Signed in as:
filler@godaddy.com
Signed in as:
filler@godaddy.com
This secure upload allows you to share documents with ProtecHer’s team to activate tailored safety resources, verify eligibility for support services, and ensure your rights are protected. Your document is encrypted and never shared without your consent.
This section offers direct access to external organizations, support groups, and educational resources that extend ProtecHer’s mission of safety, empowerment, and healing. Whether you're seeking legal advocacy, mental health care, housing support, or peer connection, these curated links connect you to verified partners and community-based services - confidentially and without judgment.
This section offers easy-to-access guides, legal templates, and educational materials to help you understand relationship health, recognize abuse, and navigate protective legal processes. Whether you're preparing to file a restraining order, learning about consent, or exploring the cycle of abuse, these documents are here to support your next step - confidentially and on your own terms.
This section is designed to help survivors, supporters, and learners build knowledge and confidence through clear, compassionate education. Whether you're navigating abuse, supporting someone who is, or seeking to deepen your understanding, Learn offers foundational tools to guide your journey.
By uploading, you acknowledge and consent to the following:
Your privacy matters. If you have questions about how your information is used or stored, please contact us before uploading.
1-800-656-HOPE (4673)
1-866-331-9474
1-866-331-8453 (TTY)
1-855-812-1001
Instant messenger: DeafHotline
1-888-373-7888
711 (TTY)
Text: 233733
1-800-RUNAWAY (800-786-2929)
1-855-VICTIM (1-855-484-2846) (call or text)
1-844-7NATIVE (762-8483)
A pattern of threats, isolation, and surveillance used to dominate another person.
Use of control over contraception, pregnancy, or reproductive health decisions.
Manipulating someone into doubting their own perceptions, memory, or sanity.
Misuse of devices, apps, and online platforms to harass, stalk, or monitor.
Continued harm after a relationship ends—often via legal tactics, custody interference, or threats.
Abuse is rooted in one party exerting dominance -emotionally, physically, financially, or digitally.
Often follows a pattern: tension-building → explosive incident → honeymoon phase → calm → repeat.
Includes isolation, threats, surveillance, gaslighting, and manipulation to erode autonomy.
Survivor reactions are adaptive, not irrational. They reflect attempts to stay safe, preserve dignity, or maintain stability.
A coping mechanism to reduce fear or shame.
Emotional bonds and trauma bonding can coexist with harm.
Often a result of shame, fear of judgment, or abuser-imposed isolation.
Trauma responses, especially when safety feels threatened.
Abusers may restrict access to money or employment.
Survivors may cling to apologies or promises during the honeymoon phase.
Survivor reactions are adaptive, not irrational. They reflect attempts to stay safe, preserve dignity, or maintain stability.
Technology-facilitated abuse (TFA) is a growing form of harm where perpetrators misuse digital tools to exert control, intimidate, stalk, or exploit others—often in the context of domestic violence, sexual assault, or coercive relationships. Here's a structured overview tailored for trauma-informed advocacy and survivor support:
Tracking someone’s location, online activity, or communications using GPS, spyware, or social media
Sharing intimate images without consent (e.g., “revenge porn”), deepfakes, or hidden recordings.
Flooding survivors with threatening, sexual, or coercive messages—often across multiple platforms.
Hacking phones, blocking access to accounts, or controlling smart home devices.
Muting avoids alerting the abuser while limiting exposure.
Adds a layer of protection to email, banking, and social media accounts.
Devices may be compromised—use tech support or advocates to assess safely.
Reduce online visibility of your location, workplace, or routines.
Save screenshots, voicemails, and timestamps for legal or advocacy use.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.