Quick exit from our website
Smart browsing on computers
Web browsing
What is browser history?
Your browser history records every page you visit while browsing the internet. This log includes detailed information such as the date and time of each visit. Each browser provides its own method for accessing and managing this data, allowing you to review or delete your browsing history. If your device is shared, this could potentially expose your private browsing details to others. This is particularly concerning in situations of domestic abuse, where such information could be used to compromise your safety.
Deleting your browsing history
Clearing your browsing history can help protect your privacy, but it may also signal to others that you have something to hide, especially if you share your device. This can include the disappearance of saved passwords or website data, which might be noticed by other users of the device.
Warning about deleting cookies and address histories
Be aware that deleting cookies and history has risks, particularly if shared accounts are used, such as online banking. Removing cookies will log out of saved sessions, and clearing your browsing history might alert someone that you are trying to hide your online activities.
Find out how to delete your browsing history from the most commonly used browsers:
- Chrome: delete your browsing history
- Firefox: delete browsing, search and download history on Firefox
- Internet Explorer: deleting your web page history
- Microsoft Edge: view & delete browser history
- Safari: delete your browsing history
- Opera: deleting private data
Find out how to delete your browsing history from the most commonly used browsers on smart phones:
- How to clear history and cookies from Safari on your iPhone, iPad or iPod Touch
- Delete your Chrome browsing history on a iPhone or iPad
- Delete your Chrome browsing history on an android device
In order to avoid creating cookies and histories, you can use private browsing modes on most browsers.
Private browsing (incognito)
Using incognito mode ensures that no cookies are saved and no history is recorded. Most browsers offer this feature to enhance privacy.
- Chrome: browse in private with incognito mode
- Firefox: private browsing – using Firefox without saving history
- Internet Explorer: InPrivate browsing
- Safari: use private browsing windows
- Opera: browse incognito – how to open private window
- Microsoft Edge: InPrivate browsing
Toolbars
Remember, if you use a toolbar for searching, your searches may be stored. Find out how to delete your searched items from the following search engines:
If you receive threatening or harassing emails, consider printing and saving these as evidence of abuse. Emails you send are stored in the “Sent Items” folder. Unfinished emails are saved in the “Drafts” folder. If you respond to an email, the original message is typically included in your reply. Should you want to keep this private, print the email for your records and then delete it from your account.
When you delete an email, it’s not immediately removed from your email system. Instead, it is moved to a folder commonly labeled as “Deleted Items” or “Bin”. To permanently remove the email, you must empty this folder. Right-click on the email within the Deleted Items or Bin folder and select “delete” or “Delete forever” to ensure it’s fully erased. This action varies slightly depending on the email program but achieves the same result of completely removing the email from your account.
Social media
Forums
When participating in forums such as the Women’s Aid’s Survivor’s Forum, always ensure to log out after each session. This prevents anyone else from accessing your account using your credentials. Similarly, for any other forums you use, make it a habit to log out at the end of your browsing to secure your personal information.
General Security
If your computer does not require a password to access, it can be especially easy for someone else to track your activities or access your personal information. If safety is a concern, consider accessing sensitive information from a secure location like a local library, a friend’s house, or your workplace.