The Digital Safety Planning Checklist

Abusive partners often utilize technology-facilitated violence as part of a larger pattern of abuse. The digital safety planning checklist takes into consideration the technological risks of intimate partner violence, but should be utilized alongside traditional safety planning. In some cases, you may need the support of an IT specialist or law enforcement, such as when detecting stalkerware or other spyware.

  • ○ Before proceeding with the following guide, consider whether your situation permits you to alter your accounts without any repercussions. If not, it may be beneficial to allow your partner to stay connected to you for your safety.

    ○ Create a list of your smart devices and accounts. Here is a non-exhaustive list of accounts and devices to consider

    ○ Note which of these the abuser has access to and knows the passwords to (If there are any doubts, assume they have access to everything)

    ○ Head to the settings page on any account your abuser may have access to, and press “sign out on all devices”.

    ○ Change all new passwords are unique and difficult to guess - never reuse your passwords for multiple accounts

    ○ Enable two-factor authentication for all accounts which allows for it (phone authentication is not recommended as it is easy to sim swap)

    ○ Sign up for a password manager - It will be able to create and keep track of your high security passwords, as well as receive two-factor authentication codes

    ○ Change your WiFi password

    ○ Change your security questions on your accounts, as your abuser may know enough personal details about you to answer them. Choose new security questions that your abuser would not be able to guess. (Such as “what street you grew up on”)

    ○ Remove abuser’s emails or devices from shared accounts and as “Trusted devices” on your accounts. Additionally, update your phone plan as your partner can access a history of phone calls and messages sent on the same plan.

    ○ If there is no way to stop their access at the moment, create an alternate email account or social media account that the abuser does not have access to for sensitive communication.

  • ○ Use a camera cover on your devices’ cameras

    ○ If the abuser is tracking your device or accounts, consider using a secondary device to create exit plans

    ○ Factory reset your devices once exit plans are made

    ○ Remove personal information online that may reveal recent locations and activities, such as posts on your social media accounts

    ○ Delete previously stored location history on your map apps, especially before and arriving at domestic violence shelters or other safe spaces.

    ○ Turn off location functions like “Find my Phone” or “Find my Friends”.

    ○ Turn off location services on your devices when not in use

    ○ Update your privacy settings on your devices and apps

    ○ Use a VPN (Virtual Private Network) when using your device, it protects its users by encrypting their data and masking their IP addresses

    ○ Do not post photos containing metadata or background information

    ○ Remove Bluetooth connections from the abuser's devices

    ○ Search for hidden traceable devices (cellphones, Tiles, Airtags, AirPods, SmartTags)

    ○ Look through apps on the phone and delete any unfamiliar ones (Ensure apps are not disguised with custom names and icons)

    ○ Examine any gifts or unusual items in the home for hidden cameras or recording devices. Hidden cameras are often found in stuffed animals, picture frames, and charger cubes, though they can take other forms too. Google “hidden cameras” to see a wider range of examples.

    ○ Conduct a search of your house for hidden cameras/other devices. Check out this guide for tips

    ○ Examine unusual hardware attached to computer

    ○ Repeat cautions for the devices of your children(s)

    ○ Consider replacing devices entirely, without backing up your data (malicious software could be backed up into your new device)

  • ○ Ensure to collect the evidence needed from your social accounts before considering blocking the abuser, such as screenshots or screen recording videos of message exchanges.

    ○ Blocking, deleting or unfriending the abuse may escalate tension. Be sure to have a plan of exiting your current situation. Do not take any of these actions until you have an immediate plan in place.

    ○ Consider which of your friends and family may have your abuser added. Request them to not reveal anything about you to the abuser

  • If the abuser has access to the device or account, they can check your search history. Clear your browsing data after visiting this site

    ○ If looking for help or resources, use a computer not in the home, such as a friends house, public library or internet café

    ○ When on a personal computer, use a browser service that prioritizes privacy, such as Brave or DuckDuckGo

    ○ Turn off cookies in the browser setting and always use private browsing mode, which prevents your computer from remembering your browsing habits and history

  • ○ Make a list of images and videos that may exist

    ○ If safe to do, ask the ex-partner to delete the images after the relationship ends and tell them that there is no consent to share them. Document this communication as publication without consent violates Section 162.1 of the Canadian Criminal Code

    ○ Consider whether the abuser may have been able to capture images without consent

    ○ Set up a Google alert for your name, which can alert you to the mention of your name if it is posted along with your images

    ○ Report to social media companies or porn companies, most have policies that forbid non-consensually shared nude images

    ○ Organizations which assist in taking down intimate images include CyberCivilRights.org, StopNCII.org, and Project Arachnid

  • ○ To collect legal evidence, be sure to include information such as the time, date, and evidence gathered

    ○ Take screenshots and make recordings of abuse (be aware of screenshot alerts on certain apps)

    ○ Store copies of the evidence in a secure location and create a backup