Skip to main content
HomeTake control of technology to end gender-based violence
  • en
  • fr
  • es

Search form

  • Know more
    • Extortion
      • Related Rights
      • Strategies
    • Cyberstalking
      • Related rights
      • Strategies
    • Hate speech
      • Related Rights
      • Strategies
    • Be safe
      • Self-care
    • How to help
      • Talking to survivors
      • Privacy and anonymity
      • Data storage
    • Help a Friend
  • Take Action
    • Current Campaign
    • Action Library
    • Campaign Kit
      • Organise!
      • Build the movement!
      • Speak up!
      • Measure Impact!
      • Learn More!
    • Campaign Materials
      • Memes
  • Local Campaigns
    • Share your campaign
  • News & views
  • About
    • Campaign FAQ
    • How to register and upload
  • My Account
Meet our djs
Museum of Movements
Illustration of a computer screen with a hand typing, exploring options to defend against stalking. Options on the screen include name alert, block and report a problem. A glass of water is on the left side of the computer and a plant is on the right. Illustration by Laura Ibáñez López.
Protecting against stalkerware and exposure of private images
Search for “How to spy on my spouse” on the internet (or replace “spouse” with “lover”, “girlfriend”, or “boyfriend”) and it reveals a disturbing reality. There are scores of results for persons who suspect their partners of infidelity, or are frustrated and heart-broken over an unexpected or messy…
Read more
Illustration of a computer screen with a hand typing, exploring options to defend against stalking. Options on the screen include name alert, block and report a problem. A glass of water is on the left side of the computer and a plant is on the right. Illustration by Laura Ibáñez López.
Tech-facilitated intimate partner stalking countermeasures: Part 1
Note: Searching for, removing or disabling the means of stalking may alert the stalker. This may potentially cause the abuse to escalate, pose a risk to the target’s physical safety, and close their avenues to seek help or exit the relationship. If you are someone experiencing stalking or…
Read more
Illustration of a computer screen with a hand typing, exploring options to defend against stalking. Options on the screen include name alert, block and report a problem. A glass of water is on the left side of the computer and a plant is on the right. Illustration by Laura Ibáñez López.
Tech-facilitated intimate partner stalking countermeasures: Part 2
This is the third article in this series. The previous articles explained stalkerware and how it may lead to image-based abuse, some popular techniques of stalking that involve commonly used apps, features, online services and devices, and potential countermeasures to them. Note: Searching for,…
Read more

Be safe

How to deal with privacy and anonymity
Photo by Jon Feinstein What privacy & anonymity have to do with tech-related VAW Anonymity and digital privacy are a critical part of human rights, but they are also connected to cyber crime, such as fraud, identity theft, cyber stalking, bullying, phishing and trolling. Survivors…
Read more
How to store data
What data storage has to do with tech-related VAW Dealing with incidents of tech-related violence involves reporting, investigating and collecting evidence. Collecting data is critical, as tech-related VAW is an increasing but under-analysed issue due to lack of valuable data. Record-keeping can…
Read more
How to talk to survivors
Why it's important to know how to talk to survivors People who are not trained to talk to survivors often say the wrong thing even when they mean well. Some people do not understand that violence online is equal to, and sometimes has an even greater impact than, violence offline. Survivors often…
Read more

Help a friend

Hey! Is your friend being attacked online? Talk to her! How is she? What does she want to do? When? What doesn't she want to do?

More Info

Digital Solidarity Quilt

Get quilting! The digital quilt speaks of our collective solidarity, recognition & refusal to let voices and struggles of Women Human Rights Defenders be silenced.

View & Contribute
Mahsa Shekarloo

Digital Rights Activists

Stack the playing card deck! We've started this deck of playing cards reflecting women's contributions to information and communication technologies, and we need you to stack the deck with remarkable women.

Shuffle & Contribute
Take Back The Tech! is a call to everyone, especially women and girls, to take control of technology to end violence against women.
Learn more

Home
News & Views
About
Contact

My account

 
Association for Progressive Communication UN Women GEM-TECH BOBS Awards - Best of Online Activism Prix Ars Electronica The Womanity Foundation GenderIT End Violence Against Women

Footer menu

  • Contact
  • Copyleft
  • FAQ
  • Privacy
Design by Adaptive Theme