{"structure":{"type":"Page","styleId":"style-jent2bla","id":"ob2q2","components":[{"type":"Container","styleId":"style-jf39j9fg","id":"comp-jep14jxm","components":[],"skin":"wysiwyg.viewer.skins.area.RectangleArea","layout":{"width":980,"height":1880,"x":0,"y":0,"scale":1.0,"rotationInDegrees":0.0,"fixedPosition":false},"componentType":"mobile.core.components.Container"},{"type":"Component","styleId":"txtNew","id":"comp-iv7i11zo","dataQuery":"#dataItem-iv7i120r","skin":"wysiwyg.viewer.skins.WRichTextNewSkin","layout":{"width":892,"height":83,"x":44,"y":38,"scale":1.0,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"propItem-iv7i122z","componentType":"wysiwyg.viewer.components.WRichText"},{"type":"Component","styleId":"txtNew","id":"comp-iv7i1q95","dataQuery":"#dataItem-iv7i1q9y","layout":{"width":939,"height":1568,"x":27,"y":201,"scale":1.0,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"propItem-iv7i1q9z","componentType":"wysiwyg.viewer.components.WRichText"}],"mobileComponents":[{"type":"Component","styleId":"txtNew","id":"comp-iv7i11zo","dataQuery":"#dataItem-iv7i120r","skin":"wysiwyg.viewer.skins.WRichTextNewSkin","layout":{"width":280,"height":36,"x":20,"y":10,"scale":0.73,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"mobile_propItem-iv7i122z","componentType":"wysiwyg.viewer.components.WRichText"},{"type":"Container","styleId":"style-jf39j9fg","id":"comp-jep14jxm","components":[{"type":"Component","styleId":"txtNew","id":"comp-iv7i1q95","dataQuery":"#dataItem-iv7i1q9y","layout":{"width":260,"height":10,"x":10,"y":10,"scale":0.9333333333333333,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"mobile_propItem-iv7i1q9z","componentType":"wysiwyg.viewer.components.WRichText"}],"layout":{"width":280,"height":30,"x":20,"y":56,"scale":1.0,"rotationInDegrees":0.0,"fixedPosition":false},"componentType":"mobile.core.components.Container"}],"dataQuery":"#ob2q2","skin":"wysiwyg.viewer.skins.page.BasicPageSkin","layout":{"width":980,"height":1900,"x":0,"y":0,"scale":1.0,"rotationInDegrees":0.0,"fixedPosition":false},"propertyQuery":"propItem-iv7g84j8","mobileHintsQuery":"mobileHints-j7vdfxcd","componentType":"mobile.core.components.Page"},"data":{"document_data":{"dataItem-iv7i120r":{"type":"StyledText","id":"dataItem-iv7i120r","metaData":{"isPreset":false,"schemaVersion":"1.0","isHidden":false},"text":"<h2 class=\"font_2\" style=\"font-size: 56px; text-align: center;\"><span style=\"color:#000000;\"><span style=\"font-family:lulo-clean-w01-one-bold,sans-serif\"><span style=\"font-size:56px\"><span style=\"letter-spacing:-0.05em\">Technology Safety</span></span></span></span></h2>","stylesMapId":"CK_EDITOR_PARAGRAPH_STYLES","linkList":[]},"dataItem-iv7i1q9y":{"type":"StyledText","id":"dataItem-iv7i1q9y","metaData":{"isPreset":false,"schemaVersion":"1.0","isHidden":false},"text":"<h1 class=\"font_0\" style=\"text-align: justify;\"><span style=\"color:#000000;\"><span style=\"font-family:open sans,sans-serif\"><span class=\"wixGuard\">​</span></span></span></h1>\n\n<p class=\"font_8\" style=\"text-align: justify;\"><span style=\"color:#000000;\"><span style=\"font-family:open sans,sans-serif\"><span style=\"font-size:16px\"><span style=\"font-weight:bold\">Technology safety planning</span></span><br />\nAlthough technologies such as the internet, email and mobile phones have provided benefits for victims of family violence, they have also opened up new avenues for abuse.</span></span></p>\n\n<p class=\"font_8\" style=\"text-align: justify;\"><span style=\"color:#000000;\"><span style=\"font-family:open sans,sans-serif\">Trust your instincts<br />\nIf you suspect the abusive person knows too much, it is possible that your phone, computer, email, car use or other activities are being monitored. Abusers and stalkers can act in incredibly persistent and creative ways to maintain power and control.<br />\n<br />\n<span style=\"font-size:16px\"><span style=\"font-weight:bold\">Plan for safety</span></span><br />\nDealing with violence, abuse, and stalking is very difficult and dangerous. Domestic violence services and police can discuss options and help you in your safety planning.<br />\n<br />\n<span style=\"font-size:16px\"><span style=\"font-weight:bold\">Use a safer computer</span></span><br />\nIf anyone who is abusive has access to your computer, he/she might be monitoring your computer activities. &lsquo;Spyware&#39; and &lsquo;keylogging&#39; programs are commonly available and can track what you do on your computer without you knowing it. It is not possible to delete or clear all of the &lsquo;tracks&#39; of your online or computer activities. Try to use a safer computer when you look for help, a new place to live, etc. It may be safest to use a computer at apublic library, community centre, or Internet cafe.<br />\n<br />\n<span style=\"font-size:16px\"><span style=\"font-weight:bold\">Create a new email, Facebook or instant messaging account</span></span><br />\nIf you suspect that anyone abusive can access your email, consider creating an additional email account on a safer computer. Do not create or check this new email from a computer your abuser could access, in case it is monitored. Use an anonymous name, and account: (example: bluecat@email.com - not YourRealName@email.com). Look for free web-based email accounts (like yahoo or hotmail), and do not provide detailed information about yourself.<br />\n<br />\n<span style=\"font-size:16px\"><span style=\"font-weight:bold\">Check your mobile phone settings</span></span><br />\nIf you are using a mobile phone provided by the abusive person, consider turning it off when not in use. Also many phones let you to &lsquo;lock&#39; the keys so a phone won&#39;t automatically answer or call if it is bumped. When on, check the phone settings; if your phone has an optional location service, you may want to switch the location feature off/on via the phone settings menu or by turning your phone on and off.<br />\n<br />\n<span style=\"font-size:16px\"><span style=\"font-weight:bold\">Change passwords and pin numbers</span></span><br />\nSome abusers use a victim&#39;s email and other accounts to impersonate and cause harm. If anyone abusive knows or could guess your passwords, change them quickly and frequently. Think about changing the passwords for any password protected accounts - online banking, voicemail, etc. Use a safer computer to access your accounts.</span></span></p>\n\n<p class=\"font_8\" style=\"text-align: justify;\"><span style=\"color:#000000;\"><span style=\"font-family:open sans,sans-serif\"><span class=\"wixGuard\">​</span></span></span></p>\n\n<p class=\"font_8\" style=\"text-align: justify;\"><span style=\"color:#000000;\"><span style=\"font-family:open sans,sans-serif\"><span style=\"font-size:16px\"><span style=\"font-weight:bold\">Minimize use of cordless phones or baby monitors</span></span><br />\nIf you don&#39;t want others to overhear your conversations, turn baby monitors off when not in use and use a traditional corded phone for sensitive conversations.</span></span></p>\n\n<p class=\"font_8\" style=\"text-align: justify;\"><span style=\"color:#000000;\"><span style=\"font-family:open sans,sans-serif\"><span class=\"wixGuard\">​</span></span></span></p>\n\n<p class=\"font_8\" style=\"text-align: justify;\"><span style=\"color:#000000;\"><span style=\"font-family:open sans,sans-serif\"><span style=\"font-size:16px\"><span style=\"font-weight:bold\">Get your own mobile phone</span></span><br />\nWhen making or receiving private calls or arranging escape plans, try not to use a shared or family mobile phone because the mobile phone bill and the phone log might reveal your plans to an abuser. Consider using a prepaid phone card so that you won&#39;t get numbers listed on your bill.</span></span></p>\n\n<p class=\"font_8\" style=\"text-align: justify;\"><span style=\"color:#000000;\"><span style=\"font-family:open sans,sans-serif\"><span class=\"wixGuard\">​</span></span></span></p>\n\n<p class=\"font_8\" style=\"text-align: justify;\"><span style=\"color:#000000;\"><span style=\"font-family:open sans,sans-serif\"><span style=\"font-weight:bold\"><span style=\"font-size:16px\">Ask about your records and data</span></span><br />\nAsk government agencies about their privacy policies regarding how they protect or publish your records. Request that courts, government, post offices and others restrict access to your files to protect your safety.<br />\n<br />\n<span style=\"font-size:16px\"><span style=\"font-weight:bold\">Get a private postbox and don&#39;t give out your real address</span></span><br />\nWhen asked by businesses, doctors, and others for your address, have a private post office box address or a safer address to give them.<br />\n<br />\n<span style=\"font-size:16px\"><span style=\"font-weight:bold\">Google yourself</span></span><br />\nSee if your private contact information is can be found online. Go to Google and do a search for your name in quotation marks: &quot;Full Name&quot;<br />\n<br />\n<span style=\"font-size:16px\"><span style=\"font-weight:bold\">Save evidence and consider reporting abuse or stalking</span></span><br />\nMessages left via texts/answering machines can be saved as evidence of stalking or abuse. Keep a record of all suspicious incidents. You can report abuse, violence, threats, stalking or cyber-stalking to police and the abuser can be charged with a criminal offence, or police can assist with applying for an Intervention Order. Cyberstalking is illegal in Victoria.<br />\n<br />\n<span style=\"font-size:16px\"><span style=\"font-weight:bold\">Legal intervention for cyberstalking</span></span><br />\nIn 2003, Victoria was the first state to amend its Crimes Act to add &lsquo;cyber-stalking&#39;. The definition of the crime of stalking now includes stalking a person on the internet or via email, impersonating another person in cyberspace, posting false information about them on the web and publishing offensive material electronically.</span></span></p>\n\n<p class=\"font_8\" style=\"text-align: justify;\"><span style=\"color:#000000;\"><span style=\"font-family:open sans,sans-serif\">For more information please follow the link below to the National Network to End Domestic Violence USA.</span></span></p>\n\n<p class=\"font_8\" style=\"text-align: justify;\"><span style=\"color:#000000;\"><span style=\"font-family:open sans,sans-serif\"><span style=\"text-decoration:underline\"><a dataquery=\"#textLink_iv7i1wy5\">http://www.nnedv.org/resources/safetynetdocs/technology-safety-plan.html</a></span>&nbsp;&nbsp;<br />\n<br />\n<br />\n<br />\n<span style=\"font-style:italic\"><span style=\"font-weight:bold\">Credits</span><br />\nThe information above was adapted from Technology Safety Planning with Survivors: Tips to discuss if someone you know is in danger (2005), by the Safety Net: National Safe &amp; Strategic Technology Project at the National Network to End Domestic Violence (USA). It was adapted by CRDVS Inc. with permission from the Safety Net Project<span style=\"text-decoration:underline\"><a dataquery=\"#textLink_iv7i1wy51\">&nbsp;</a></span></span></span></span></p>\n\n<p class=\"font_8\" style=\"text-align: justify;\"><span style=\"color:#000000;\"><span style=\"font-family:open sans,sans-serif\"><span style=\"font-style:italic\">The information contained in this website is for general information purposes only. The information is provided by CRDVS Inc. and while we endeavour to keep the information up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information, products, services, or related graphics contained on the website for any purpose. Any reliance you place on such information is therefore strictly at your own risk.</span></span></span></p>\n\n<p class=\"font_8\" style=\"text-align: justify;\"><span style=\"color:#000000;\"><span style=\"font-family:open sans,sans-serif\"><span style=\"font-style:italic\">In no event will we be liable for any loss or damage including without limitation, indirect or consequential loss or damage, or any loss or damage whatsoever arising from loss of data or profits arising out of, or in connection with, the use of this website.</span></span></span></p>\n\n<p class=\"font_8\" style=\"text-align: justify;\"><span style=\"color:#000000;\"><span style=\"font-family:open sans,sans-serif\"><span style=\"font-style:italic\">Through this website you are able to link to other websites which are not under the control of CRDVS Inc. We have no control over the nature, content and availability of those sites. The inclusion of any links does not necessarily imply a recommendation or endorse the views expressed within them.</span></span></span></p>\n\n<p class=\"font_8\" style=\"text-align: justify;\"><span style=\"color:#000000;\"><span style=\"font-family:open sans,sans-serif\"><span style=\"font-style:italic\">Every effort is made to keep the website up and running smoothly. However, CRDVS Inc. takes no responsibility for, and will not be liable for, the website being temporarily unavailable due to technical issues beyond our control.</span></span></span></p>","stylesMapId":"CK_EDITOR_PARAGRAPH_STYLES","linkList":["#textLink_iv7i1wy5","#textLink_iv7i1wy51"]},"ob2q2":{"type":"Page","id":"ob2q2","metaData":{"isPreset":false,"schemaVersion":"1.0","isHidden":false},"title":"TECHNOLOGY SAFETY","hideTitle":true,"icon":"","descriptionSEO":"","metaKeywordsSEO":"","pageTitleSEO":"","pageUriSEO":"technology-safety","hidePage":false,"isMobileLandingPage":false,"underConstruction":false,"tpaApplicationId":0,"pageSecurity":{"requireLogin":false,"passwordDigest":"","dialogLanguage":""},"isPopup":false,"indexable":true,"isLandingPage":false,"pageBackgrounds":{"desktop":{"custom":true,"ref":"#ob2q2_desktop_bg","isPreset":true},"mobile":{"custom":true,"ref":"#ob2q2_mobile_bg","isPreset":true,"mediaSizing":"viewport"}},"translationData":{"uriSEOTranslated":false}},"ob2q2_desktop_bg":{"type":"BackgroundMedia","id":"ob2q2_desktop_bg","metaData":{"isPreset":false,"schemaVersion":"2.0","isHidden":false},"color":"{color_17}","alignType":"top_left","fittingType":"legacy_tile","scrollType":"scroll","colorOverlay":"","colorOverlayOpacity":0.0},"ob2q2_mobile_bg":{"type":"BackgroundMedia","id":"ob2q2_mobile_bg","metaData":{"isPreset":false,"schemaVersion":"2.0","isHidden":false},"color":"{color_17}","alignType":"top_left","fittingType":"legacy_tile","scrollType":"scroll","colorOverlay":"","colorOverlayOpacity":0.0},"textLink_iv7i1wy5":{"type":"ExternalLink","id":"textLink_iv7i1wy5","metaData":{"isPreset":false,"schemaVersion":"1.0","isHidden":false},"url":"http://www.nnedv.org/resources/safetynetdocs/technology-safety-plan.html","target":"_blank"},"textLink_iv7i1wy51":{"type":"ExternalLink","id":"textLink_iv7i1wy51","metaData":{"isPreset":false,"schemaVersion":"1.0","isHidden":false},"url":"http://crdvs.org.au/pdf/THE%20CURRENT%20STALKING%20LAWS%20IN%20QUEENSLAND.pdf","target":"_blank"}},"design_data":{},"behaviors_data":{},"connections_data":{},"theme_data":{},"component_properties":{"mobile_propItem-iv7i122z":{"type":"WRichTextProperties","metaData":{"schemaVersion":"1.0","autoGenerated":false},"brightness":1.0,"packed":true},"mobile_propItem-iv7i1q9z":{"type":"WRichTextProperties","metaData":{"schemaVersion":"1.0","autoGenerated":false},"brightness":1.0,"packed":true,"overrideAlignment":"center"},"propItem-iv7g84j8":{"type":"PageProperties","metaData":{"schemaVersion":"1.0","autoGenerated":false},"desktop":{"minHeight":1891}},"propItem-iv7i122z":{"type":"WRichTextProperties","metaData":{"schemaVersion":"1.0"},"brightness":1.0,"packed":true},"propItem-iv7i1q9z":{"type":"WRichTextProperties","metaData":{"schemaVersion":"1.0"},"brightness":1.0,"packed":true}},"mobile_hints":{"mobileHints-j7vdfxcd":{"type":"MobileHints","id":"mobileHints-j7vdfxcd","hidden":false}}},"title":"TECHNOLOGY SAFETY","pageUriSEO":"technology-safety"}