

Project Empowerment
Helping female victims with a child under 8, who have been affected by domestic abuse, either current or historic.




Tech Abuse
Technology-facilitated abuse is real. Abusers may use technology to control, harass or intimidate you. They may carry out physical, sexual, psychological, or economic abuse using technology.
For example, they may hack your phone, cyberstalk you, or use social media, cameras, or other kinds of technology to try to harm or control you or your children.
Even if you’ve told someone and they didn’t believe you…
You have the right to be safe and respected online and in real life.
Mobile Phones
-
Set your mobile so that you have a PIN to unlock.
-
Does your partner have access to your banking or social media accounts and passwords?
-
Choose strong passwords
-
Your phone company may be able to give advice through a helpline or in store
-
Turn off geolocation and geotagging in mobile settings, camera and camera apps.
-
Do you have any apps such as ‘find my iPhone’? Did your partner assure you that it is for your safety? Turn off location settings.
-
Don’t use apps that use your location, ask for administration access or request using your GPS location.
-
Turn off Frequent Locations tracking.
-
Reset your phone to the factory settings to delete any spyware.
-
If you are fleeing an abusive situation, you should take the battery out until you are safe and do a factory reset.
-
Ask family and friends not to give out your number.
-
Do they have access to your children’s phones/technology?
Emails
-
Set up an anonymous email address.
-
Create multiple email addresses.
Home Security
-
Do you have a ring door bell, these can be used as evidence if ever needed.
-
Can they control smart home devices such as CCTV, lights or thermostats
The domestic abuse charity Refuge has a tech safety website Refuge Tech Abuse where you can use their Digital Break-Up Tool with step by step guides for phone, online accounts, social media, location, email and Smart devices.
Remember, if you want to save evidence of the abuse, you will need to do so before taking any action such as deleting messages or posts, removing the abusers’ access to your phone or accounts, or reporting abusive content.
If you are deleting messages or posts, removing the abusers’ access to your phone or accounts please be aware that this may increase your risk of abuse.
