Technology

Cyberstalking is similar to traditional stalking. It is persistent behaviours that cause fear and apprehension. Cyberstalking includes mediums such as email and the internet (including social media).

How to clear your browser history and/or view websites privately:

If you are concerned someone might be monitoring what websites you view it is recommended you understand how you can view websites in private (also referred to as “Secret”, “Safely” “Incognito”).  It is also important you understand how to clear history and ensure you always shut down any browser windows completely.  We have created guides on how to clear history and view webpages safely for a variety of browsers.  These guides can be downloaded here, and printed if necessary:

  1. Internet Explorer® – Internet Explorer
  2. Google® Chrome – Google Chrome
  3. Firefox® – Firefox
  4. iPhone® and iPad® – iPhone & iPad
  5. Windows® Phone – Windows Phone
  6. Mac Safari – to be released shortly.

How to set up your Emergency Medical ID on your iPhone®:

The latest software for iPhone® includes the ability to save information which can be accessed without requiring your pin in the event of a medical emergency.  Of course, the information contained in this App could also be used for the wrong reasons, so we strongly recommend you include essential information such as your name, or any significant allergies/medical conditions and emergency contact number(s) only.

To assist you with navigating this we have created an easy to use iPhone Medical Emergency App guide, which can be printed if required.

Things to look out for:

  1. Does your computer have a webcam? If so, learn how it works and ensure it is turned off. You might even consider using tape to cover the lens when you aren’t using it.
  2. Using internet-based phone services such as Google Voice or Skype for texting or making calls is a safe alternative.
  3. Use a safe computer to access your email or internet. A safe computer might be a friend or family members or a public computer at, for example, the library.

Keeping your emails and computer safe:

  1. Consider keeping a separate email account for any legal communication you might receive from your lawyer or the Police and/or a separate email account to communicate with the stalker, if ongoing communication is required.
  2. Ensure you use passwords on all devices and logins. Strong passwords include lower and upper case letters, numbers and simple symbols. Keep your passwords secret, change them often and try to have different passwords for different things.  Don’t allow your computer to save your passwords.
  3. Clear your browser history after you have finished on the internet.
  4. Use the Private Search function within Internet Explorer before using the internet.

Mobile phone in womans' handsKeeping your mobile phone safe:

  1. Ensure your phone locks after a short period of time and that you have engaged a pin code to access your phone.
  2. Turn off the “Location” function on your phone, or only turn it on when you need it on.
  3. Clear your browser history after you have finished on the internet.  Alternatively, select the “Private” function on your browser before using the internet.
  4. Turn your Bluetooth® off and set your phone to “hidden”. Data on your phone can be stolen via Bluetooth® technology.
  5. Beware of Caller ID Spoofing. This is a service provided to change the caller ID to any other number. Always confirm who you are receiving a text message from.
  6. Have your device and/or motor vehicle checked for GPS tracking. You can ask for assistance from your local Police or a trusted mechanic. Other items that could include GPS tracking are cameras and tablets.

Keeping safe on Social Media:

  1. Ensure you regularly visit your privacy settings to ensure they are set up to achieve maximum privacy. You might need to check the settings via each device you use.
  2. Consider using a profile picture that is not identifying, such as a flower or a random dog (not your pet).
  3. Consider using a different city as your location and not including your place of work or schooling.
  4. Avoid “checking in” at places you go, especially your home and work place.
  5. Ensure you know the person you are friending, following or linking in with. Is this a real person?
  6. Avoid posting photos of the front of your house, your street sign or the number of your house. Remember to be careful about what is in the background of your photo.
  7. Talk to the family and friends that frequent your home and ask them to assist you by not tagging themselves or posting unsafe photos.
  8. Be mindful of your status updates. Things such as “I’m going to the Coast for the weekend” might be better off replaced with “I went to the Coast over the weekend” a few days later.

If in doubt, keep a log. Save the messages or ask your service provider or Police to download the messages. Please note that in Australia, service providers are only required to keep a history for six months.

For further information you might like to visit one of these sites: Wesnet or eSafetyWomen.

Please contact us here should you wish to discuss your options further. You can contact us anonymously. We do not make any sound recordings of our conversations, but we do record that we spoke to you. This record can be made anonymously. If you are unsure, please speak to our crisis workers at the commencement of the call.