article

Technology Safety for Survivors

How to secure phones, apps, and devices.

tech safety
This information is for education only. It is not legal, medical, or emergency advice.
Digital Safety

Device Security Basics

Why Device Security Matters in Unsafe Relationships

If someone is harming or controlling you, they may also try to control your devices. Securing your phone, tablet, or computer can help protect your messages, location, and plans.

You may want to think about what level of privacy is realistic and safe for you right now. For some people, completely locking down a device might increase conflict. Small, low‑visibility changes can still make a difference.

If you are worried that changing settings might be noticed, consider making one change at a time and choosing things that could be explained as “routine updates” or “phone maintenance.”

1. Lock Screen and Basic Access

Your lock screen is the first barrier between your information and someone else.

Choose a Strong Lock

Adjust Lock Timing

Shared or Monitored Devices

2. Accounts, Passwords, and Two‑Step Verification

Many devices sync information through accounts (such as Apple ID, Google, Microsoft, or email accounts). Whoever controls the main account may see a lot.

Review Which Accounts Are Signed In

Strengthen Key Passwords

Two‑Step or Multi‑Factor Authentication

3. Updates and Basic Security Settings

Keeping your device up to date reduces known security weaknesses.

Location‑tracking tools can be helpful if you lose a phone, but they can also be misused to track you. Review who has access before turning them on.

4. Apps and Permissions

Apps can collect location, microphone, camera, and contact information. Reviewing what each app can access may reduce monitoring risks.

Review Installed Apps

Check App Permissions

Downloads and Links

5. Location and Sharing Settings

Location‑sharing can be useful but is often misused in abusive situations.

Device Location Services

Location‑Sharing Features

6. Communication Privacy (Calls, Texts, Email, Social)

People who cause harm may try to read messages, log into accounts, or pretend to be you.

Texts and Messaging Apps

Email Accounts

Social Media

7. Signs Your Device May Be Monitored

Some forms of monitoring are hard to detect. However, certain patterns can raise concern.

If you suspect monitoring, using the same device to search for answers or change settings might alert the person. Some people choose to look for information from a library computer, a trusted friend’s phone, or another device they believe is safer.

8. Safer Use of Shared or “Compromised” Devices

Sometimes it is not realistic to fully secure a device. You can still make thoughtful choices about what you use it for.

You can explore additional support options, including digital safety resources, through information listed at DV.Support.

9. Planning Next Steps

You are the best judge of what is possible and safe in your situation. When thinking about device security, you might reflect on:

Making even one small change—such as limiting lock‑screen previews or reviewing app permissions—can be a meaningful step toward more privacy.

Recommended Articles