Leave this site
1
2
3
4
5
6
7
8

Someone accessed my accounts without my permission

When someone gains access to a personal account without clear, ongoing permission, it can feel like a major violation. Whether it happens through password-sharing, hacking, spyware, or guesswork, unauthorised access can lead to emotional harm, identity theft, or further control.

Someone accessed my accounts without my permission

When someone gains access to a personal account without clear, ongoing permission, it can feel like a major violation. Whether it happens through password-sharing, hacking, spyware, or guesswork, unauthorised access can lead to emotional harm, identity theft, or further control.

What to know

This type of abuse may involve reading private messages, deleting content, impersonating us, or changing account settings to limit access. In some cases, it’s part of a larger pattern of digital surveillance or coercive control.

Even if the person accessing the account is someone familiar—a partner, family member, roommate, or friend—it’s still a form of digital abuse. No one should have to give up privacy to stay safe, loved, or connected.

What we’re covering in this section

This is for you if…

This section is for you if you’ve been pressured or forced into sharing your account passwords with someone, or been locked out of your own accounts. You might have found passwords or settings changed without your knowledge, seen unexpected changes to saved files or account recovery information, or had strange login alerts or security warnings you don’t recognise.

You might be feeling like your identity isn’t your own, and powerless to stop someone who always seems to be ahead. You might be ashamed—even though you didn’t do anything wrong—or confused about whether it’s really happening. The information in this section can help.

Back to top

Understanding unauthorised account access

There are many ways someone can gain access to an account without permission. The most common methods involve emotional manipulation—like pressuring us to share passwords or pretending to act in our best interest. Other less common methods are technical, like hacking or installing spyware.

Having an account accessed without consent can feel like a loss of control—but unfortunately, it’s also incredibly common. Even if it feels personal or targeted, many tactics are widespread and used against countless people. There is no shame in being caught off guard by someone else’s intrusion. Here are some of the ways it can take place.

Password pressure or forced access
Guessing or stealing login information
Staying logged in on shared devices
Changing account details to lock us out
Hacking
Spyware or stalkerware
Back to top

What it can mean for us: Identifying unauthorised account access

Unauthorised access doesn’t always start with hacking. Sometimes it’s a password shared in trust, that’s later used to control or monitor. Sometimes it’s someone staying logged in on a shared device, guessing a password, or resetting one without our knowledge. And sometimes, it’s not clear how it’s happening—just that someone keeps showing up in places they shouldn’t.

It’s normal to feel unsure, especially when the access comes from someone close. And it’s normal to feel upset, confused, angry, or anxious, even if we don’t have proof. If something doesn’t feel quite right, that’s reason enough to start looking into it.

Red flags to look out for

  • Seeing messages marked ‘read’ that we didn’t open.
  • Passwords or settings changing without our knowledge.
  • Strange login alerts or security warnings we don’t recognise.
  • Someone bringing up conversations, photos, or posts we haven’t shared with them.
  • Being locked out of our own accounts—or finding that someone else seems to have control.
  • Unexpected changes to saved photos, documents, or account recovery information.

How we might feel

  • Like our privacy has been stolen, or our identity isn’t fully our own.
  • Constantly watching what we write or save, in case someone else sees it.
  • Afraid to log in from shared devices or public Wi-Fi.
  • Ashamed, even though we didn’t do anything wrong.
  • Confused about whether it’s really happening—or if we’re overreacting.
  • Powerless to stop someone who always seems one step ahead.

Questions we can ask ourselves

  • Did I give someone access in the past that I no longer feel comfortable with?
  • Has anything changed in my account or device settings without my input?
  • Do I feel anxious when I open certain apps or messages?
  • Is someone using what they know about me—emotionally or digitally—to control, shame, or isolate me?
  • Even if I can’t explain how, do I feel like someone is watching what I do online?

We don’t need to have everything figured out to take action. Even small changes can help rebuild privacy and control. And no matter who accessed our account, or how—it’s not our fault.

Back to top

The impact of AI

AI is changing the way accounts are accessed and abused. In the past, someone might have needed passwords or direct access to a device. Now, AI tools can help people guess login details, impersonate others, or even bypass security checks—sometimes without needing much technical skill at all.

AI can make these tactics feel more advanced—and the pace of change can be overwhelming. It’s natural to feel confused or unsure how to keep up. We’ve listed out some of the ways AI is making unauthorised access easier, but remember: while the tools may be new, the behaviours are often familiar. At their core, these tactics are still about control, surveillance, and broken trust. 

And just like before, survivors deserve support, autonomy, and digital safety—no matter how the technology evolves. 

Password-guessing tools
Voice and face impersonation
Impersonation in emails or messages
Data breaches and leaked credentials
Automated surveillance tools
Automated accounts

Remember, AI is evolving quickly

The clues that once helped us spot AI-generated content aren’t always reliable any more. Things like extra fingers in photos or blurry edges around objects were once common signs, but new tools are improving fast. 

Instead of relying on those glitches, it’s more helpful to look at the bigger picture. These are some helpful questions to ask:

  • Does the image or audio feel believable? 
  • Who originally shared it, and where did it come from? 
  • Can you double-check it through another reputable source or tool? 

Trusting your instincts, asking questions, and slowing down can all help make sense of what you’re seeing or hearing.

Back to top

You’re not alone if you’re thinking…

Discovering that someone has accessed a personal account without permission can feel violating, disorienting, or frightening. Some people describe a deep sense of exposure—like their private thoughts or identity were no longer theirs. Others feel anxious, betrayed, or unsure who to trust. 

We all respond in different ways, and that’s okay. Here are some reflections and questions survivors often share.

I let them use my login once. Does that mean I can’t say no now?
They didn’t change anything—but they were reading my messages.
They said it was for my own good.
I feel like I’m being watched all the time, even though I can’t prove it.
They logged in through an old device. I didn’t even realise it was still connected.
I changed my password, but I’m scared they’ll find a way back in.
Back to top

Things we can do

No one can fully control whether someone tries to access their accounts—but small steps can help limit opportunities for intrusion, make accounts harder to compromise, and support a greater sense of digital control.

Taking these steps can be exhausting—both emotionally and practically. It’s okay to move at your own pace and choose only the steps that feel manageable right now. No one should have to manage this alone. Support is available, and you deserve safety, privacy, and peace of mind.

  • Use strong, unique passwords for each account. Pay special attention to email, banking, and social media accounts. A password manager can help keep them safe and easy to manage.
  • Use extra security. Turn on two-factor authentication (2FA) wherever possible.
  • Change recovery information. Update email addresses, security questions, and phone numbers if they were once shared with someone else—or set up together during a relationship.
  • Review account activity and devices. Check platforms like Google, Apple, Facebook, or Instagram to make sure no one is still logged in from a shared or old device.
  • Protect security information. Never share security codes or login links sent by email or text, even if the request looks official. Genuine companies won’t ask for these through messages or email.
  • Revisit devices and accounts someone else helped set up. If someone helped set up an account or device—especially a partner, friend, or family member—it’s okay to revisit those settings and make changes.
  • Avoid saving passwords in browsers or apps that others can access. Log out of shared devices whenever possible.
  • Be cautious with multi-user apps. Double-check apps that allow account sharing, family monitoring, or location syncing—especially after a relationship ends or boundaries shift.
  • Clean the slate. If you're not sure who still has access, a fresh start—new logins, new email accounts, or a factory reset—can help restore control.
  • Search your name and usernames regularly to see what personal information is publicly visible.
  • Use tools like Google’s Results About You to request removal of sensitive content or contact details.
  • Adjust privacy settings on social media to limit what others can see, tag, or share—especially posts that reveal location, routines, or personal connections.

Set clear boundaries

It’s okay to say no to sharing accounts, passwords, or devices—even with someone you trust. Questions like “Who will be able to see this?”, “What happens if we stop sharing this account?”, or “Can I remove access later?” can help clarify expectations. If someone pressures, guilts, or threatens you into giving access—that’s not about trust. That’s a form of control.

Back to top

Further steps and support

Finding out that someone has accessed a personal account without consent can be upsetting, confusing, and difficult to trace. Whether the access happened recently or over time, support is available—and there are steps that can help us regain control.

Document the abuse

  • Take screenshots of login alerts, password reset requests, or unexpected changes to account settings.
  • Keep a written record of anything unusual—like messages that were read without you opening them, changed content, or times you were locked out of your own accounts.
  • If you suspect someone is accessing your account from a shared device or old login, note what apps or settings may still be connected.
  • Safety Net Project can provide helpful guidance on how to document online abuse.

Reporting options

To platforms
To police
To employers or schools

Getting support

  • Operation Safe Escape can help identify risks, remove spyware, and create a plan for safer communication.
  • Domestic abuse and stalking services understand the emotional and digital impact of account access. They can help survivors navigate next steps with trauma-informed care.
  • Friends, family, or advocates can offer emotional support, help change settings, or simply stay nearby during a stressful process.
Back to top

What we’ve covered in this section

This section explores someone accessing your accounts without your permission. This might happen through password sharing, guesswork, spyware, or emotional manipulation. It explains how account intrusion can feel like a loss of control, even when there’s no evidence we can see. It also includes practical prevention strategies, documentation tips, and ways to reset access and rebuild digital boundaries.

Key takeaways

  • Account access without ongoing consent is a form of digital abuse.

  • The most common methods for unauthorised account access involve emotional manipulation.

  • Shared logins and saved devices are common ways someone can access your accounts.

  • AI tools can also be used to guess passwords or to pretend to be a person or organisation you trust.

  • We can take back control of our accounts by adjusting settings, protecting private information, and setting boundaries.

  • There are steps we can take if we decide to report.

Remember

Taking back control over digital accounts can feel intimidating—no one should have to do it alone. If the situation feels unclear or overwhelming right now, then this guide, and the support options listed on the previous page are here to return to at any time.

Help us improve this guide
Thank you for your feedback!
Oops! Something went wrong while submitting the form.