24-hour Help Line: (800) 487-0510 | (316) 283-0350

Need Help

(316) 283–0350 | (800) 487–0510



Many victims have found simple ways to make stalking affect them less. They may ask someone else to pick up and sort their mail, get a second phone number given only to trusted people, or have people at work or school screen phone calls or inform the police if the stalker shows up. Relying on trusted friends and family is important for victims of stalking to help keep victims safer and also reduce the isolation and feelings of desperation that stalking victims may experience.


A safety plan is a combination of suggestions, plans, and responses created to help victims reduce their risk of harm. It is a tool designed in response to the victim’s specific situation that evaluates what the victim is currently experiencing, incorporates the pattern of previous behavior, and examines options that will positively impact the victim’s safety. In a safety plan, the factors that are causing or contributing to the risk of harm to the victim and her/his loved ones are identified and interventions are developed.

Advocates and Stalking Safety Planning

While victims can make safety plans on their own, it is often helpful to enlist the assistance of trained professionals. These professionals, including advocates and law enforcement officers, can help a victim determine which options will best enhance their safety and will work to devise a safety plan to address each unique situation and circumstance. Victim advocates can be found in local domestic violence and rape crisis programs, as well as in victim assistance programs in local prosecutors’ offices and in some law enforcement agencies.

What to Include

When safety planning, victims can consider what is known about the stalker, the people who might help, how to improve safety in one’s environment, and what to do in case of an emergency. The average stalking case lasts approximately two years, therefore safety planning must begin when the victim first identifies the stalking behavior and continue throughout the duration of the case. Safety plans need to be re-evaluated and updated continuously as the stalker’s behavior, the victim’s routines, and access to services and support changes.

Below are suggestions to consider when developing a stalking safety plan. This is not an exhaustive list. In a safety plan, any recommended strategy must focus on what the victim feels will work in her best interest at any given point in time.

Documentation of Stalking and Reporting to Police

Victims are encouraged to keep a log of all stalking behaviors including e-mails and phone messages. The log, as well as any gifts or letters the stalker sends the victim, can be collected and used as evidence. The evidence will help prove what has been going on if the victim decides to report the stalking to the police or apply for a protective order.

Rely on Trusted People

Many victims have found simple ways to make the stalking affect them less. They may ask someone else to pick up and sort their mail, get a second phone number given only to trusted people, or have people at work or school screen phone calls or inform the police if the stalker shows up. Relying on trusted friends and family is important for victims of stalking to help keep victims safer and also reduce the isolation and feelings of desperation that stalking victims may experience.

Technology Safety Planning

Stalkers use technology to assist them in stalking their victims in various ways. It is important to consider how victims may be harmed by stalkers’ use of technology. Stalkers use the Internet to contact or post things about the victim on message board or discussion forums. They may also verbally attack or threaten victims in chat rooms. Some stalkers will post threatening or personal information about the victim – including the victim’s full name and address. Often stalkers will e-mail the victim, or fill their in-box with spam and have been known to send viruses or other harmful programs to victims’ computers. These threatening messages should be saved, especially if the victim is considering contacting the police with the case.

If stalkers have access to a victim’s computer, they can track them by looking at the history or websites visited on the computer. Also, stalkers have been known to install Spyware software on computers (sometimes sent through e-mail) that sends them a copy of every keystroke made, including passwords, websites visited, and e-mails sent. Spyware is very difficult to detect and a victim will likely not know she has it on her computer. If a victim believes s/he has a Spyware program on her/his computer, it is important the victim talk to a trained advocate.

Stalkers use cell phones enabled with Global Positioning System (GPS) to track victims. GPS technology can also be used to track or follow victims by placing them in the victim’s car and will be able to tell everywhere the car travels. When safety planning with a victim about technology issues, ask a victim if her stalker has ever had access to her phone or computer. If so, it may be important to stop using the phone or computer, or only use it in a manner that will not give the stalker any information about the victim’s location.

It is also important for victims of stalking to remain diligent about protecting their personal information that could be saved in databases. Businesses, for example, collect personal information about people, including addresses, phone numbers, last names, etc. This information can sometimes be accessed and exploited by stalkers. One stalking victim’s ex-boyfriend learned of her new address by “innocently” inquiring at the local oil change station if she had recently brought in their car for an oil change. Because that business had her information stored, they gave the stalker the address the victim had wanted to keep unknown to the stalker. Victims are encouraged to consider who might have their personal information. They should instruct businesses to not give out any personal information. In many instances, victims can ask that their account be password protected. This password should be one only known to the victim and no information should be released or discussed until the password has been verified.

Although no safety plan guarantees safety, such plans are valuable and important tools to keep victims safer, document incidents that happen with the perpetrator, make surroundings more secure, and identify people who can help.


Safety Anytime

If in imminent danger, locate a safe place. Consider going to:

Safety at home

Safety at work and school



VICTIM ADVOCATES are professionals trained to support sexual assault survivors through the aftermath of a sexual assault. Whether the assault happened an hour ago or 25 years ago, advocates can offer victims information, emotional support, and help finding resources. At the Safehope, we provide a wide range of advocacy services.

As a survivor of domestic violence, you deserve advocates who will listen to you with compassion. We will listen, and we will believe you. With your permission, your guidance, we will offer all appropriate support. Please remember. You control all of our advocacy services. You’re in charge. Completely. Always.


If you were recently assaulted and you want to make sure you have the appropriate health care you need after an assault, advocates can help you through that.

Whenever a survivor checks into one of the hospitals and requests a sexual assault forensic exam, an advocate is called out to respond. We do not work for the police and we do not work for the hospital. Advocates are there to support the survivor through their time at the hospital. We can answer questions, find resources, listen, and safety plan. Advocates can also be there, at your request, for any follow up medical care you might need.


If it is 3 A.M. and you need someone to talk to relating to domestic violence, for you or a loved one experienced, you can call an advocate.

The Safehope Helpline operates 24-hours a day and 365 days a year. We respond to calls related to domestic &/or sexual violence. You can call us anytime. Every call is answered by a live person. You can call and ask questions, explore options, or just talk through what you need to.


If you are meeting with a detective, testifying in court, or need a protection order, and you want an advocate to assist you, you can request one by calling the Safehope Helpline at (316)283-0350.

The Advocates primary job responsibilities include assisting and accompanying survivors as they navigate the entire criminal justice system and protection order process. From a police interview to a jury trial, our court advocates can be with you every step of the way.


If you would like to sit down and meet with an advocate one-on-one but you have problems with transportation or other barriers that make it difficult to come in to the office, you can call an advocate to meet with you.

Safehope has outreach advocates who specifically provide services to populations in Harvey, Marion and McPherson counties We have an outreach advocate that reaches the Spanish-speaking community, people in poverty, people with addictions or who are in recovery, college and university students, the LGBTQ community, and people who are incarcerated. Even if you do not fall into any of those categories, you can still call and schedule a time to meet with an outreach advocate. We can meet survivors in a public place that is convenient and safe for you.

If you want information about support groups, therapists who specialize in treating trauma, or strategies for coping, you can call an advocate.

Should you need assistance outside the scope of our expertise, we will recommend support services elsewhere in the community. Safehope advocates will support you at any time, at any place in your healing process. Advocates are not here to tell you what to do; we are here to support your decision-making process and to make sure you have all the options available to you. You know what is best for you. You know what is best for your safety and healing. We are committed to maintaining the highest possible levels of confidentiality.