„Domov musí byť bezpečné miesto pre všetkých“ – „A home must be a safe place for everybody“.
Internet

When using your computer and the Internet, you can use the following tips to help minimize the risks of using them:

BRIEŽDENIETrust your intuition

If you suspect someone is monitoring and tracking your activities on the computer and the Internet, it can really be. Men who behave violently usually check their partners regularly and constantly. Your partner who is violent to you can therefore check your activities on the computer and the Internet and your emails. To monitor your activity on the Internet and on your computer, your partner may not be a computer expert. You need to be especially careful when using the Internet.

Use a safer computer

If your activities on the Internet and the computer you have at home are monitored, use it for the usual activities like searching for weather information, TV programs, and so on.

To find information about support services for women who experience violence, use a safer computer that your violent partner does not have access to. It can be a computer of someone you trust, or a computer in an internet café or public library.

From a safer computer, look for the information you need in case you are about to leave a violent relationship – job listings and rentals, train and bus timetables, train and bus ticket prices, and so on.
Do not change your habits when using your home computer and the Internet.
It is not possible to delete all “tracks” after your Internet and computer activities. If you suspect or worry that someone is watching your activities on the Internet, it can be dangerous to clear the history of the websites you are viewing unless it is something you usually do or what is the habit of using your computer at home.

Find a new email account

If you have an email account that your partner could have access to or know about, do not use it to communicate with other people or institutions about your situation. For this communication, create a new e-mail account, preferably on another server (if you have an e-mail account on gmail.com, create a new account, for example, on yahoo.com or another similar server). Do not connect to this email account from your home computer, especially if you suspect it might be monitored. Do not give your name, surname, or the different forms of your name to people who are normally called you for the name of your email address. Do not give detailed personal information to the profile of your e-mail account.

Change your passwords and codes regularly

If you suspect that your violent partner can track your online activities, regularly change the access passwords and e-mail account codes, internet banking, and other Internet services that require them.
Also, enter passwords that are not easy to guess (do not enter children, pets, etc.). Passwords that have at least 8 characters and use a combination of letters and numbers are the safest. Do not change access passwords in those email accounts and other services that your partner already knows or has access to. It may cause his suspicion.

Find your name on the Internet

To know where it is possible to find your data online, enter your name in the form “Name Surname” into the browser (Google or other). This way you can find out who owns your personal information. You can ask people and institutions to remove your personal information from the Internet. When registering for different websites and services, enter as little personal data as possible (many of them require full name and address). If you have registered with different social networks such as Pokec, Facebook, MySpace and others, do not give your personal information to your profile, use a fictional name, date of birth, and address.

If you use Skype

If you are using Skype, MSN Messenger, or other similar apps to communicate with your family, friends and friends and other people, you should know that this is not a safe way to communicate about your situation.
Use these services to communicate only about common issues because the communication history stores your computer. Your computer also stores other personal information about you – what you are looking for on the Internet, websites you visit, money transactions through Internet banking, on-line shopping, and many other activities.

Spam and junk mail

If unsolicited or advertising mail arrives on your email, spam, do not open it. Delete this mail without opening it. It can contain dangerous programs that can monitor your computer.

 

Source: www.fenestra.sk

briezdenie.sk