{"id":205,"date":"2026-01-28T10:22:28","date_gmt":"2026-01-28T15:22:28","guid":{"rendered":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/?post_type=chapter&#038;p=205"},"modified":"2026-04-27T19:21:42","modified_gmt":"2026-04-27T23:21:42","slug":"staying-safe-online","status":"publish","type":"chapter","link":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/staying-safe-online\/","title":{"raw":"Chapter 10: Building a Safety Plan","rendered":"Chapter 10: Building a Safety Plan"},"content":{"raw":"<p style=\"text-align: right\"><a id=\"quick-exit-btn\" href=\"https:\/\/google.ca\" title=\"Quick Exit\">EXIT SITE<\/a><\/p>\r\n\r\n\r\n<hr \/>\r\n\r\n<h1>Chapter 10: Building a Safety Plan<\/h1>\r\nStaying safe online is an important part of protecting yourself from future harm. Digital safety is not about being perfect. It is about learning small habits that help you feel more confident, more in control, and more aware of risks.\r\n\r\nIn this chapter we talk about how to <strong>protect against future online harm<\/strong> by strengthening digital safety and awareness. We have created a <strong>digital safety plan template<\/strong> for your personal use, which is available for <strong>download<\/strong> at the <a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/staying-safe-online\/technology-safety-plan-template-1\/\" rel=\"attachment noopener wp-att-974\" target=\"_blank\">link here<\/a>, which was modelled after this chapter.\r\n<div class=\"textbox\">\r\n<h4><strong><span style=\"background-color: #ffff00\">Safety Note:<\/span><\/strong><\/h4>\r\nShare your safety plan <em>only<\/em> with a small group of designated, safe people (see <a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/finding-safe-support\/\">Chapter 8: Finding Safe Support<\/a>). Do not include any of your personal <em>usernames<\/em> or <em>passwords<\/em> on your safety plan. The safety plan should be a guide for you to know what to do in case of TFGBV. In case of emergencies, call 112 (if you are in South Africa), or your local emergency number.\r\n\r\n<\/div>\r\n<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Learning Objectives<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul>\r\n \t<li>Understand protective digital practices, including privacy, consent, and safe data storage<\/li>\r\n \t<li>Identify common risks and prevention strategies for image\u2011based abuse<\/li>\r\n \t<li>Recognize how survivor\u2011led advocacy builds long\u2011term safety<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<!--StartFragment -->\r\n<h1>Building Protective Digital Habits<\/h1>\r\nProtective digital habits help you stay safer online. These habits are simple steps you can take to protect your information, your privacy, and your devices. For more about how to engage in specific protective behaviours, you can view\u00a0<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/online-safety-tips-and-tricks\/\">Chapter 6: Online Safety How-To\u2019s.<\/a>\r\n<h2>Key protective practices include:<\/h2>\r\n<ul>\r\n \t<li>Keeping your passwords private (see\u00a0<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/online-safety-tips-and-tricks#6.2\">Chapter 6<\/a>).<\/li>\r\n \t<li>Using strong passwords that are hard to guess\u00a0(see\u00a0<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/online-safety-tips-and-tricks#6.2\">Chapter 6<\/a>).<\/li>\r\n \t<li>Turning on two\u2011factor authentication\u00a0(see\u00a0<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/online-safety-tips-and-tricks#6.3\">Chapter 6<\/a>).<\/li>\r\n \t<li>Checking your privacy settings on apps and social media\u00a0(see\u00a0<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/online-safety-tips-and-tricks#6.4\">Chapter 6<\/a>).<\/li>\r\n \t<li>Being careful about what you share and with whom.<\/li>\r\n \t<li>Storing sensitive information in safe places.<\/li>\r\n \t<li>Asking for help from someone you trust when you need it (see\u00a0<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/finding-safe-support\/\">Chapter 8: Finding Safe Support<\/a>).<\/li>\r\n<\/ul>\r\nThese habits help you stay in control of your digital life.\r\n\r\n<!--StartFragment -->\r\n\r\n<hr \/>\r\n\r\n<h1>Creating a Technology Safety Plan: Step-by-Step<\/h1>\r\nA technology safety plan helps you think ahead and take steps to protect yourself. Here is an idea of what a technology safety plan might look like:\r\n<h2>Step 1: List Your Devices and Accounts<\/h2>\r\n<ul>\r\n \t<li>Write down all the devices you use (phone, laptop, tablet, smart home devices).<\/li>\r\n \t<li>List all your online accounts (email, social media, banking, shopping, cloud storage, etc.). <span style=\"background-color: #ffff00\">Do <span style=\"text-decoration: underline\">not<\/span> include usernames or passwords.<\/span><\/li>\r\n<\/ul>\r\n<h2>Step 2: Identify What Might Be at Risk<\/h2>\r\n<ul>\r\n \t<li>Does anyone else know your passwords?<\/li>\r\n \t<li>Are you sharing devices or accounts with someone you don\u2019t trust?<\/li>\r\n \t<li>Are there apps or devices you don\u2019t recognize?<\/li>\r\n<\/ul>\r\n<h2>Step 3: Change Passwords and Security Settings<\/h2>\r\n<ul>\r\n \t<li>Change passwords to strong, unique ones.<\/li>\r\n \t<li>Turn on two-factor authentication where possible.<\/li>\r\n \t<li>Remove any shared access or unknown devices from your accounts.<\/li>\r\n<\/ul>\r\n<h2>Step 4: Check App Permissions and Location Settings<\/h2>\r\n<ul>\r\n \t<li>Review which apps have access to your location, camera, microphone, and contacts.<\/li>\r\n \t<li>Turn off permissions for apps that don\u2019t need them.<\/li>\r\n<\/ul>\r\n<h2>Step 5: Plan for Emergencies<\/h2>\r\n<ul>\r\n \t<li>Know how to quickly log out or lock your accounts.<\/li>\r\n \t<li>Have a list of emergency contacts. Who will you call? Where will you find support?<\/li>\r\n \t<li>Keep evidence (screenshots, messages) in a safe place.<\/li>\r\n<\/ul>\r\n<h2>Step 6: Get Support &amp; Change Habits<\/h2>\r\n<ul>\r\n \t<li>Plan how you will reach out to local services, shelters, or emergency contacts. Phone call? Email? In-person visit?<\/li>\r\n \t<li>Use a safer device (like a library computer) if you think yours is being monitored.<\/li>\r\n<\/ul>\r\n<h2>Step 7: Self-Care<\/h2>\r\n<ul>\r\n \t<li>Engage in self-care and regulating activities (See <a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/module-1b-responding-safely-thandi\/\">Chapter 9: Responding Safely to TFGBV).<\/a><\/li>\r\n<\/ul>\r\n<div class=\"textbox textbox--key-takeaways\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\" style=\"text-align: center\">Reflect<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n\r\nEveryone is different, and different disabilities or identities or contexts might require different supports and steps.\r\n\r\nThinking about your own experiences, what steps might you add to customize this plan for yourself?\r\n\r\n<\/div>\r\n<\/div>","rendered":"<p style=\"text-align: right\"><a id=\"quick-exit-btn\" href=\"https:\/\/google.ca\" title=\"Quick Exit\">EXIT SITE<\/a><\/p>\n<hr \/>\n<h1>Chapter 10: Building a Safety Plan<\/h1>\n<p>Staying safe online is an important part of protecting yourself from future harm. Digital safety is not about being perfect. It is about learning small habits that help you feel more confident, more in control, and more aware of risks.<\/p>\n<p>In this chapter we talk about how to <strong>protect against future online harm<\/strong> by strengthening digital safety and awareness. We have created a <strong>digital safety plan template<\/strong> for your personal use, which is available for <strong>download<\/strong> at the <a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/staying-safe-online\/technology-safety-plan-template-1\/\" rel=\"attachment noopener wp-att-974\" target=\"_blank\">link here<\/a>, which was modelled after this chapter.<\/p>\n<div class=\"textbox\">\n<h4><strong><span style=\"background-color: #ffff00\">Safety Note:<\/span><\/strong><\/h4>\n<p>Share your safety plan <em>only<\/em> with a small group of designated, safe people (see <a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/finding-safe-support\/\">Chapter 8: Finding Safe Support<\/a>). Do not include any of your personal <em>usernames<\/em> or <em>passwords<\/em> on your safety plan. The safety plan should be a guide for you to know what to do in case of TFGBV. In case of emergencies, call 112 (if you are in South Africa), or your local emergency number.<\/p>\n<\/div>\n<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li>Understand protective digital practices, including privacy, consent, and safe data storage<\/li>\n<li>Identify common risks and prevention strategies for image\u2011based abuse<\/li>\n<li>Recognize how survivor\u2011led advocacy builds long\u2011term safety<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p><!--StartFragment --><\/p>\n<h1>Building Protective Digital Habits<\/h1>\n<p>Protective digital habits help you stay safer online. These habits are simple steps you can take to protect your information, your privacy, and your devices. For more about how to engage in specific protective behaviours, you can view\u00a0<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/online-safety-tips-and-tricks\/\">Chapter 6: Online Safety How-To\u2019s.<\/a><\/p>\n<h2>Key protective practices include:<\/h2>\n<ul>\n<li>Keeping your passwords private (see\u00a0<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/online-safety-tips-and-tricks#6.2\">Chapter 6<\/a>).<\/li>\n<li>Using strong passwords that are hard to guess\u00a0(see\u00a0<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/online-safety-tips-and-tricks#6.2\">Chapter 6<\/a>).<\/li>\n<li>Turning on two\u2011factor authentication\u00a0(see\u00a0<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/online-safety-tips-and-tricks#6.3\">Chapter 6<\/a>).<\/li>\n<li>Checking your privacy settings on apps and social media\u00a0(see\u00a0<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/online-safety-tips-and-tricks#6.4\">Chapter 6<\/a>).<\/li>\n<li>Being careful about what you share and with whom.<\/li>\n<li>Storing sensitive information in safe places.<\/li>\n<li>Asking for help from someone you trust when you need it (see\u00a0<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/finding-safe-support\/\">Chapter 8: Finding Safe Support<\/a>).<\/li>\n<\/ul>\n<p>These habits help you stay in control of your digital life.<\/p>\n<p><!--StartFragment --><\/p>\n<hr \/>\n<h1>Creating a Technology Safety Plan: Step-by-Step<\/h1>\n<p>A technology safety plan helps you think ahead and take steps to protect yourself. Here is an idea of what a technology safety plan might look like:<\/p>\n<h2>Step 1: List Your Devices and Accounts<\/h2>\n<ul>\n<li>Write down all the devices you use (phone, laptop, tablet, smart home devices).<\/li>\n<li>List all your online accounts (email, social media, banking, shopping, cloud storage, etc.). <span style=\"background-color: #ffff00\">Do <span style=\"text-decoration: underline\">not<\/span> include usernames or passwords.<\/span><\/li>\n<\/ul>\n<h2>Step 2: Identify What Might Be at Risk<\/h2>\n<ul>\n<li>Does anyone else know your passwords?<\/li>\n<li>Are you sharing devices or accounts with someone you don\u2019t trust?<\/li>\n<li>Are there apps or devices you don\u2019t recognize?<\/li>\n<\/ul>\n<h2>Step 3: Change Passwords and Security Settings<\/h2>\n<ul>\n<li>Change passwords to strong, unique ones.<\/li>\n<li>Turn on two-factor authentication where possible.<\/li>\n<li>Remove any shared access or unknown devices from your accounts.<\/li>\n<\/ul>\n<h2>Step 4: Check App Permissions and Location Settings<\/h2>\n<ul>\n<li>Review which apps have access to your location, camera, microphone, and contacts.<\/li>\n<li>Turn off permissions for apps that don\u2019t need them.<\/li>\n<\/ul>\n<h2>Step 5: Plan for Emergencies<\/h2>\n<ul>\n<li>Know how to quickly log out or lock your accounts.<\/li>\n<li>Have a list of emergency contacts. Who will you call? Where will you find support?<\/li>\n<li>Keep evidence (screenshots, messages) in a safe place.<\/li>\n<\/ul>\n<h2>Step 6: Get Support &amp; Change Habits<\/h2>\n<ul>\n<li>Plan how you will reach out to local services, shelters, or emergency contacts. Phone call? Email? In-person visit?<\/li>\n<li>Use a safer device (like a library computer) if you think yours is being monitored.<\/li>\n<\/ul>\n<h2>Step 7: Self-Care<\/h2>\n<ul>\n<li>Engage in self-care and regulating activities (See <a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/module-1b-responding-safely-thandi\/\">Chapter 9: Responding Safely to TFGBV).<\/a><\/li>\n<\/ul>\n<div class=\"textbox textbox--key-takeaways\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\" style=\"text-align: center\">Reflect<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p>Everyone is different, and different disabilities or identities or contexts might require different supports and steps.<\/p>\n<p>Thinking about your own experiences, what steps might you add to customize this plan for yourself?<\/p>\n<\/div>\n<\/div>\n","protected":false},"author":554,"menu_order":6,"comment_status":"closed","ping_status":"closed","template":"","meta":{"pb_show_title":"","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[48],"contributor":[],"license":[],"class_list":["post-205","chapter","type-chapter","status-publish","hentry","chapter-type-standard"],"part":22,"_links":{"self":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/users\/554"}],"replies":[{"embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/comments?post=205"}],"version-history":[{"count":34,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/205\/revisions"}],"predecessor-version":[{"id":1055,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/205\/revisions\/1055"}],"part":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/parts\/22"}],"metadata":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/205\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/media?parent=205"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapter-type?post=205"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/contributor?post=205"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/license?post=205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}