Safe Browsing and Quick Exit Feature

Quick Exit Button

The Quick Exit button appears on sexual and relationship violence-related pages on and will point your browser to either or in case you need to quickly leave the page you are viewing.

This feature does not prevent others from tracing your browsing history. If you are afraid that anyone is monitoring your computer use, please review the information below about safer computer use.

Why does the Quick Exit load catalogs or

These websites were chosen because they both load quickly and are likely pages that would be natural for you to visit as a member of the LSU community. We provide two pages in the code because the code behaves differently across browser and device types.

At minimum, it should load a "safe" webpage when it is clicked. In some browsers it will also alter the state of the "back" button; so you may have to navigate back to the page in the original way you found it once you are ready to view the resources again.

Safe Browsing Tips

As you visit various websites, your web browser (i.e, Chrome, Safari, Firefox, Microsoft Edge) stores a record of these visits in the web browser history. A browser history is stored on desktop computers, mobile devices, and tablets.

Deleting your browser history can remove the information from immediate retrieval, but there are tools that can be used to retrieve it. 

Software can be installed on your computer to monitor your website activity; these programs may also be used to steal your user names and passwords and can be used to access your email accounts or other data-sensitive resources you use.

If you believe your computer or mobile device is being monitored, you may want to take alternate precautions to prevent your abuser from following your online activities. Completely deleting your browser history may raise suspicion from your abuser. If you do not want to delete your browsing history try to make your history harder to track:

  • Use a browser that provides a private or incognito browsing mode. Using this mode will not save your browsing history or store other information. 
  • Use a public access computer. These can be found at a local library, an internet café or other shared technology center, use a work computer, or use a friend's computer.

If you are unsure of how to clear your browser history or to browse privately, use your browser's "Help" feature to learn more about these features. 

Other Forms of Monitoring

  • If you think your abuser has gained access to your primary email account, you may want to consider opening a separate email account for any sensitive communications. Keep your monitored account active and only access your second account from a safe computer and limit its use for your sensitive communications.
  • Cell phones and other mobile devices can be used to retrieve calling and texting history. The GPS function can also be used to track your physical location. If you feel your phone is being monitored, consider obtaining a pay-as-you-go phone that you keep in a safe place (i.e., work, friend's home).
  • Be protective of what you post to social media; remember, once something is posted, how it is used is out of your control. Do not post anything personal or anything that can provide an abuser with ways to monitor you or locate you.
  • Keep all passwords private and difficult to guess, even for someone who knows you well. Do not write them down or save them in a place an abuser can find them. Consider using a free password management tool so that you only have to remember a single password. Several password management services have online portals so that you can access your passwords using a private or incognito browser.