Adapted for Canada with permission from Refuge based on their Tech Safety Glossary.

See also: Definitions of Legal Terms: Civil and Family Law and Definitions of Legal Terms: Criminal Law

A

Access Log

A list of devices such as a phone, tablet, or laptop that has recently logged into an account. This information can include the date and time, location, type of device, operating system, type of browser, and an IP address. Sometimes also saved in your “activity” history.

Account

Specific information about you. Examples include online banking, social media, email, and phone. Information could include your name, email, phone number, credit card number, and also other information like your past purchases, photos, posts, comments, and more. You might also be part of a family account, where you can see information about other members of a small group.

Anti-Virus

Software that protects against viruses, malware, spyware, and other unwanted, harmful software. You can install it on your phone, tablet, laptop, or desktop computer. Sometimes also called “anti-malware.”

App

Short for “application,” this is software on a phone, tablet, or computer that can give quick access to information or connect to a service online. Apps usually collect information about you, your location, and your activities – even when the app is not open. Examples are web browsers, social media, photo tools, messaging, and services like banking, weather, fitness, and more. See our guide to learn about location sharing in apps.

Authentication App

An app for added security on your account, used for Two-Factor Authentication.

B

Biometric

A way to identify you that is unique and based on something about you physically, for example your face, fingerprint, voice, or eye. They are used to access to your information, device, or account. While these are intended to provide stronger security, they may not be secure or safe options if you’re living with an abuser. Biometrics are also used in facial recognition, where a digital map is made of your face and matched to photos or video.

Block

A way to stop someone from accessing your information. For example, blocking someone on social media could mean that they can’t see your posts.

Blog

Short for “web log,” this can include a user’s posts, photos, videos, and more. Microblogs are a subset of traditional blogs where instead of long-form content, short messages consisting of a few sentences, an image, a video, or a link are posted and shared.

Browser

An app or computer software that enables you to view websites and other information on the Internet, such as Google Chrome and Firefox.

Bugs

Bugs are mistakes or unwanted pieces of software code that keep a website or app from working properly.

C

Cache

Stored parts of a website, such as images, that allow a website to load faster when you return in the future. Privacy experts suggest clearing all or part of your cache.

Cloud

The cloud really just means somebody else’s computer, usually a huge computer in a giant warehouse of computers. Data is not stored locally on your own phone or computer, but instead sent through the internet to a data warehouse. Gmail, iCloud, Facebook, and most apps use cloud computing.

Content

Content includes articles, posts, comments, photos, videos, and other information shared on social media, a website, or a blog. Content moderation is reviewing content to make sure it fits community rules. Content curation is gathering and presenting content that is relevant to a specific topic or a user’s interests.

Cookies

Little bits of data that are put on your phone or another device so that companies can track your Internet use on other sites or apps. You are not obligated to accept cookies, and they are often not necessary for the website to work for you. Privacy experts recommend deleting your cookies regularly.

Cyberstalking

Using technology to track your activities or location, or to make you feel constantly watched and afraid. Many different kinds of technology can be used to stalk someone, including phones, social media, email, cameras, smart home devices, and more. Any kind of stalking is serious, and you can reach out for help or report to police.

D

Data

Data is another word for information. Big data is a term for really large amounts of data pulled from mobile phones, emails, Internet searches, apps, and public records. Companies use big data to identify patterns about us all to predict and optimize their business.

Database

Software that holds data and allows a company, charity, or the government to search for information about a specific person or find trends across many people.

De-platform

When a company, usually a social media company, removes a user from their “platform” or online space. This is usually because of a violation of the community rules.

Device

A phone, tablet, laptop, or desktop computer, smart speaker, or another smart home product. On this site, when we say “device” we usually mean your phone, tablet, or computer.

Digital Dating Violence

Digital dating violence is a pattern of behaviours in which one partner controls, pressures, or threatens their dating partner using digital technologies. Digital dating violence is also known as technology-facilitated gender-based violence (TFGBV), but we use the term digital dating violence to reflect teen relationships. Read more about Digital Dating Violence here.

Digital Evidence

The overarching term that includes evidence from digital devices including the devices themselves, as well as emails, texts, pictures, videos, voice recordings, direct messages (DMs), screenshots, account logs or billing statements, apps, GPS and location information, and “metadata” or the information embedded in emails and other electronic documents.

Doxing

Sharing someone’s personal information like a phone number or home address to threaten or harm them. Often part of online harassment or stalking. Sometimes also spelled “doxxing.”

E

Email

Email is short for “electronic mail” and can include text, images, and attachments of other files. Read our tips on securing your email account.

Embedding

Adding content from somewhere else to a webpage. When you see a YouTube video on a blog you’re reading, or a tweet posted on a company’s website you’re checking out, that’s an example of embedding. Embedding is done through HTML code;most social media sites have an “Embed” option that gives you the exact code you’ll need.

Encryption

A way of scrambling information so that it can only be read by the person who created it or those they choose to share it with. End-to-end encryption protects data between the sender and the receiver (e.g. between you and a person you send a message to).

F

Factory Reset

Wiping all the information and settings from a phone or other device, returning it to the way it was when it was made. This is one way to remove harmful software and settings from your phone, in combination with other steps like changing account settings or creating new accounts.

Family Share

Sharing information between accounts such as location or photos.

Find My Phone

A way to locate your phone by logging into your account from another device. In addition to seeing the location on a map, options may also include making loud sounds through the phone, remotely wiping all data, or otherwise taking control of the phone. Read our guides to learn more about turning off this feature on your phone, or in your social media accounts.

Firewall

Either software or a piece of equipment that protects a computer network from external security risks. Firewalls monitor inbound and outbound network traffic and determine whether or not to allow the traffic through based on a set of security standards.

Friend, Unfriend/Follow, Unfollow

Someone you are connected to through social media, or the act of connecting (or disconnecting) with someone on social media.

G

Gaming Console

A specific piece of equipment for playing video or online games.

Googling

Searching the Internet for information, specifically on Google. See also Internet Search Engine.

H

Hacking

Breaking into an account, device, or database. The act of doing so is hacking. A person who does this can be called a hacker. When your account has been broken into, it has been hacked.

Hardware

Hardware is a piece of equipment like a computer, webcam, or printer that uses software.

I

Internet of Things (IoT)

Devices or everyday objects that are connected to the Internet or your home network. Sometimes called “smart” or “connected” devices, examples include smart speakers (such as Google Home or Amazon Alexa), televisions, video doorbells, electrical sockets, and even cars, medical devices, and whole buildings. Read our guides to learn more about the IoT.

Internet Service Provider (ISP)

A company that connects your computer or home network to the Internet (e.g. Rogers, Bell).

IP Address

A string of numbers assigned to your computer or network. These can be dynamic, meaning that they change often, or static, which means that they are always the same. If you join a Wi-Fi network away from home, you usually use a different IP address based on that Wi-Fi network.

L

Log in (or Login)

The information you use to access an account; usually your username or email address and a password. Logging in is the act of going into an account.

M

Malware

Malicious software that is designed to allow someone else to break into your account, network, or device. Malware includes viruses and ransomware.

Mentions

Mentions are ways of referring to a person or account on social media platforms (e.g. @yourTwitterhandle on Twitter or +YourName on Google+). Mentions are a way someone can get your attention or as a form of abuse.

Metadata

Data about other data. Examples include date and time, location, or other information about a file, image, video, or post. This information could reveal where a photo was taken, for example, or be used for evidence.

Modem

Equipment used together with a router to connect a device or a network to the Internet.

N

Notification

A message sent by SMS text message, email, or a “push” notification displayed on your phone or computer.

O

Operating System

The software that runs a device like a phone or computer. It should be updated regularly.

P

Password

A password or passcode secures your account or device. It is important to use strong passwords, or better yet “pass phrases.” They should be at least 12 or more characters long (letters, numbers, symbols). Do not use any information that others could easily guess like the name of a pet or a birthdate. Use a different password for every account, and a password manager to keep track of them. Experts say you shouldn’t share your passwords with anyone, but some abusive people may force or coerce you into sharing them – and that’s not your fault. Read our guides to learn more about password security.

Password Manager

A service or app that stores all of your passwords and allows you to use them when you need them. Password managers help you to use strong passwords that are unique to each site or account. Privacy experts recommend against storing your passwords in your browser.

Permissions

Options that you choose once, or that are already set when you get your phone, that allow an app to access your camera, microphone, contacts, files, location, and more.

Profile

Specific information about you stored in your account (e.g. social media or online shopping). Depending on the app or website, you can choose how much information is in your profile, and who can see that information. Read our guides to learn how to update and protect your profile information in your cloud accounts and social media accounts.

R

Report (Content)

Letting a company know about inappropriate or harmful posts, images, comments, or other content, usually on social media or another online account. Read our guides to learn more about how to report abusive content or behaviour on social media accounts.

To use a picture or image file to find matching information like other accounts, a name, or a location. It can also be used to find where the same picture or image may be uplaoded.

Routers

Devices used to connect personal computers to the Internet via an Internet service provider (ISP) like cable or DSL. The device that your computer is connected to with a cable or through your Wi-Fi network.

S

Screen Lock

A security feature that “locks” your device until you enter a passcode, PIN, biometric, or other verification to open it. Privacy experts recommend using a screen lock and not sharing your device with anyone, but some abusive people may force or coerce you into sharing them – and that’s not your fault. Read our guides to learn how to set up a screen lock for your phone.

Looking for information on the Internet. Search engines like Google store every way that people look up information online, and your own searches are usually saved in your Internet browser history. The search results or suggestions you get will be sorted based on your profile and previous searches. Sometimes you will get ads later related to your searches, as companies sell information about you to advertisers.

Search Engine

A website or app that helps you find information on the Internet.

Secret Questions

An older way of adding security to your account by asking for questions that only you know, such as the name of your first pet or the street you grew up on. When the abuser knows you well, this is not a good security measure. Also, big data makes some of this information available online. One option is to make up answers that aren’t true (and remembering them), or to use two-step verification instead.

Security Fob

An added security features that is small object similar to a key that is plugged into a device or contacts a security pad (like a credit card or transit pass). Used for two-factor verification.

Server

Special, very large computers used to store information for websites, apps, or other data that can be accessed through the Internet. When you visit a website through the browser on your computer or smartphone, you are requesting it from a server.

Settings

Options for your app, account, or device. You can adjust your settings for greater privacy, security, accessibility, and more.

Shelter

Referred to as transition houses in some parts of Canada, shelters are safe and welcoming places that accommodate women and children fleeing violence. Shelter addresses are often kept confidential so that women (and children) cannot be found. You can generally stay in these homes for 1-3 months and sometimes longer. Second stage shelters are longer term, with 1-2 year stays. There is no charge for you to stay there. You DO NOT need to stay in a shelter to get help. If you want support, information, or referrals, you can call a shelter just to talk. Most shelters have staff available 24/7 to answer your call. Visit www.sheltersafe.ca to find help in your area.

Smart Devices

Everyday things that are connected to the Internet. Also called the Internet of Things (IoT). Read our guides to learn more about the IoT.

Social Media

Apps and websites that share updates, photos, and more with other people. Read our guides to learn how to secure your social media.

Software

Software is a set of instructions or a program made up of computer code that tells a computer, phone, or tablet what to do. This includes individual apps like a web browser, anti-virus, or social media, as well as system software like operating systems (e.g. Android or Windows) and drivers that communicate with hardware.

Spam

Junk email, calls, or messages.

Spyware, Stalkerware

An app or software designed to secretly monitor everything that you do on your phone or computer, including calls, images from the camera, Internet searches, messages, location, and more. It is very difficult to find and remove, and the person doing the monitoring will usually see attempts to do so. Read our Spyware info sheet to learn more.

T

Tablet

A device that is smaller than a laptop and larger than a phone, usually with a proportionately large screen.

Technology-Facilitated Gender-Based Violence

Tech-facilitated gender-based violence, or TFGBV, happens when someone uses technology to harm or control you. It can happen to anyone, but especially to women, children, and gender-diverse people. BIPOC, those with disabilities, and the 2SLGTBQIA+ community are disproportionately affected. It can look like harassing text or social media messages, restricting access to technology, non-consensually sharing intimate images, using location-tracking technology, or threatening to do any of these. TFGBV is sometimes called tech abuse, online harassment, or digital violence.

Transition House

Referred to as shelters in some parts of Canada, transition houses are safe and welcoming places that accommodate women and children fleeing violence. Transition house addresses are often kept confidential so that women (and children) cannot be found. You can generally stay in these homes for 1-3 months and sometimes longer. Second stage or transitional housing is longer term, with 1-2 year stays. There is no charge for you to stay there. You DO NOT need to stay in a transition house to get help. If you want support, information, or referrals, you can call a transition house just to talk. Most transition houses have staff available 24/7 to answer your call. Visit www.sheltersafe.ca to find help in your area.

Troll

Someone who deliberately tries to upset or harm someone else online.

Two-Factor Verification

A way of adding extra security to an account or device. Usually, this includes something you know, like a password, and something you have, like your smartphone. Also called Two-Factor Authentication (2FA) or Multi-Factor Authentication (MFA).

U

Update, Upgrade

An important security step, updating your operating system, apps, anti-virus, and other software that protects your devices and accounts from hacking.

User, Username

Someone who uses an account, social media platform, computer, database, or another system. A username is a unique name you use to access an account when you log in.

V

Verification Code

An added security step, usually a number sent by SMS text message to your phone or your email, which you use to access your account in addition to a password or if you ask to reset your password.

VPN (Virtual Private Network)

Like a secure tunnel for your information, a VPN allows you to connect over public Wi-Fi and other unsecured networks more safely. When you use a public Wi-Fi network, for instance, your device and data could be visible to someone else on the network. VPNs can be set up through some web browsers or can be accessed through paid monthly services.

W

Webcam

A camera built into or connected to your computer, tablet, or phone. Privacy experts recommend putting a reusable sticker or other cover over your webcam when you’re not using it.

Wi-Fi

Wireless connection between devices or to the Internet. Privacy experts recommend avoiding public Wi-Fi, and use a virtual private network (VPN) instead. See our guide to resetting your Wi-Fi network.

Safety Check!

If you think someone is monitoring your devices, visit this website from a computer, tablet, or smartphone that isn’t being monitored.

EXIT NOW from this website and delete it from your browser history.

Exit Site