Computer Safety

Vector Computer Safety Concept

Tips for erasing your Internet “footprints”

It is not possible to delete or clear all computer “footprints.”  Even if you take precautions, abusers can oftentimes still follow your online activities. Here are some guidelines to reduce the chances that your Internet use is traced. 

  • Warning – Computers Track Everything

Computers, browsers, and other software programs store history about what you do, what documents you use, what websites you visit, what images you see, and other activities. All history is stored in your hard drive. Both your browser and computer keep track of your activity. It may be impossible to completely clear this stored information from your computer.

  • Abusers Monitor Computers

If you think your computer activities are being monitored, they probably are. You don’t need to be a computer programmer or have special skills to monitor someone’s computer activities.

  • Use a Safe Computer

These are some locations that will be safer than your home: a public library, a community center, a friend’s house, or an Internet Cafe.

  • Email

Email is not a secure or confidential means of communication. Changing your access passwords may help to keep an abuser from gaining access to your email, but calling Turning Point, the crisis line, or going in person are safer ways to get help.

  • Additional Tip

When you clear the cache (caches stores your data) and the history list, you erase ALL the information stored there, not just recent information. After you clear your history, visit sites your partner approves of. He may be less likely to notice missing old information.

Clear Web Browser’s Cache

Browser Help Menu

The best place to get information about clearing your cache is in your browser’s ‘Help’ menu. You can also search the Internet to find how to clear your cache. After you have read these instructions and understand what to do, please close your Internet browser. Restart and then follow the instructions to clear your cache, making sure that you are not currently on the Turning Point website.

Cell phones also keep records of your activity. Your abuser may monitor your phone, so make sure you delete any potentially harmful data. Use other phones or landlines as an extra precaution.


Traditional ”corded” phones are more private than cell phones or cordless phones.
Taking all of the actions on this page may not prevent an abuser from discovering your email and Internet activity.

For Your Safety

Erase Internet footprints – prevent abusers finding where you visit online.
Click ‘Escape’ button for a quick exit to
0-000-000-0000 24 Hour McHenry County Crisis Line
0-000-000-SAFE National Crisis Hotline