![](https://cdn.statically.io/img/static.wixstatic.com/media/c4e6d5_b7deecbee5f3497a8fd9e73008db6a95~mv2.jpg/v1/fill/w_61,h_41,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/c4e6d5_b7deecbee5f3497a8fd9e73008db6a95~mv2.jpg)
Resources |
Request a training for your organization.
We facilitate trainings and workshops for higher education institutions, direct service providers, and technologists who wish to learn about technology abuse. This is not for requesting direct service or assistance for individuals experiencing abuse, and we unfortunately do not have the capacity to respond to such requests. Your organization can request a training by filling out this link.
CETA Trainings and Workshops Request Form.
Access our free resources.
The below resources are free to download and use. We use many of them as part of our Computer Security Clinic for IPV survivors in New York City.
If you are looking for resources on starting or maintaining your own technology abuse clinic, then visit the Technology Abuse Clinic Toolkit site.
Our step-by-step how-to guides can be especially useful for providing help remotely.
Compiled by CETA Volunteers
iPhone, Android, and Email Accounts
Android Safety Guide
Gmail + Google Safety
iCloud General Safety
Checking your smartphone or tablet for spyware
Understanding Your iCloud Data
Hotmail - Checking Privacy and Security Settings
Yahoo - checking for suspicious logins
Internet and Social Media
Google Chrome - privacy checkup
Facebook - turning on extra security
Facebook - cleaning up privacy and security problems
Instagram - cleaning up privacy and security problems
WhatsApp - security tips
TikTok - Checking for Account Compromise and Increasing Security
Twitter -Account Security and Privacy
IoT, Trackers, and Misc.
Disconnecting from your ex-partner - a checklist (short version)
Disconnecting from your ex-partner - a checklist (long version)
General IoT and Smart Home Devices Security Tips
Airtag, Tile, and Bluetooth Trackers [new]