Tech Safety Planning Toolkit
This toolkit provides women, youth, gender-diverse people, and frontline workers with safety planning information to strategically use technology in ways that can enhance safety and take back some control if they are being harassed, threatened, stalked, or abused through a perpetrator’s misuse of technology.
Survivors experiencing violence and anti-violence workers are increasingly seeing perpetrators misuse technology as part of their abuse. Technology-facilitated gender-based violence (TFGBV) is when technology (such as a smartphone, computer, Smartwatch, or a Smart home device) is misused to commit violent abusive acts such as domestic violence, harassment, stalking, sexual assault, impersonation, extortion, and the non-consensual filming and sharing of intimate images.
Though the content of this toolkit is up to date at the time of publishing, we know that technology is constantly emerging and changing. We encourage you to check our toolkit regularly for updated information and connect with your local shelter or transition house for additional support.
Word of Caution
This toolkit is available as read-only on this website with an option to download the PDF versions of each document. If you are reading this toolkit on a device that may be monitored by your abuser, do not download the PDF versions as they will automatically save in your downloads folder. If you think that someone is monitoring your phone, use a different device that the person cannot access (and that they have not had access to in the past), such as a computer at a library or a friend's phone. You can also use sheltersafe.ca to find a shelter/transition house near you to discuss options with an anti-violence worker.
- ¿Qué es la violencia de género facilitada por la tecnología?
- ¿Estás sufriendo abuso tecnológico?
- Hoja de Consejos para el Plan de Seguridad Tecnológica
- Evaluación del Abuso Tecnológico: Consejos para trabajadores contra la violencia
- Documentar el Abuso Tecnológico
- Registro de Acecho y Abuso Facilitado por la Tecnología
- Temas para iniciar una conversación sobre la Planeación de Seguridad Tecnológica
- Lista de Verificación para la Planeación de Seguridad Tecnológica