article

How to Stay Safe After Leaving

Digital and emotional safety tips after leaving.

safety
This information is for education only. It is not legal, medical, or emergency advice.
DIGITAL SAFETY

Privacy, Passwords, and Networks: Basics for Staying Safer Online

1. Why Digital Privacy Matters in Abusive Situations

People who cause harm sometimes misuse technology to monitor, control, or intimidate. They may:

You may not be able to block all monitoring, but you can learn what is happening and decide which steps feel safe and realistic for you.

If changing passwords or devices is likely to upset or alert the person hurting you, you may want to plan changes slowly or from a safer device or connection outside the home.

2. Understanding Privacy on Shared Devices

Phones, tablets, and computers can reveal a lot about you, especially when they are shared or controlled by someone else. On a shared or monitored device, assume the person may be able to see:

Questions to help assess device privacy

Your answers may guide whether it is safer to use this device for private planning, or to use another option (for example, a work device, library computer, or a trusted friend’s phone).

3. Stronger Passwords: Simple Principles

Passwords are often the first line of defense. Someone close to you may easily guess passwords that use:

Features of a stronger password

Simple ways to create memorable but harder-to-guess passwords

If changing a password might anger the person or limit your access to shared finances, devices, or children’s accounts, you may want to think carefully about timing and possible reactions.

4. Managing Passwords Safely

Where you keep passwords can affect your safety and privacy.

Options for storing passwords

When you may want to change a password

When changing passwords, you may want to start with the accounts that control other accounts, such as your main email or Apple/Google account.

5. Two-Factor Authentication (2FA) Basics

Two-factor authentication adds an extra step at login, such as a code sent to your phone or an authentication app. This can make it harder for someone to enter an account even if they know the password.

Possible benefits

Possible risks in abusive situations

You may want to:

6. Email Accounts and Privacy

Email is often the “key” to many other accounts, because password resets usually go there. Someone with access to your email can often:

Things you may want to review

Considering a separate email

Some people choose to create a new, private email account used only for safety planning, legal information, or support. If you do this, you may want to:

If the person closely watches your phone or browser history, using a new email account may create questions. You can weigh whether now is the right time or whether you prefer to gather information first.

7. Social Media and Online Accounts

Social media can be used to track you, monitor your feelings, or reach your friends and family. You may decide to adjust visibility rather than fully delete accounts, depending on your situation.

Privacy checks you can consider

If they have your social media password

You may choose to:

8. Home and Public Networks

A “network” is how your device connects to the internet, such as home Wi‑Fi or mobile data. The type of network you use can affect how easily someone close to you can see your activity.

Home Wi‑Fi

Someone who controls your home internet might:

Signs they might control the network include:

If this concerns you, you may consider using alternative networks for sensitive searches, such as:

Public Wi‑Fi

Public networks are often less controlled by the person harming you, but they can have their own privacy limits. On public Wi‑Fi, others on the same network might see some types of unencrypted activity. Still, when your main concern is someone at home monitoring you, a public network can sometimes be a safer choice for brief, important tasks.

Mobile data

Using mobile data may give you more privacy from home routers, but:

9. Signs of Possible Digital Monitoring

No single sign proves monitoring, but patterns can give clues.

Possible indicators

If you suspect monitoring, you may want to:

10. Planning Digital Changes with Safety in Mind

Every situation is different. Some people can safely make big digital changes; others may need to move slowly or wait until a safer time.

Questions you might ask yourself

You can also explore additional support options and information about technology safety through resources listed at DV.Support, if it is safe for you to visit that site.

You are entitled to seek information, support, and safety. You can choose which digital steps are realistic and safe for you right now, and which might need to wait.

Recommended Articles