

Connected devices and cyber-surveillance technology can track who is in your home and what they are doing. use fitness watches to connect to a network to monitor your own movement and goals.Īn abuser could misuse connected devices to monitor, harass, isolate and otherwise harm you.use devices that allow you to control your car’s GPS device, locking mechanism, sound system, or allow you to start your car remotely or.



An abuser could use his/her computer (or other device that is connected to the Internet, such as a phone or tablet) to hack into your devices. However, cyber-surveillance also allows connected devices to play a role in how people and places are monitored. These devices and systems offer tools you can use to increase your own safety and convenience. Devices may be connected through a home network, the Internet and WiFi, Bluetooth, or other means. For example, you may have a television connected to the Internet that you can control from an app on your cell phone or tablet or appliances like coffee machines can be connected to a network and controlled remotely with another device (such as your computer or phone). Devices used for cyber-surveillance are generally connected to each other and to a device or app that can control them. This type of connected technology has also been called the “Internet of Things” (IoT). Cyber-surveillance is when a person uses “smart” or “connected” devices that communicate through a data network to monitor people or places.
