Email is not always a safe or confidential way to talk to someone about the danger or abuse in your life. Email can often be read by others, including your abuser, regardless if the email account is web-based or if you use Outlook, Entorage, Eudora, or another email program. Please consider calling or visiting us at our main office. Our crisis line is (719) 633-3819. Traditional “corded” phones are more private than cell phones or cordless phones.
Please consider this information regarding computer use:
• There are hundreds of ways that computers record everything you do on it and on the Internet.
• If you are in danger, please try to use a safer computer to which your abuser does not have direct access, or even remote (hacking), access.
• It might be safer to use a computer in a public library, at a community technology center (CTC) www.ctcnet.org (national directory), at a trusted friend’s house, or at an Internet Café.
• If you think your activities are being monitored, they probably are. Abusers are often controlling and find ways to keep tabs on your every move. You don’t need to be a computer programmer or have special skills to monitor someone’s computer activities – anyone can do it and there are many ways to monitor.
• Computers can provide a lot of information about what you look at on the Internet, the emails you send, and other activities. It is not possible to delete or clear all computer “footprints”.
• If you think you may be monitored on your home computer, you might consider no home Internet use or "safer" Internet surfing. Example: If you are planning to flee to another state, don't use a home computer to look for jobs, apartments, bus tickets, etc. in that state. Use a safer computer to research an escape plan, or please consider calling or visiting TESSA to discuss your situation with a Confidential Advocate who can assist you with information and resources.