  • know things about your online search history even after you’ve deleted it

  • know about conversations with or messages you’ve sent to others

  • question you about topics you have personally researched but never discussed

Additionally, on a cell phone you might notice that the battery drains quickly or data usage spikes. These can all be signs that your devices are being monitored.

What can you do if you discover (or suspect) you are being tracked by spyware?

You might be tempted to get rid of your device or try and remove the spyware, but be aware that your abusive partner might retaliate as a result. Do not use a computer or cell phone that your partner has access to in order to research shelters, escape plans, or to call/chat with hotlines. Use a computer at a library, at a friend’s house or at work, or borrow a friend’s cell phone or work phone to make calls. Use your own devices for innocuous tasks (such as looking up the weather) so that your partner does not get suspicious of inactivity.

If you believe you are being monitored, or even if you’re not sure, try to find a safe phone or computer and call us at 1-800-799-7233 or chat online every day from 7 a.m. to 2 a.m. CST. We can help you safety plan and direct you to local resources.

Additional Resources:


“Help! My Ex is Harassing Me Online”

behindthescreens-harassmentThis is a post in our Behind the Screens series. Read the previous posts here and here

Breakups are a difficult time for any couple, but they can be an especially difficult and potentially dangerous time for survivors of abusive relationships. Even if you’re able to safely leave the relationship, the abusive partner can still cause harm from afar in a variety of ways. Technology and social media create new spaces where abuse can take place. This is called digital abuse, and it is just as unacceptable as any other form of abuse.

Even if your ex-partner did not exhibit abusive behaviors during the relationship, there’s still a possibility that feelings of anger, hurt, sadness, loneliness, or loss of control could lead them to become abusive online. They could hack into your email accounts or send unwanted emails, post unwanted messages or pictures on social media sites, or create fake profiles to harass you and people you know. If your ex is harassing you online, here are some ways to handle it:

  • Clearly tell your ex to stop harassing you, if you feel safe doing so. It’s important to let your ex know that what they are doing is abusive, preferably in a way that lets you keep a record of your request either by saving the text or email you send, or taking a screenshot of a message you send online. After you have told your ex to stop the harassment, do not respond to any future communications.
  • Save everything. You might wish to delete the unwanted messages immediately, but try to keep a record of any communications your ex sends. Save emails and chat logs, take screenshots of status updates, direct messages, comments, pictures, or websites.
  • Take steps to increase your online privacy. Check to make sure that the settings on any social media site you belong to are set to maximum privacy. Change your passwords, block or unfriend your ex, and don’t provide details of your social plans or whereabouts online – this includes avoiding “checking in” to places on Facebook or using apps like Foursquare.
  • If your ex is harassing you via email, create a separate email account with an uncrackable password to use only with people you trust. This way, you can communicate with friends and family via the new email address and you won’t have to see your ex’s emails everyday. Again, save any abusive emails that your ex sends to you, but do not respond to them.
  • Let people in your support system know that your ex is harassing you, if you feel comfortable doing so. Make them aware of your safety plan so they aren’t tagging you when they check in to places or otherwise mentioning your location online. It’s important not to go through this alone and for others to be aware of your ex’s behavior. If your ex tries to contact people you know, ask them not to respond and to keep records of those communications as well.
  • If you believe your life is being threatened and/or if the harassment continues or escalates, you might consider taking legal action. All states have laws against cyberstalking, and it could help to speak with a legal advocate about protective orders or other legal measures. If you choose to pursue legal recourse, a record of your ex’s abusive communications would be useful.

If you are experiencing digital abuse from an ex or current partner, a good resource is WHO@ (Working to Halt Online Abuse), a volunteer organization established to fight online harassment through education of the public and empowerment of victims. also has information about cyberstalking and online safety.

You can always call the hotline anytime day or night at 1-800-799-7233 to speak with an advocate about options and support. Remember, everyone has the right to live free from abuse, online and off.


How to Maximize Online Privacy

behindthescreens-privacyThis is the second post in our Behind the Screens series. Read the first post, What is Digital Abuse?, here

Online privacy is a bit of an oxymoron. According to Ed Gibson, former head of cybersecurity at Microsoft and director of security at PWC Global, data that is posted on the internet should be regarded as permanent after 20 minutes, even if the originator has deleted the file. Nevertheless, 86% of internet users have tried to use the internet in ways to minimize the visibility of their digital footprints.

Despite a majority of internet users’ attempts at maintaining some privacy, social networking companies like Facebook are regularly tweaking their privacy policies, slowly making themselves (and as a result, their users) more public. Location-based apps can glean information from your mobile phone, and advertisers can use swaths of search history and site cookies to better target potential customers.

It’s all a little scary, right?

If you’re in an abusive relationship, or if you’ve left one, you are likely even more concerned than the average person about maintaining privacy online. For most of us it may not be possible to opt out of using the internet altogether, but there are a few things you can do to maximize your online privacy:

  • Check your privacy settings regularly on all social media sites that you use, and update them as needed. Lifehacker maintains an up-to-date article about new Facebook privacy changes.
  • Try to create “uncrackable” passwords and change them regularly. Don’t share your passwords with anyone you don’t know or trust completely. Remember, you can exercise your “digital rights.”
  • Read the privacy policies of any app or site that you sign up for. Many people do not do this, but it will help you get a lot of clarity into how the company or site is collecting and using your information.
  • Avoid oversharing personal information online. Don’t post your address, phone number, email, full birth date, or any other identifying information on any social networking site. Sites like Facebook request a lot of personal information now (including place of work, hometown, etc), but it is absolutely not imperative to post yours.

The Privacy Rights Clearinghouse, a nonprofit based in California, provides a wealth of information about protecting your privacy in many areas of your life, including online. They offer some additional tips on staying safe and secure on the net, and be sure to check out a few of their other articles, too:

Using the Internet Safely
Online Privacy FAQ

If you have questions about how you can make online safety part of your overall safety plan, our advocates are here to help you. Give us a call at 1-800-799-7233, 24/7, or chat with us here on the website from 7am-2am CST. Our support services are always free, anonymous, and confidential.


What is Digital Abuse?

behindthescreens-harassmentThis is the first post in a series we’re planning called Behind the Screens, which will explore issues related to online behaviors and digital abuse.

The prevalence of digital abuse has been gaining traction in the media lately, and our advocates frequently field questions from callers and chatters about it. Still, many people don’t know what constitutes digital abuse and are not able to recognize the signs. It is especially common among young people who are typically using technology in almost every aspect of their lives, but anyone can be a victim of digital abuse.

Digital abuse is the use of technologies such as texting and social networking to bully, harass, stalk or intimidate a partner. In most cases, this type of abuse is emotional and/or verbal and though it is perpetuated online, it has a strong impact on a victim’s real life. According to advocates at loveisrespect, your partner may be digitally abusing you if he or she:

  • Tells you who you can or can’t be friends with on Facebook and other sites
  • Sends negative, insulting or even threatening emails, Facebook messages, tweets, DMs or other messages online
  • Uses sites like Facebook, Twitter, foursquare and others to keep constant tabs on you
  • Puts you down in their status updates
  • Sends unwanted, explicit pictures and demands you send some in return
  • Pressures you to send explicit video
  • Steals or insists to be given your passwords
  • Constantly texts you and makes you feel like you can’t be separated from your phone for fear that you will be punished
  • Looks through your phone frequently, checks up on your pictures, texts and outgoing calls
  • Tags you unkindly in pictures on Instagram, Tumblr, etc.

Digital abuse, like other forms of abuse, is an attempt to control a partner’s actions. As part of maintaining a healthy relationship, we recommend that partners create a digital contract that outlines what is and is not acceptable behavior online. Additionally, it’s important to know and exercise your “digital rights”:

  • You have the right to turn off your phone and spend time with friends and family without your partner getting angry
  • You have the right to say no to sexting, or sending pictures or information digitally to your partner that you are not comfortable with
  • You have the right to keep your logins and passwords private
  • You have the right to control your own privacy settings on social networking sites
  • You have the right to feel safe and respected in your relationship, online or off

Exercising these rights and feeling safe are important aspects of every healthy relationship. If you have questions about digital abuse, call the hotline 24/7 or chat with an advocate here on the website Monday through Friday from 9am-7pm CST.