A safety plan is a personalized, practical plan that includes strategies for survivors to help reduce risk of harm in relationship violence or stalking related situations. Our program can safety plan with survivors, friends, family members or anyone who is concerned about their safety or the safety of another person related to relationship violence or stalking. To schedule an appointment or get more information, call (517) 355-1100. You may also wish to check out a safety plan template.
Stalking is unpredictable and dangerous. No two stalking situations are alike. There are no guarantees that what works for one person will work for another, yet you can take steps to assess the situation and increase your safety.
Threats to Your Safety:
The risks to your safety are higher if the person stalking you has weapons, has threatened suicide or to kill you, has told you about a history of hurting others, and/or if there has been a history where he/she has physically or sexually assaulted you.
Options You May Consider:
People Search is a database that has information about faculty, staff, retirees, and students. The database also contains contact information for people affiliated with the university, such as Guest Scholars. Note that some individuals’ listings are restricted and therefore you will not be able to find them using this search function. Source information provided to People Search is updated each business day. It may take a few days for updates to take effect. To expedite an update, please contact the MSU IT Service Desk via online form or by calling (517) 432-6200.
How To Modify Your Info in People Search:
Students:
Faculty/Staff/Retiree:
Technology plays a major role in our world today. For survivors, technology can present both challenges and benefits. Technology, in its various forms, offers essential tools survivors can use to access help, strategically maintain safety and privacy, and remain connected to family and friends. In some cases, it can also be used to prove guilt and hold offenders accountable.
On the other hand, the safety and privacy of survivors is often compromised by those who misuse technology to monitor, stalk, abuse and control them. There are many things to consider when it comes to technology safety. The information below is intended to provide an overview of some concerns survivors may face.
Tech-enabled abuse can include any of the following:
• Making unwanted phone calls or sending unwanted texts
• Making threats, intimidating, humiliating, or spreading rumors using technology
• Impersonating the survivor or someone in their life
• Demanding passwords or access to private accounts such as online banking, social media and email
• Monitoring an individual’s phone use
• Installing location monitoring through tracking devices or apps
• Taking intimate photos or videos of a partner without permission
• Threatening to distribute and/or distributing intimate images without consent
• Manipulating or forcing a partner to take photos or videos
• Installing cameras throughout the home
• Using social media to monitor or track someone
Internet History:
Whenever you browse online, a digital footprint is created which maps out your online history such as websites visited, or anything searched. Online history is easily viewable to anyone with access to your cell phone, computer, tablet, laptop, etc. Clearing the history, and emptying the cache file of saved information can be done in a few steps and is a great way to prevent being tracked. Click to view information specific to various types of browsers.
Using a Safe Computer:
Safe computers can be found at your local library, Internet cafe, shelter, workplace, or computer technology center; avoid using shared computers when researching things like travel plans, housing options, legal issues, and safety plans. Using safe browsing practices (like using a VPN) can help prevent abusive partners from tracking your Internet history.
Cell phones provide quick access to resources and information, but it can also give other people instant updates on your whereabouts, habits, and activities. Cell phones can be used to track your location and retrieve call and text history.
If you’re in an abusive relationship, you may consider purchasing a pay-as-you-go phone and keep it in a safe place for private calls. Use a password on your phone and update it regularly. If you are concerned that your partner may be secretly monitoring your phone, consider checking it for any spyware that may be downloaded.
When using mobile devices (phones, tablets, laptops) location services are often activated in order to help locate your device. This can allow others to find your device and you. Turning off your location services can help keep others from knowing your location thus keeping you safe.
Click for detailed steps to turn off location services on your device.
• Consider using a safer device (one that the person who is abusive does not have physical assess to)
• Change user names and passwords regularly
• Change the answers to your security questions to things that only you would know.
• Save or document threatening messages, photos, videos, or voicemails as evidence of abuse.
• Be mindful when “checking in” to places online, either by sharing your location in a post or posting a photo with distinguishable backgrounds.
• Once you share a post or message, it’s no longer under your control. Abusive partners may save or forward anything you share, so be careful sending content you wouldn’t want others to see.
• Know and understand your privacy settings. Social media platforms allow users to control how their information is shared and who has access to it. These settings are often customizable and may be found in the privacy section of the website. Keep in mind that some apps may require you to change your privacy settings or share your location in order to use them.
• Note that some people who are abusive will call from unknown or blocked numbers, especially if they suspect or know you are avoiding them.
• Ask your friends to always seek permission from you before posting content that could compromise your privacy. Do the same for them.
Posts on social media are never truly private, no matter your settings: once it’s online, it’s no longer under your control. Be protective of your personal information and remember that phone numbers, addresses, handles, and personal details (like birth date, schools you attended, employers, and photos with landmarks) may make it easier for someone to reach you.
Set boundaries and limits, and ask people not to post personal information, photos, or check-ins you aren’t comfortable with.
Check your social media settings to make sure your privacy settings are strict, and disable the ability for other people to tag you in their photos or posts. Similarly, don’t post information about people without their consent – you could jeopardize their safety or the safety of others.