Assessing for Technology Abuse and Privacy Concerns

Best practices for agencies

Survivors’safety and privacy is often compromised by abusers who misuse Technology and survivors’ personal information. As frontline workers, it is important that we take the time to educate ourselves and our clients about the various ways stalking, tracking, and monitoring happens through technology.

The following information will help you and the survivor think through how to narrow down technology misuse by the abuser so you can properly safety plan. The questions are only meant to quickly assess what might be an issue and are not meant to be an exhaustive list of all technology‐related safety concerns a survivor might face. 

Frontline workers should follow up with a more thorough conversation about the survivor’s specific concerns and discuss strategies to increase safety, document incidents, and get additional help. Keep in mind that survivors often attend support groups with little direct and ongoing interaction with workers, so consider incorporating this information as a support group topic, as well.

Steps to assessing technology misuse & safety

  • Prioritise safety planning: What are your current safety concerns?
  • Narrow down the possible technology that could be used: What types of things have happened to make you feel unsafe or cause concern?
  • Gauge the survivor’s knowledge and understanding: How do you think this is happening?

These questions open a conversation that will explore and prioritise safety, discuss what types of technology devices or applications could be misused, and how to best safety plan to address survivors’ needs and further their knowledge. Below are sample questions and possible technology misuses to get you started.

1.Are you concerned about the abuser knowing where you are all the time? Let’s explore some common ways tracking can occur. 

  • Through your mobile phone?
  • Through apps on your phone that use your location?
  • Through social media?
  • Through friends & family?
  • Through your car? Some kind of tracking device on the car?

2. Are you worried that the abuser might be able to access your communication with other people? Let’s explore some common ways communication can be compromised.

  • Email communication
  • Mobile phone communication
  • Landline phone communication
  • Other types of communication

3. Are you concerned about information that’s posted about you online? Let’s look at possible ways information about you could be shared online.

  • Through social media accounts that you have?
  • Through social media accounts that the abuser has?
  • Through your children/family/friends’ social media accounts?
  • What specifically is your concern around those accounts? [Examples: The abuser is posting terrible things. The abuser is monitoring social media accounts to find information about you. The abuser is accessing online accounts without your permission). 
  • Is there other information online about you that you are concerned about?

4. Are you concerned about your children/family/friends’ use of technology and the possibility it could compromise your safety?

  • Are they using specific applications on their mobile phones, iPads, tablets, etc. that you’re concerned about?
  • Are there games that they are playing that you’re worried about?

5. Are you concerned about your ability to continue using technology while maintaining your safety and privacy?

  • Are there specific technology devices, such as your mobile phone or your laptop, that you want to go through to ensure that it is safe and secure?
  • Do you need to go through your social network accounts to figure out privacy and security settings?

6. What are other concerns that you have about your privacy and safety?

  • Do you need to think about other technology to figure out privacy and security settings?  
  • Visit our Women’s Technology Safety and Privacy Toolkit and browse the table of contents to scan for other types of technology you want to research.  https://techsafety.org.au/resources/resources-women/

Additional Resources

Download this page in a handout version (in PDF)

CLICK HERE