top of page

Resources |

Request a training for your organization.

We facilitate trainings and workshops for higher education institutions, direct service providers, and technologists who wish to learn about technology abuse. This is not for requesting direct service or assistance for individuals experiencing abuse, and we unfortunately do not have the capacity to respond to such requests. Your organization can request a training by filling out this link. 

CETA Trainings and Workshops Request Form.

​

Access our free resources. 

The below resources are free to download and use. We use many of them as part of our Computer Security Clinic for IPV survivors in New York City. 
 

If you are looking for resources on starting or maintaining your own technology abuse clinic, then visit the Technology Abuse Clinic Toolkit site.

​

Our step-by-step how-to guides can be especially useful for providing help remotely.​

Compiled by CETA Volunteers
iPhone, Android, and Email Accounts
​
Android Safety Guide
​
Gmail + Google Safety

iCloud General Safety
 
Checking your smartphone or tablet for spyware
​
Understanding Your iCloud Data
​
Hotmail - Checking Privacy and Security Settings
​
Yahoo - checking for suspicious logins
​
Internet and Social Media
Google Chrome - privacy checkup
​
Instead of maintaining guides for social media accounts which rapidly go out of date, we maintain a spreadsheet linking to common platforms in-house help pages. This spreadsheet was last updated in Fall 2024.
 
Social Media Privacy and Security Settings--Megalist
 

​​

​
IoT, Trackers, and Misc.

Disconnecting from your ex-partner - a checklist (short version)
​
Disconnecting from your ex-partner - a checklist (long version)

General IoT and Smart Home Devices Security Tips
​
Airtag, Tile, and Bluetooth Trackers [new]
​

Password managers

​

​

​

Step-by-step How-to Guides
Compiled by CETA Volunteers
bottom of page