
Resources |
This page provides a collection of materials, tools, and resources that we have created to help IPV survivors, support workers, and technologists discover and address tech-related risks.
All of our resources are free to download and use. We use many of them as part of our Computer Security Clinic for IPV survivors in New York City.
Our step-by-step how-to guides can be especially useful for providing help remotely.
Compiled by CETA Volunteers
Disconnecting from your ex-partner - a checklist (short version)
Disconnecting from your ex-partner - a checklist (long version)
General IoT and Smart Home Devices Security Tips
Checking your smartphone or tablet for spyware
Gmail and Google apps - turning on extra security
Gmail - checking for suspicious logins
Gmail and Google - cleaning up privacy and security problems
Google Chrome - privacy checkup
Android phones - checking for hidden apps and side-loaded apps (from an unofficial app store)
iCloud -- cleaning up privacy and security problems
iCloud - turning on extra security
iCloud - checking for suspicious logins using a Mac laptop
Facebook - turning on extra security
Facebook - cleaning up privacy and security problems
Instagram - cleaning up privacy and security problems
WhatsApp - security tips
TikTok - Checking for Account Compromise and Increasing Security
Hotmail - Checking Privacy and Security Settings
Yahoo - checking for suspicious logins