Women With Disabilities
Chapter 10: Building a Safety Plan
Staying safe online is an important part of protecting yourself from future harm. Digital safety is not about being perfect. It is about learning small habits that help you feel more confident, more in control, and more aware of risks.
In this chapter we talk about how to protect against future online harm by strengthening digital safety and awareness. We have created a digital safety plan template for your personal use, which is available for download at the link here, which was modelled after this chapter.
Safety Note:
Share your safety plan only with a small group of designated, safe people (see Chapter 8: Finding Safe Support). Do not include any of your personal usernames or passwords on your safety plan. The safety plan should be a guide for you to know what to do in case of TFGBV. In case of emergencies, call 112 (if you are in South Africa), or your local emergency number.
Learning Objectives
- Understand protective digital practices, including privacy, consent, and safe data storage
- Identify common risks and prevention strategies for image‑based abuse
- Recognize how survivor‑led advocacy builds long‑term safety
Building Protective Digital Habits
Protective digital habits help you stay safer online. These habits are simple steps you can take to protect your information, your privacy, and your devices. For more about how to engage in specific protective behaviours, you can view Chapter 6: Online Safety How-To’s.
Key protective practices include:
- Keeping your passwords private (see Chapter 6).
- Using strong passwords that are hard to guess (see Chapter 6).
- Turning on two‑factor authentication (see Chapter 6).
- Checking your privacy settings on apps and social media (see Chapter 6).
- Being careful about what you share and with whom.
- Storing sensitive information in safe places.
- Asking for help from someone you trust when you need it (see Chapter 8: Finding Safe Support).
These habits help you stay in control of your digital life.
Creating a Technology Safety Plan: Step-by-Step
A technology safety plan helps you think ahead and take steps to protect yourself. Here is an idea of what a technology safety plan might look like:
Step 1: List Your Devices and Accounts
- Write down all the devices you use (phone, laptop, tablet, smart home devices).
- List all your online accounts (email, social media, banking, shopping, cloud storage, etc.). Do not include usernames or passwords.
Step 2: Identify What Might Be at Risk
- Does anyone else know your passwords?
- Are you sharing devices or accounts with someone you don’t trust?
- Are there apps or devices you don’t recognize?
Step 3: Change Passwords and Security Settings
- Change passwords to strong, unique ones.
- Turn on two-factor authentication where possible.
- Remove any shared access or unknown devices from your accounts.
Step 4: Check App Permissions and Location Settings
- Review which apps have access to your location, camera, microphone, and contacts.
- Turn off permissions for apps that don’t need them.
Step 5: Plan for Emergencies
- Know how to quickly log out or lock your accounts.
- Have a list of emergency contacts. Who will you call? Where will you find support?
- Keep evidence (screenshots, messages) in a safe place.
Step 6: Get Support & Change Habits
- Plan how you will reach out to local services, shelters, or emergency contacts. Phone call? Email? In-person visit?
- Use a safer device (like a library computer) if you think yours is being monitored.
Step 7: Self-Care
- Engage in self-care and regulating activities (See Chapter 9: Responding Safely to TFGBV).
Reflect
Everyone is different, and different disabilities or identities or contexts might require different supports and steps.
Thinking about your own experiences, what steps might you add to customize this plan for yourself?
Feedback/Errata