|Written by Administrator|
Quick Tips· Put everything behind a password, so only friends can see.
· Protect your password.
· Make sure you know who someone is before you put them on your friends
· What you post online, stays online forever….Think before posting!
· Don't answer messages from people you don't know.
· Don't do or say anything online that you wouldn't say offline.
· Never post personal information like address or phone number.
· Protect your privacy and the privacy of your friends, get their permission
before posting information about them.
· Even if you are careful, your friends might not be. Check out what your
friends are posting about you.
· That cute 14 year old boy may not be cute, 14 or even a boy. You NEVER
· Unless you are prepared to attach your MySpace to your college, job,
internship, or scholarship application, don't post it publicly! Many
employers, schools and organizations are checking out candidates before
Internet & Computer Safety· If you are in danger, try and use a computer that the abuser doesn't have
direct access, or remote access to.
· It may be safer to use a computer at your public library, a friend's house, or
an Internet Cafe.
· Abusive people are controlling and want to know your every move. You
don't need to be a computer programmer or have special skills to monitor
someone's computer activities, anyone can do it and there are many ways
to monitor computer use including specialized software. It isn't possible to
delete or clear all computer reocrds of email or internet use.
· E-mail is not a safe or confidential way to talk to someone about the abuse
in your life, call a local hotline (Survivors Inc. 1-800-786-8106) or the
National Domestic Violence Hotline (1-800-799-SAFE) instead.
· If you think you may be monitored on your home computer, you might
consider no home Internet use or "safer" Internet surfing. Example: If you
are planning to flee to California, don't look at classified ads for jobs
and housing, bus tickets, etc. for California on a home computer or any
computer an abuser has physical or remote access to. Use a safer computer
to research an escape.
For more information on using a computer safely or to reduce your risk
of being monitored take a look at the "Internet Security" page on