Victim Services Toronto | Resources
145
page-template-default,page,page-id-145,ajax_fade,page_not_loaded,,qode-child-theme-ver-1.0.0,qode-theme-ver-9.4.2,wpb-js-composer js-comp-ver-6.9.0,vc_responsive
 

Resources

Safety Planning

To help you prepare for your safety in a variety of situations, we have created the following checklists for you to consider.

These lists are in PDF format and can easily be printed or saved to your computer for reference.

Clicking on the links below will open the PDF in a new browser window. These files are also available in other languages by clicking the links on the right.

Our Safety Planning Booklet is available in the following translations:

Chinese | French | Hungarian | Japanese | Korean | Polish | Portuguese | Spanish | Russian | Filipino

Additional Support Resources

Medical Assistance
Housing or Shelter
Funeral Assistance / Information
Further Assistance & Information

Please, call our office at 416-808-7066 so we can provide you with counselling options close to your place of residence.

You can also contact following numbers 24/7:

Safety Tips

To receive a copy of the translated Safety Planning Booklet, please contact the High Risk Support Group by telephone at: 416-808-7077.

Please note that the only way you can be sure that your abuser cannot track your computer usage is to use a secure public computer. It may be safer to access information on the Internet from a friend’s house, your workplace, a library or Internet cafe.

If you suspect your activities are being monitored, they probably are. Abusive people are often controlling and want to know your every move. You do not need to be a computer programmer or have special skills to monitor someone’s computer activities. Anyone can do it and there are many ways to monitor your activities even without having direct access to your computer.

Browsers like Internet Explorer and Firefox are designed to leave traces behind indicating where you have been and what you have been looking at on the Internet.

In general, you want to erase two things:

  1. Your Cache (this is where the computer stores copies of files you’ve recently looked at with your browser).
  2. Your History List (this is a single file containing the addresses of the places you’ve recently visited).Clear Your Browser’s Cache

Here’s how to reduce the chances that your net travels will be traced.

  • If you use Internet Explorer:
    • Pull down the tools menu, select Internet Options. Choose the General tab, under Temporary Internet Files, click on “Delete Files”. Under History, click on “Clear History” then click “OK”.
  • If you use Google Chrome:
    • Pull down the tools menu.  Select ‘Clear Browsing Data.’ In the pop-up box that appears, select the check boxes for the types of information that you want to remove. Click ‘Clear Browsing Data.’
  • If you use Netscape:
    • Pull down the Edit menu, select Preferences. Under Navigator, click on the “Clear History” button. Then double click on Advanced, select Cache. Click on “Clear Disk Cache”.
  • If you use AOL:
    • Pull down My AOL, select Preferences. Click on the WWW icon under Temporary Internet Files, click on “Delete Files”. Under History, click on “Clear History”.
  • If you use Mozilla Firefox:
    • From the toolbar at the top of the page select “Tools”, then click on “Options” and click on “Privacy”. Under the history tab, click on “Clear Browsing History. Under the Cookies tab, click on “Clear Cookies”.
Internet Child Exploitation Brochure, BOOST

This brochure provides information about counseling for victims and families who have experienced Internet child exploitation

Be Web Aware

Increase your awareness of how your kids are using the Internet and the issues they may encounter along the way.

Email is not a safe or confidential way to communicate. If an abuser has access to your email account, they may be able to read your incoming and outgoing mail. If you believe your account is secure, make sure you choose a password that an abuser will not be able to guess.

If you must use email to correspond regarding abuse and are concerned about your abuser recovering your deleted email, it may be safer to sign up for a free web based email account from Yahoo, Hotmail, or Gmail to name a few.

It will be more difficult for an abuser to obtain deleted emails if one of those companies are hosting your email. Just be sure that your browser is not set to remember your password or you abuser will have access to your email account.

If an abuser sends you threatening or harassing e-mail messages, they may be printed and saved as evidence of this abuse. The messages may constitute an offense.

Do not use a name or password that contains any identifying information (for example, names, nicknames, initials, birthdates, postal code, etc.).Use a name and password that contains a random mix of letters, CAPITAL letters and numbers (for example, K8hsy6*).

Make sure you can remember the user name and password.

Check your cell phone settings. There are cell phone technologies your abuser can use to listen in on your calls or track your location. Your abuser can use your cell phone as a tracking device if it has GPS, is in “silent mode,” or is set to “auto answer.” So consider turning it off when not in use or leaving it behind when fleeing your abuser. Your abuser is capable of putting hidden tracking apps on your phone quickly, cheaply and without your knowledge. If you suspect this is the case take your phone to your nearest service provider and have them run a check. If anything is found it can be deleted.

Consider purchasing a prepaid cell phone or another cell phone that your abuser doesn’t know about.

+ Internet Safety

To receive a copy of the translated Safety Planning Booklet, please contact the High Risk Support Group by telephone at: 416-808-7077.

Please note that the only way you can be sure that your abuser cannot track your computer usage is to use a secure public computer. It may be safer to access information on the Internet from a friend’s house, your workplace, a library or Internet cafe.

If you suspect your activities are being monitored, they probably are. Abusive people are often controlling and want to know your every move. You do not need to be a computer programmer or have special skills to monitor someone’s computer activities. Anyone can do it and there are many ways to monitor your activities even without having direct access to your computer.

Browsers like Internet Explorer and Firefox are designed to leave traces behind indicating where you have been and what you have been looking at on the Internet.

In general, you want to erase two things:

  1. Your Cache (this is where the computer stores copies of files you’ve recently looked at with your browser).
  2. Your History List (this is a single file containing the addresses of the places you’ve recently visited).Clear Your Browser’s Cache

Here’s how to reduce the chances that your net travels will be traced.

  • If you use Internet Explorer:
    • Pull down the tools menu, select Internet Options. Choose the General tab, under Temporary Internet Files, click on “Delete Files”. Under History, click on “Clear History” then click “OK”.
  • If you use Google Chrome:
    • Pull down the tools menu.  Select ‘Clear Browsing Data.’ In the pop-up box that appears, select the check boxes for the types of information that you want to remove. Click ‘Clear Browsing Data.’
  • If you use Netscape:
    • Pull down the Edit menu, select Preferences. Under Navigator, click on the “Clear History” button. Then double click on Advanced, select Cache. Click on “Clear Disk Cache”.
  • If you use AOL:
    • Pull down My AOL, select Preferences. Click on the WWW icon under Temporary Internet Files, click on “Delete Files”. Under History, click on “Clear History”.
  • If you use Mozilla Firefox:
    • From the toolbar at the top of the page select “Tools”, then click on “Options” and click on “Privacy”. Under the history tab, click on “Clear Browsing History. Under the Cookies tab, click on “Clear Cookies”.
+ Internet & Children
Internet Child Exploitation Brochure, BOOST

This brochure provides information about counseling for victims and families who have experienced Internet child exploitation

Be Web Aware

Increase your awareness of how your kids are using the Internet and the issues they may encounter along the way.

+ Email Safety

Email is not a safe or confidential way to communicate. If an abuser has access to your email account, they may be able to read your incoming and outgoing mail. If you believe your account is secure, make sure you choose a password that an abuser will not be able to guess.

If you must use email to correspond regarding abuse and are concerned about your abuser recovering your deleted email, it may be safer to sign up for a free web based email account from Yahoo, Hotmail, or Gmail to name a few.

It will be more difficult for an abuser to obtain deleted emails if one of those companies are hosting your email. Just be sure that your browser is not set to remember your password or you abuser will have access to your email account.

If an abuser sends you threatening or harassing e-mail messages, they may be printed and saved as evidence of this abuse. The messages may constitute an offense.

+ Password Safety

Do not use a name or password that contains any identifying information (for example, names, nicknames, initials, birthdates, postal code, etc.).Use a name and password that contains a random mix of letters, CAPITAL letters and numbers (for example, K8hsy6*).

Make sure you can remember the user name and password.

+ Cell Phone Safety

Check your cell phone settings. There are cell phone technologies your abuser can use to listen in on your calls or track your location. Your abuser can use your cell phone as a tracking device if it has GPS, is in “silent mode,” or is set to “auto answer.” So consider turning it off when not in use or leaving it behind when fleeing your abuser. Your abuser is capable of putting hidden tracking apps on your phone quickly, cheaply and without your knowledge. If you suspect this is the case take your phone to your nearest service provider and have them run a check. If anything is found it can be deleted.

Consider purchasing a prepaid cell phone or another cell phone that your abuser doesn’t know about.

Online Library

Media
 If the Media Calls: A Guide for Crime Victims & Survivors, Canadian Resource Centre for Victims of Crime (CRCVC)

This publication provides victims with information about the focus of media; the impact of media on victims; the risks/benefits of speaking to the media; modern technology; tips for interacting with the media and high-profile cases.

Court
Learn about Court with Cory

A site for children preparing for court

Courtrep.ca

A site for youth preparing for court

Sexual Assault
Resources for Sexual Assault Survivors
Suicide
What kids want to know

When a parent dies by suicide

Grief
Seven Simple Ways to Support Those Who Grieve. The Personal Account of a Bereived Mother

Written by Police Constable Patricia Hung, this guide offers seven simple suggestions to help a friend or a family member who is grieving.

Privacy Statement

We Respect Your Privacy

Victim Services Toronto is the sole owner of the information collected on this site. We will not sell, share or rent this information to others.  Victim Services Toronto collects information from users at several different points on its Web site.  We use IP addresses to analyze trends, administer the site, track users’ movements, and gather broad demographic information for aggregate use.  IP addresses are not linked to personally identifiable information. Information collected will be used to improve the content of the website and will not be shared for commercial purposes.

 

We are committed to maintaining the confidentiality of our donors and website visitors.

 

Periodic e-mails, including information on Victim Services Toronto programs or upcoming events, may be sent to you if you supply us with your e-mail address online. If you do not wish to receive these e-mails, please let us know by calling 416-808-7845 or info@victimservicestoronto.com.

 

If you have supplied your telephone number online, you may receive telephone contact from us if you have requested further information.

 

Should you wish to be removed from our fundraising list(s) at any time, please contact us at 416-808-7845.

 

This Site may contain links to other web sites. Upon entering other sites, you are subject to the privacy and security policies of those sites. This policy identifies the privacy practices of Victim Services Toronto Site only.