Site Pages

GNWS would like to our website Developers and Designers:

  • GNWS logo designer: Oscar Oramas
  • Website Management: Cynthia Fraser
  • Website Workgroup: Karen Bentley, Cynthia Fraser, Margarita Guille, Nicola Harwin, Kaofeng Lee, Krista Niemczyk, Colleen Schmitt, Jan Reimer.
  • Content Contribution: GNWS Interim Board
  • Website Developer: Nate West, bizzynate.com.
  • Website Design: Nate West and Bakari Kamau, bizzynate.com

GNWS poster1web 600x896

GNWS understands how important privacy is, especially to women and their children who are fleeing or have fled violence and abuse.  We will not share any of your personally identifiable information with 3rd parties without your informed consent. To best learn what you want, if we ask you to share your personal information with us, we might ask you several questions about when and why you want us to contact you.  For example, we might ask: "Would you like us to send you GNWS announcements about future world conferences and other activites and campaigns to support your lifesaving work in women's shelters?" and  "Do you want to receive that information electronically via a listserv?"

If you are in danger, please try to use a safer computer or phone that someone abusive does not have direct or remote access to.

  • If you think your activities are being monitored, they probably are. Abusive people are often controlling and want to know a victim's every move.
  • There are many ways to monitor computers and phones with spyware, keystroke loggers and hacking tools. An abusive person does not need to be a computer expert to monitor someone’s computer and Internet activities. Anyone can do it.
  • It is not possible to delete or clear all the “footprints" of your computer or online activities. If you are being monitored, it may be dangerous to change your computer or online behaviors. For example, you might not want to suddenly delete your entire Internet history if that is not your regular habit.
  • If you think you may be monitored on your home computer, be careful how you use that computer since the abuser or perpetrator might become suspicious. You may want to keep using the monitored computer for innocuous activities, like looking up the weather.
  • Use a safer computer to research an escape plan, look for new jobs or apartments, bus tickets, or to reach out and ask for help.
  • Email, Instant Messaging (IM) and Text Messaging are not confidential ways to talk to someone about the danger or abuse in your life. If possible, please call a hotline to discuss safety risks first. If you use email or IM, please use a safer computer and an account the abuser does not know about.
  • Computers can store a lot of private information about what you view online, the emails and instant messages you send, any internet-based phone or IP-TTY calls you make, online banking and purchases, and many other activities.
  • It might be safer to use a computer in a public library, at a trusted friend’s house, or an Internet Café.

Want to learn more? NNEDV's Safety Net Project has more Technology Safety Resources.

Source: Reproduced from NNEDV Safety Net Project's Internet and Computer Safety.

GNWS is collecting resources of benefit to shelters and networks and the victims they serve. This includes information about safety plans, hotlines, shelter networks and practices,  laws protecting victims, justice system and community responses, statistics, and international agreements and work to combat violence against women and girls.

Below are links to some other online collections of such resources: