After sexual abuse or assault, survivors often worry about retaliation, threats, or unwanted digital access from the perpetrator or affiliated institution. Protecting your online privacy can prevent harassment and help preserve evidence if you choose to take legal action later.
The steps below are designed to help you secure your digital life while honoring your emotional readiness. You can also click the PDF link for a printable version of the checklist:
Download: Digital Privacy & Online Protection Checklist
A practical safety guide to help survivors secure online accounts, devices, and personal data after sexual abuse.
Download PDF
What to secure immediately
• Change passwords on email accounts, especially those linked to banking, healthcare, and school services
• Enable two-factor authentication using an app (not SMS if the abuser has phone access)
• Log out of accounts on all shared or unknown devices
• Review devices for unknown profiles or log-in users
• Update recovery email and phone number so the abuser cannot reset passwords
Smartphone safety checklist
• Remove fingerprint or FaceID unlock if abuser could physically force access
• Review app permissions, especially camera, location, and microphone
• Check for unusual apps disguised as “utilities” (flashlight, calculator)
• Disable location sharing on Find My / Google Maps
• Turn off Bluetooth when not needed
Social media protection
• Make all accounts private and remove followers you do not trust
• Review story and post visibility settings
• Turn off location stickers, photo metadata, and tagging permissions
• Screenshot harassment or grooming messages before blocking
• Consider temporarily disabling accounts if targeted or overwhelmed
Email & cloud accounts
• Check login history for unfamiliar devices or cities
• Revoke access to old devices and third-party apps
• Disable auto-forwarding rules that someone else may have set
• Create folders to safely store screenshots and threatening messages
Stalking and location safety
• Turn off location sharing in Contacts, Snapchat, Life360, etc
• Disable frequent locations / location history on iPhone & Android
• Check vehicle tracking apps or shared car systems if the abuser had access
• Watch for AirTags or other tracking devices in purses, bags, or cars
• Ask a trusted tech-savvy person to help if you suspect spyware
Protecting your home tech
• Update passwords on Wi-Fi and smart home devices
• Remove shared access (door cams, home hubs, thermostats)
• Reset routers to factory settings if an abuser had admin access
• Rename your Wi-Fi so it does not identify your residence
Secure communication with support
• Use a private browser or incognito mode for sensitive searches
• Create a separate email address for legal or advocacy contacts
• Tell advocates or attorneys if you fear digital surveillance
• Save the phone number of a trusted contact under a code name if needed
Online evidence preservation
• Do not delete harmful messages even if distressing
• Screenshot messages with contact names and timestamps
• Save audio messages and call logs if relevant to abuse
• Export accounts if you plan to report later
If you suspect you are being watched digitally
• Do not confront the person — it may escalate danger
• Switch devices before taking action
• Contact a confidential advocate for help removing spyware
• Consider law enforcement if safety is at risk
Your safety comes first!
You are in control of what to secure and when. You do not have to report anything or interact with your abuser to protect yourself online. You may have legal rights to pursue safety and justice. A secure device can help keep those options available.