Computers record everything you do in hundreds of ways. They can provide a lot of private information about what you look at on the Internet, the emails you send, and other activities. It is not possible to delete or clear all computer “footprints” or history.
If you are in danger, use a safer computer where someone abusive does not have direct access or even remote (hacking) access. Safer computers may be at a public library, a community technology center, at a friend’s house, or an Internet Café.
There are many ways to monitor computer usage. If you think your activities are being monitored, you are probably right. Abusive people are often controlling and want to know your every move. You don’t need to be a computer expert or have special skills to monitor someone’s computer activities. Anyone can do it.
If you think you’re being monitored on your home computer, you might consider no home Internet use or “safer” Internet surfing.
Example: If you are planning to leave an abusive relationship, don’t look at classified ads for jobs and apartments on a home computer or any computer to which an abuser has physical or remote access. Use a different computer to research and plan a safe escape.