{"id":941,"date":"2026-03-11T19:37:28","date_gmt":"2026-03-11T23:37:28","guid":{"rendered":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/?post_type=chapter&#038;p=941"},"modified":"2026-04-21T21:18:08","modified_gmt":"2026-04-22T01:18:08","slug":"chapter-6-online-safety-how-tos","status":"web-only","type":"chapter","link":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-6-online-safety-how-tos\/","title":{"raw":"Chapter 6: Online Safety How-To's","rendered":"Chapter 6: Online Safety How-To&#8217;s"},"content":{"raw":"<p style=\"text-align: right\"><a id=\"quick-exit-btn\" href=\"https:\/\/google.ca\" title=\"Quick Exit\">EXIT SITE<\/a><\/p>\r\n\r\n\r\n<hr \/>\r\n\r\n<h1>Chapter 6: Online Safety How-To's<\/h1>\r\nThis chapter will <strong>review online safety tips and ways to set up your accounts and devices for safe use<\/strong> across different types of technology. This chapter will only discuss specific tips and ways to navigate settings for online and digital safety.\r\n<div class=\"textbox 1\">\r\n<h2><em><strong><span style=\"background-color: #ffff00\">Safety Note:<\/span> <\/strong><\/em><\/h2>\r\nChanging any of your typical digital behaviour (changing passwords, logging out of or deleting accounts, turning off location, uninstalling apps) may alert your abuser. If you believe you are in danger, find support from a local service or use a safer device before making any changes.\r\n\r\n<\/div>\r\n<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Learning Objectives<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n\r\nThis chapter reviews the following topics, which are important for online safety measures:\r\n<ul>\r\n \t<li style=\"list-style-type: none\">\r\n<ul>\r\n \t<li><a href=\"#6.4\">App Permissions and Mobile Privacy Settings<\/a><\/li>\r\n \t<li><a href=\"#6.6\">Detecting and Removing Spyware\/Stalkerware<\/a><\/li>\r\n \t<li><a href=\"#6.1\">Device Safety<\/a><\/li>\r\n \t<li><a href=\"#6.5\">Location Sharing and Preventing Unwanted Tracking<\/a><\/li>\r\n \t<li><a href=\"#6.9\">Messaging Apps and Secure Communication<\/a><\/li>\r\n \t<li><a href=\"#6.2\">Password Security Basics<\/a><\/li>\r\n \t<li><a href=\"#6.7\">Smart Home Devices and Webcam Privacy<\/a><\/li>\r\n \t<li><a href=\"#6.8\">Social Media Privacy Settings and Audience Control<\/a><\/li>\r\n \t<li><a href=\"#6.3\">Two-Factor Authentication (2FA)<\/a><\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n\r\n<hr \/>\r\n\r\n<h1><a id=\"6.4\"><\/a>App Permissions and Mobile Privacy Settings<\/h1>\r\nOn your mobile devices and in different applications, you have some degree of control over what functions are enabled at different times. We have outlined some <strong>considerations for mobile privacy settings:<\/strong>\r\n<ul>\r\n \t<li>Only give apps the permissions they need.<\/li>\r\n \t<li>Set access to \u201cWhile Using the App\u201d or \u201cNever\u201d for most apps. Turn off location, camera, or microphone access entirely for apps you don\u2019t trust.<\/li>\r\n \t<li>Delete apps you don\u2019t use or don\u2019t recognize.<\/li>\r\n \t<li>Review permissions regularly, especially after updates.<\/li>\r\n<\/ul>\r\n<h2><strong>How to check and change app permissions for:<\/strong><\/h2>\r\n<span>[h5p id=\"13\"]<\/span>\r\n<div class=\"textbox textbox--examples\">\r\n<div class=\"textbox__content\">\r\n\r\n<strong>Example: <\/strong>Sam finds that a game app has access to his microphone and location, even though it doesn't use them in-game. He changes the settings to deny these permissions.\r\n\r\n<\/div>\r\n<\/div>\r\n<h4><strong>Checklist: App Permissions<\/strong><\/h4>\r\n<table>\r\n<thead>\r\n<tr>\r\n<th>Task<\/th>\r\n<th>Done?<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<td>Review app permissions for location, camera, microphone<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Remove permissions from apps that don\u2019t need them<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Delete unused or suspicious apps<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\nApps often ask for more access than they need. Limiting permissions protects your privacy and reduces the risk of someone spying on you through your device.\r\n\r\n<hr \/>\r\n\r\n<h1><a id=\"6.6\"><\/a>Detecting and Removing Spyware and Stalkerware<\/h1>\r\nSpyware or stalkerware is software secretly installed on your device to monitor your messages, calls, location, and more. It is often used by abusers to control or watch their victims. Overall, spyware and stalkerware is always evolving and updating, to the point where it may not be visible or have any impact on your devices.\r\n<h2><strong>Warning signs of spyware and stalkerware being installed:<\/strong><\/h2>\r\n<ul>\r\n \t<li>Your device is slow, hot, or the battery drains quickly.<\/li>\r\n \t<li>You see unfamiliar apps or settings.<\/li>\r\n \t<li>The device lights up or makes sounds when not in use.<\/li>\r\n \t<li>Look for apps with unusual permissions, such as: \u201cInstall unknown apps\u201d, \u201cNotification access\u201d, \u201cUsage access\u201d, or \u201cDisplay over other apps\u201d.<\/li>\r\n<\/ul>\r\nHowever, the biggest sign of spyware or stalkerware is the behaviour of the abuser. Pay attention to if the abuser is acting differently, or reacting to things they should not be aware of; for example, when your abuser knows about a text conversation that only someone watching your device would know.\r\n<h2><strong>How to check for spyware:<\/strong><\/h2>\r\n<span>[h5p id=\"14\"]<\/span>\r\n<h2><strong>How to remove spyware:<\/strong><\/h2>\r\n<ul>\r\n \t<li>Delete suspicious apps or profiles.<\/li>\r\n \t<li>Run a security scan with a trusted app.<\/li>\r\n \t<li>As a last resort, do a factory reset (erase all data and set up as new).<\/li>\r\n \t<li>Change all passwords from a clean device.<\/li>\r\n<\/ul>\r\n<strong><span style=\"background-color: #ffff00\">Safety note:<\/span> <\/strong>Removing spyware may alert the person monitoring you. If you are in danger, get support from a local service or use a safer device before making changes.\r\n<h4><strong>Checklist: Spyware Detection<\/strong><\/h4>\r\n<table>\r\n<thead>\r\n<tr>\r\n<th>Task<\/th>\r\n<th>Done?<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<td>Check for unfamiliar apps or settings<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Run a security scan with anti-stalkerware tools<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Remove suspicious apps or profiles<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Change passwords from a safe device<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Get support before making changes if at risk<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\nSpyware is a serious threat to your privacy and safety. Regularly checking your device and knowing the signs can help you act quickly. Always consider your safety before removing spyware, as it may escalate the situation.\r\n\r\n<hr \/>\r\n\r\n<h1><a id=\"6.1\"><\/a>Device Safety: Choosing and Using a Safer Device<\/h1>\r\nIf you think someone is monitoring your device, it\u2019s safest to use a different one that they have never accessed in order to contact help. This could be a friend\u2019s phone or computer, a public computer at a library or community center, or even a new phone with a new account (not linked to your old cloud accounts).\r\n<h2><strong>Tips for safer device use:<\/strong><\/h2>\r\n<ul>\r\n \t<li>Set a strong passcode or PIN (at least 6 digits, not a birthday or easy pattern, like 123456).<\/li>\r\n \t<li>Don\u2019t link your new device to old accounts or cloud backups.<\/li>\r\n \t<li>Turn off Bluetooth and location sharing when not needed.<\/li>\r\n \t<li>Keep your device\u2019s software up to date.<\/li>\r\n \t<li>Use a device not accessed by an abuser.<\/li>\r\n<\/ul>\r\n<div class=\"textbox textbox--examples\">\r\n<div class=\"textbox__content\">\r\n\r\n<strong>Example: <\/strong>Maria suspects her ex has installed spyware on her phone. She buys a pay-as-you-go phone, sets a new PIN, and only uses it to contact support services and trusted friends.\r\n\r\n<\/div>\r\n<\/div>\r\n\r\n<hr \/>\r\n\r\n<h1>Location Sharing and Preventing Unwanted Tracking<\/h1>\r\nSharing your location can put you at risk if someone wants to track or harm you. Many apps and devices can share your location without you realizing it. To turn off location sharing or better manage it, try the steps listed per device type below.\r\n\r\n<span>[h5p id=\"15\"]<\/span>\r\n<h2><strong>Tips for stopping location tracking:<\/strong><\/h2>\r\n<ul>\r\n \t<li>Don\u2019t \u201ccheck in\u201d to locations on social media.<\/li>\r\n \t<li>Delete location history, especially before or after visiting safe places like shelters.<\/li>\r\n \t<li>Turn off Bluetooth when not in use (Bluetooth can be used for tracking).<\/li>\r\n<\/ul>\r\n<div class=\"textbox textbox--examples\">\r\n<div class=\"textbox__content\">\r\n\r\n<strong>Example: <\/strong>Taylor turns off location sharing in all her apps and deletes her location history before moving to a new apartment.\r\n\r\n<\/div>\r\n<\/div>\r\n<h4><strong>Checklist: Location Privacy<\/strong><\/h4>\r\n<table>\r\n<thead>\r\n<tr>\r\n<th>Task<\/th>\r\n<th>Done?<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<td>Turn off location services when not needed<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Stop sharing location in apps and with contacts<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Delete location history regularly<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Turn off Bluetooth when not in use<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\nControlling your location settings helps prevent someone from tracking your movements. Regularly reviewing and updating these settings keeps you safer.\r\n\r\n<hr \/>\r\n\r\n<h1><a id=\"6.9\"><\/a>Messaging Apps and Secure Communication<\/h1>\r\nNot all messaging apps are equally safe. Some are better for private, secure conversations.\r\n<div class=\"postbox h5p-sidebar\">\r\n<div class=\"h5p-action-bar-settings h5p-panel\"><code>[h5p id=\"18\"]<\/code><\/div>\r\n<\/div>\r\n<strong style=\"color: #1f2933;font-size: 1.424em\">Tips for all messaging apps:<\/strong>\r\n<ul>\r\n \t<li>Don\u2019t share sensitive information or content in group chats, or to people you don't know.<\/li>\r\n \t<li>Turn off message previews in notifications.<\/li>\r\n \t<li>Be very cautious with accessing links and attachments.<\/li>\r\n<\/ul>\r\n<h4><strong>Checklist: Secure Messaging<\/strong><\/h4>\r\n<table style=\"height: 75px\">\r\n<thead>\r\n<tr style=\"height: 15px\">\r\n<th style=\"height: 15px;width: 544.062px\">Task<\/th>\r\n<th style=\"height: 15px;width: 169.354px\">Done?<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr style=\"height: 15px\">\r\n<td style=\"height: 15px;width: 544.396px\">Use Signal or another secure app for sensitive chats<\/td>\r\n<td style=\"height: 15px;width: 169.688px\">Yes\/No<\/td>\r\n<\/tr>\r\n<tr style=\"height: 15px\">\r\n<td style=\"height: 15px;width: 544.396px\">Enable disappearing messages<\/td>\r\n<td style=\"height: 15px;width: 169.688px\">Yes\/No<\/td>\r\n<\/tr>\r\n<tr style=\"height: 15px\">\r\n<td style=\"height: 15px;width: 544.396px\">Verify contacts\u2019 safety numbers<\/td>\r\n<td style=\"height: 15px;width: 169.688px\">Yes\/No<\/td>\r\n<\/tr>\r\n<tr style=\"height: 15px\">\r\n<td style=\"height: 15px;width: 544.396px\">Turn off message previews<\/td>\r\n<td style=\"height: 15px;width: 169.688px\">Yes\/No<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\nSignal is the gold standard for secure messaging. It encrypts messages so only you and the recipient can read them. WhatsApp is better than SMS but collects more data. Telegram is only secure in Secret Chats. Always use the most secure option for sensitive conversations.\r\n\r\n<hr \/>\r\n\r\n<h1><a id=\"6.2\"><\/a>Password Security Basics: Passwords and Password Managers<\/h1>\r\n<strong>Strong passwords<\/strong> are key to ensuring you protect yourself from people accessing your accounts and devices without your permission. Weak or reused passwords make it easy for someone to break into your accounts. If you use the same password everywhere, one breach can put all your accounts at risk.\r\n<h2>How to create a strong password:<\/h2>\r\n<ul>\r\n \t<li>Use at least 12 characters (longer is better).<\/li>\r\n \t<li>Mix uppercase and lowercase letters, numbers, and symbols.<\/li>\r\n \t<li>Avoid using names, birthdays, or common words.<\/li>\r\n \t<li>Use a passphrase (a sentence or group of random words).<\/li>\r\n<\/ul>\r\n<div class=\"textbox textbox--examples\">\r\n<div class=\"textbox__content\">\r\n\r\n<strong>Example: <\/strong>Instead of \u201cjasmine123\u201d, use \u201cSunshine!River$Pineapple2026\u201d.\r\n(Please do not use this password. This is just an example of a potential password.)\r\n\r\n<\/div>\r\n<\/div>\r\n<h2>Using a Password Manager<\/h2>\r\nA password manager is a tool that stores all your passwords securely. You only need to remember one master password. Examples of good, secure password managers include Bitwarden, 1Password, and KeePassXC.\r\n\r\n<img src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-18-e1773066990826.png\" alt=\"Logos of KeePassXC, bitwarden, and 1Password, which are different password management platforms.\" width=\"518\" height=\"200\" class=\"wp-image-695 aligncenter\" \/>\r\n\r\nPassword managers can ensure that you\u00a0 have <strong>strong, unique passwords<\/strong> for each of your linked accounts, while providing convenience of using <strong>only one password as the main user.<\/strong>\r\n\r\nIt remembers your passwords, so you don't have to. Many password managers are also able to <strong>detect if your chosen passwords are weak,<\/strong> or if your privacy has been breached.\r\n\r\n&nbsp;\r\n\r\n[caption id=\"\" align=\"aligncenter\" width=\"481\"]<img src=\"https:\/\/www.dashlane.com\/_next\/image?url=https%3A%2F%2Fripleyprd.wpenginepowered.com%2Fwp-content%2Fuploads%2F2022%2F11%2FHow-Password-Managers-Work-Beginners-Guide_Online-Password-Manager-1024x645.png&amp;w=3840&amp;q=90\" alt=\"Diagram of how a password manager works. The &quot;Password Vault&quot; or &quot;Password Manager&quot; is at the top, with a lock over it. Passwords desktop computer, tablet, and mobile phone are all connected to this Password Vault. This demonstrates the structure of a password manager as being the main secure part, with all other device passwords being protected by the password manager.\" width=\"481\" height=\"303\" \/> Structure of password management by a password manager or \"Password Vault\".[\/caption]\r\n<h4><strong>Checklist: Password Safety<\/strong><\/h4>\r\n<table>\r\n<thead>\r\n<tr>\r\n<th>Task<\/th>\r\n<th>Done?<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<td>Change all passwords to strong, unique ones<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Use a password manager<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Don\u2019t share passwords with anyone<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Don\u2019t use social media accounts to sign in to other services<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\nStrong passwords and password managers are your first line of defense. They make it much harder for someone to guess or steal your login information. Changing passwords regularly and not reusing them keeps your accounts safer.\r\n\r\n&nbsp;\r\n\r\n<hr \/>\r\n\r\n<h1><a id=\"6.7\"><\/a>Smart Home Devices and Webcam Privacy<\/h1>\r\nSmart home devices (like Alexa, Google Home, Ring Security cameras, smart cameras, or smart thermostats) can be used to monitor or harass you if someone else has access.\r\n<h2><strong>Tips for smart home safety:<\/strong><\/h2>\r\n<ul>\r\n \t<li>Change default passwords on all devices.<\/li>\r\n \t<li>Review who has access to your smart home accounts.<\/li>\r\n \t<li>Regularly check and delete voice recordings (see device settings).<\/li>\r\n \t<li>Use the physical mute button on smart speakers when not in use.<\/li>\r\n \t<li>Place smart speakers in common areas, not bedrooms.<\/li>\r\n \t<li>Cover webcams when not in use (a piece of tape works).<\/li>\r\n<\/ul>\r\n<h2><strong>How to delete voice recordings:<\/strong><\/h2>\r\n<div class=\"postbox h5p-sidebar\">\r\n<div class=\"h5p-action-bar-settings h5p-panel\"><code>[h5p id=\"16\"]<\/code><\/div>\r\n<\/div>\r\n<div class=\"postbox h5p-sidebar\"><\/div>\r\n<h4><strong>Checklist: Smart Device Safety<\/strong><\/h4>\r\n<table>\r\n<thead>\r\n<tr>\r\n<th>Task<\/th>\r\n<th>Done?<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<td>Change passwords on smart devices<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Review and remove unwanted account access<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Delete stored voice recordings regularly<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Use mute buttons and cover webcams<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\nSmart devices can make life easier, but they also create new risks. Taking control of your devices and who can access them helps protect your privacy.\r\n\r\n<hr \/>\r\n\r\n<h1><a id=\"6.8\"><\/a>Social Media Privacy Settings and Audience Control<\/h1>\r\nSocial media is a common place for TFGBV. Protecting your privacy on these platforms is essential. <strong>Key settings to check across all social media platforms include:<\/strong>\r\n<ul>\r\n \t<li>Set your account to private. If you wish to keep it public, then aim to do regular checks of your following, and limit interactions.<\/li>\r\n \t<li>Only accept requests from people you know.<\/li>\r\n \t<li>Ignore or delete requests from strangers.<\/li>\r\n \t<li>Block or report suspicious accounts.<\/li>\r\n \t<li>Limit who can comment or message you.<\/li>\r\n \t<li>Turn off location tagging.<\/li>\r\n \t<li>Review tagged photos before they appear on your profile.<\/li>\r\n \t<li>Regularly audit your followers and remove suspicious accounts.<\/li>\r\n<\/ul>\r\nSocial media privacy settings help you control who sees your information and interacts with you. Regularly reviewing and updating these settings keeps you safer from harassment and unwanted contact.\r\n<h4><strong>Checklist: Social Media Safety<\/strong><\/h4>\r\n<table>\r\n<thead>\r\n<tr>\r\n<th>Task<\/th>\r\n<th>Done?<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<td>Set accounts to private<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Limit comments and messages<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Turn off location tagging<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Review tagged photos and followers<\/td>\r\n<td>Yes\/No<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\nSocial media privacy settings help you control who sees your information and interacts with you. Regularly reviewing and updating these settings keeps you safer from harassment and unwanted contact.\r\n\r\n<hr \/>\r\n\r\n<h1><a id=\"6.3\"><\/a>Two-Factor Authentication (2FA) and Authenticator Apps<\/h1>\r\nTwo-factor authentication (2FA) adds an extra step when you log in. After entering your password, you\u2019ll need to enter a code sent to your phone or generated by an app. This makes it much harder for someone to break in, even if they know your password. Many apps use 2FA for online security.\r\n<h3><strong>Tips for 2FA Apps:<\/strong><\/h3>\r\n<ul>\r\n \t<li>Use an authenticator app instead of SMS if possible.<\/li>\r\n \t<li>Save backup codes in a safe place in case you lose your phone.<\/li>\r\n \t<li>Don\u2019t share your 2FA codes with anyone.<\/li>\r\n<\/ul>\r\nPlease keep in mind that 2FA <strong>requires you to have more than one device, or for you to be able navigate multiple apps<\/strong>. Sometimes, people with disabilities have a difficult time using these systems because they are not built with access in mind.\r\n\r\n<span>[h5p id=\"17\"]<\/span>\r\n\r\n&nbsp;\r\n<div class=\"textbox textbox--examples\">\r\n<div class=\"textbox__content\">\r\n\r\n<strong>Example: <\/strong>When logging into her email, Priya enters her password and then a code from her authenticator app. Even if someone knows her password, they can\u2019t get in without her phone.\r\n\r\n<\/div>\r\n<\/div>\r\n<h4><strong>Checklist: 2FA Setup<\/strong><\/h4>\r\n<table style=\"height: 60px\">\r\n<thead>\r\n<tr style=\"height: 15px\">\r\n<th style=\"height: 15px;width: 596.406px\">Task<\/th>\r\n<th style=\"height: 15px;width: 117.01px\">Done?<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr style=\"height: 15px\">\r\n<td style=\"height: 15px;width: 596.74px\">Enable 2FA on all important accounts<\/td>\r\n<td style=\"height: 15px;width: 117.344px\">Yes\/No<\/td>\r\n<\/tr>\r\n<tr style=\"height: 15px\">\r\n<td style=\"height: 15px;width: 596.74px\">Use an authenticator app, not just SMS<\/td>\r\n<td style=\"height: 15px;width: 117.344px\">Yes\/No<\/td>\r\n<\/tr>\r\n<tr style=\"height: 15px\">\r\n<td style=\"height: 15px;width: 596.74px\">Save backup codes securely<\/td>\r\n<td style=\"height: 15px;width: 117.344px\">Yes\/No<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n2FA is like adding a <strong>second lock to your door<\/strong>. Even if someone has your key (password), they can\u2019t get in without the code from your phone. Authenticator apps are safer than SMS because texts can be intercepted or stolen.\r\n\r\n<hr \/>\r\n\r\n<div class=\"textbox textbox--key-takeaways\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\" style=\"text-align: center\">Reflect<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n\r\nBased on this chapter, do you have secure devices and accounts?\r\n\r\nWhat can applications and organizations do to make online security more accessible for you? For other women with disabilities?\r\n<p style=\"text-align: center\"><em>Leave suggestions in the comments below!<\/em><\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<h2>Resources<\/h2>\r\n<div class=\"csl-bib-body\">\r\n<div class=\"csl-bib-body\">\r\n<ul>\r\n \t<li>\r\n<div class=\"csl-bib-body\">\r\n<div class=\"csl-entry\">National Network to End Domestic Violence. (2022). Stalkerware: Phone Surveillance &amp; Safety for Survivors. <i>Safety Net Project<\/i>. <a href=\"https:\/\/www.techsafety.org\/spyware-and-stalkerware-phone-surveillance#:~:text=Stalkerware%20can%20also:%20*%20Turn%20on%20your,usage%20*%20The%20other%20person's%20suspicious%20behavior\">https:\/\/www.techsafety.org\/spyware-and-stalkerware-phone-surveillance#:~:text=Stalkerware%20can%20also:%20*%20Turn%20on%20your,usage%20*%20The%20other%20person's%20suspicious%20behavior<\/a><\/div>\r\n&nbsp;\r\n\r\n<\/div><\/li>\r\n \t<li class=\"csl-entry\">National Network to End Domestic Violence. (2018). Evidence Collection Series: Mobile Spyware. <i>Safety Net Project<\/i>. <a href=\"https:\/\/www.techsafety.org\/spyware-evidence\">https:\/\/www.techsafety.org\/spyware-evidence<\/a><\/li>\r\n<\/ul>\r\n&nbsp;\r\n\r\n<\/div>\r\n&nbsp;\r\n\r\n<\/div>","rendered":"<p style=\"text-align: right\"><a id=\"quick-exit-btn\" href=\"https:\/\/google.ca\" title=\"Quick Exit\">EXIT SITE<\/a><\/p>\n<hr \/>\n<h1>Chapter 6: Online Safety How-To&#8217;s<\/h1>\n<p>This chapter will <strong>review online safety tips and ways to set up your accounts and devices for safe use<\/strong> across different types of technology. This chapter will only discuss specific tips and ways to navigate settings for online and digital safety.<\/p>\n<div class=\"textbox 1\">\n<h2><em><strong><span style=\"background-color: #ffff00\">Safety Note:<\/span> <\/strong><\/em><\/h2>\n<p>Changing any of your typical digital behaviour (changing passwords, logging out of or deleting accounts, turning off location, uninstalling apps) may alert your abuser. If you believe you are in danger, find support from a local service or use a safer device before making any changes.<\/p>\n<\/div>\n<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p>This chapter reviews the following topics, which are important for online safety measures:<\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li><a href=\"#6.4\">App Permissions and Mobile Privacy Settings<\/a><\/li>\n<li><a href=\"#6.6\">Detecting and Removing Spyware\/Stalkerware<\/a><\/li>\n<li><a href=\"#6.1\">Device Safety<\/a><\/li>\n<li><a href=\"#6.5\">Location Sharing and Preventing Unwanted Tracking<\/a><\/li>\n<li><a href=\"#6.9\">Messaging Apps and Secure Communication<\/a><\/li>\n<li><a href=\"#6.2\">Password Security Basics<\/a><\/li>\n<li><a href=\"#6.7\">Smart Home Devices and Webcam Privacy<\/a><\/li>\n<li><a href=\"#6.8\">Social Media Privacy Settings and Audience Control<\/a><\/li>\n<li><a href=\"#6.3\">Two-Factor Authentication (2FA)<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<hr \/>\n<h1><a id=\"6.4\"><\/a>App Permissions and Mobile Privacy Settings<\/h1>\n<p>On your mobile devices and in different applications, you have some degree of control over what functions are enabled at different times. We have outlined some <strong>considerations for mobile privacy settings:<\/strong><\/p>\n<ul>\n<li>Only give apps the permissions they need.<\/li>\n<li>Set access to \u201cWhile Using the App\u201d or \u201cNever\u201d for most apps. Turn off location, camera, or microphone access entirely for apps you don\u2019t trust.<\/li>\n<li>Delete apps you don\u2019t use or don\u2019t recognize.<\/li>\n<li>Review permissions regularly, especially after updates.<\/li>\n<\/ul>\n<h2><strong>How to check and change app permissions for:<\/strong><\/h2>\n<p><span><\/p>\n<div id=\"h5p-13\">\n<div class=\"h5p-iframe-wrapper\"><iframe id=\"h5p-iframe-13\" class=\"h5p-iframe\" data-content-id=\"13\" style=\"height:1px\" src=\"about:blank\" frameBorder=\"0\" scrolling=\"no\" title=\"Chapter 6: App permissions\"><\/iframe><\/div>\n<\/div>\n<p><\/span><\/p>\n<div class=\"textbox textbox--examples\">\n<div class=\"textbox__content\">\n<p><strong>Example: <\/strong>Sam finds that a game app has access to his microphone and location, even though it doesn&#8217;t use them in-game. He changes the settings to deny these permissions.<\/p>\n<\/div>\n<\/div>\n<h4><strong>Checklist: App Permissions<\/strong><\/h4>\n<table>\n<thead>\n<tr>\n<th>Task<\/th>\n<th>Done?<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Review app permissions for location, camera, microphone<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<tr>\n<td>Remove permissions from apps that don\u2019t need them<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<tr>\n<td>Delete unused or suspicious apps<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Apps often ask for more access than they need. Limiting permissions protects your privacy and reduces the risk of someone spying on you through your device.<\/p>\n<hr \/>\n<h1><a id=\"6.6\"><\/a>Detecting and Removing Spyware and Stalkerware<\/h1>\n<p>Spyware or stalkerware is software secretly installed on your device to monitor your messages, calls, location, and more. It is often used by abusers to control or watch their victims. Overall, spyware and stalkerware is always evolving and updating, to the point where it may not be visible or have any impact on your devices.<\/p>\n<h2><strong>Warning signs of spyware and stalkerware being installed:<\/strong><\/h2>\n<ul>\n<li>Your device is slow, hot, or the battery drains quickly.<\/li>\n<li>You see unfamiliar apps or settings.<\/li>\n<li>The device lights up or makes sounds when not in use.<\/li>\n<li>Look for apps with unusual permissions, such as: \u201cInstall unknown apps\u201d, \u201cNotification access\u201d, \u201cUsage access\u201d, or \u201cDisplay over other apps\u201d.<\/li>\n<\/ul>\n<p>However, the biggest sign of spyware or stalkerware is the behaviour of the abuser. Pay attention to if the abuser is acting differently, or reacting to things they should not be aware of; for example, when your abuser knows about a text conversation that only someone watching your device would know.<\/p>\n<h2><strong>How to check for spyware:<\/strong><\/h2>\n<p><span><\/p>\n<div id=\"h5p-14\">\n<div class=\"h5p-iframe-wrapper\"><iframe id=\"h5p-iframe-14\" class=\"h5p-iframe\" data-content-id=\"14\" style=\"height:1px\" src=\"about:blank\" frameBorder=\"0\" scrolling=\"no\" title=\"Chapter 6: Spyware\"><\/iframe><\/div>\n<\/div>\n<p><\/span><\/p>\n<h2><strong>How to remove spyware:<\/strong><\/h2>\n<ul>\n<li>Delete suspicious apps or profiles.<\/li>\n<li>Run a security scan with a trusted app.<\/li>\n<li>As a last resort, do a factory reset (erase all data and set up as new).<\/li>\n<li>Change all passwords from a clean device.<\/li>\n<\/ul>\n<p><strong><span style=\"background-color: #ffff00\">Safety note:<\/span> <\/strong>Removing spyware may alert the person monitoring you. If you are in danger, get support from a local service or use a safer device before making changes.<\/p>\n<h4><strong>Checklist: Spyware Detection<\/strong><\/h4>\n<table>\n<thead>\n<tr>\n<th>Task<\/th>\n<th>Done?<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Check for unfamiliar apps or settings<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<tr>\n<td>Run a security scan with anti-stalkerware tools<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<tr>\n<td>Remove suspicious apps or profiles<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<tr>\n<td>Change passwords from a safe device<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<tr>\n<td>Get support before making changes if at risk<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Spyware is a serious threat to your privacy and safety. Regularly checking your device and knowing the signs can help you act quickly. Always consider your safety before removing spyware, as it may escalate the situation.<\/p>\n<hr \/>\n<h1><a id=\"6.1\"><\/a>Device Safety: Choosing and Using a Safer Device<\/h1>\n<p>If you think someone is monitoring your device, it\u2019s safest to use a different one that they have never accessed in order to contact help. This could be a friend\u2019s phone or computer, a public computer at a library or community center, or even a new phone with a new account (not linked to your old cloud accounts).<\/p>\n<h2><strong>Tips for safer device use:<\/strong><\/h2>\n<ul>\n<li>Set a strong passcode or PIN (at least 6 digits, not a birthday or easy pattern, like 123456).<\/li>\n<li>Don\u2019t link your new device to old accounts or cloud backups.<\/li>\n<li>Turn off Bluetooth and location sharing when not needed.<\/li>\n<li>Keep your device\u2019s software up to date.<\/li>\n<li>Use a device not accessed by an abuser.<\/li>\n<\/ul>\n<div class=\"textbox textbox--examples\">\n<div class=\"textbox__content\">\n<p><strong>Example: <\/strong>Maria suspects her ex has installed spyware on her phone. She buys a pay-as-you-go phone, sets a new PIN, and only uses it to contact support services and trusted friends.<\/p>\n<\/div>\n<\/div>\n<hr \/>\n<h1>Location Sharing and Preventing Unwanted Tracking<\/h1>\n<p>Sharing your location can put you at risk if someone wants to track or harm you. Many apps and devices can share your location without you realizing it. To turn off location sharing or better manage it, try the steps listed per device type below.<\/p>\n<p><span><\/p>\n<div id=\"h5p-15\">\n<div class=\"h5p-iframe-wrapper\"><iframe id=\"h5p-iframe-15\" class=\"h5p-iframe\" data-content-id=\"15\" style=\"height:1px\" src=\"about:blank\" frameBorder=\"0\" scrolling=\"no\" title=\"Chapter 6: Location Sharing and Preventing Unwanted Tracking\"><\/iframe><\/div>\n<\/div>\n<p><\/span><\/p>\n<h2><strong>Tips for stopping location tracking:<\/strong><\/h2>\n<ul>\n<li>Don\u2019t \u201ccheck in\u201d to locations on social media.<\/li>\n<li>Delete location history, especially before or after visiting safe places like shelters.<\/li>\n<li>Turn off Bluetooth when not in use (Bluetooth can be used for tracking).<\/li>\n<\/ul>\n<div class=\"textbox textbox--examples\">\n<div class=\"textbox__content\">\n<p><strong>Example: <\/strong>Taylor turns off location sharing in all her apps and deletes her location history before moving to a new apartment.<\/p>\n<\/div>\n<\/div>\n<h4><strong>Checklist: Location Privacy<\/strong><\/h4>\n<table>\n<thead>\n<tr>\n<th>Task<\/th>\n<th>Done?<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Turn off location services when not needed<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<tr>\n<td>Stop sharing location in apps and with contacts<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<tr>\n<td>Delete location history regularly<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<tr>\n<td>Turn off Bluetooth when not in use<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Controlling your location settings helps prevent someone from tracking your movements. Regularly reviewing and updating these settings keeps you safer.<\/p>\n<hr \/>\n<h1><a id=\"6.9\"><\/a>Messaging Apps and Secure Communication<\/h1>\n<p>Not all messaging apps are equally safe. Some are better for private, secure conversations.<\/p>\n<div class=\"postbox h5p-sidebar\">\n<div class=\"h5p-action-bar-settings h5p-panel\"><code><\/p>\n<div id=\"h5p-18\">\n<div class=\"h5p-iframe-wrapper\"><iframe id=\"h5p-iframe-18\" class=\"h5p-iframe\" data-content-id=\"18\" style=\"height:1px\" src=\"about:blank\" frameBorder=\"0\" scrolling=\"no\" title=\"Chapter 6: Best Apps for Secure Messaging\"><\/iframe><\/div>\n<\/div>\n<p><\/code><\/div>\n<\/div>\n<p><strong style=\"color: #1f2933;font-size: 1.424em\">Tips for all messaging apps:<\/strong><\/p>\n<ul>\n<li>Don\u2019t share sensitive information or content in group chats, or to people you don&#8217;t know.<\/li>\n<li>Turn off message previews in notifications.<\/li>\n<li>Be very cautious with accessing links and attachments.<\/li>\n<\/ul>\n<h4><strong>Checklist: Secure Messaging<\/strong><\/h4>\n<table style=\"height: 75px\">\n<thead>\n<tr style=\"height: 15px\">\n<th style=\"height: 15px;width: 544.062px\">Task<\/th>\n<th style=\"height: 15px;width: 169.354px\">Done?<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 15px\">\n<td style=\"height: 15px;width: 544.396px\">Use Signal or another secure app for sensitive chats<\/td>\n<td style=\"height: 15px;width: 169.688px\">Yes\/No<\/td>\n<\/tr>\n<tr style=\"height: 15px\">\n<td style=\"height: 15px;width: 544.396px\">Enable disappearing messages<\/td>\n<td style=\"height: 15px;width: 169.688px\">Yes\/No<\/td>\n<\/tr>\n<tr style=\"height: 15px\">\n<td style=\"height: 15px;width: 544.396px\">Verify contacts\u2019 safety numbers<\/td>\n<td style=\"height: 15px;width: 169.688px\">Yes\/No<\/td>\n<\/tr>\n<tr style=\"height: 15px\">\n<td style=\"height: 15px;width: 544.396px\">Turn off message previews<\/td>\n<td style=\"height: 15px;width: 169.688px\">Yes\/No<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Signal is the gold standard for secure messaging. It encrypts messages so only you and the recipient can read them. WhatsApp is better than SMS but collects more data. Telegram is only secure in Secret Chats. Always use the most secure option for sensitive conversations.<\/p>\n<hr \/>\n<h1><a id=\"6.2\"><\/a>Password Security Basics: Passwords and Password Managers<\/h1>\n<p><strong>Strong passwords<\/strong> are key to ensuring you protect yourself from people accessing your accounts and devices without your permission. Weak or reused passwords make it easy for someone to break into your accounts. If you use the same password everywhere, one breach can put all your accounts at risk.<\/p>\n<h2>How to create a strong password:<\/h2>\n<ul>\n<li>Use at least 12 characters (longer is better).<\/li>\n<li>Mix uppercase and lowercase letters, numbers, and symbols.<\/li>\n<li>Avoid using names, birthdays, or common words.<\/li>\n<li>Use a passphrase (a sentence or group of random words).<\/li>\n<\/ul>\n<div class=\"textbox textbox--examples\">\n<div class=\"textbox__content\">\n<p><strong>Example: <\/strong>Instead of \u201cjasmine123\u201d, use \u201cSunshine!River$Pineapple2026\u201d.<br \/>\n(Please do not use this password. This is just an example of a potential password.)<\/p>\n<\/div>\n<\/div>\n<h2>Using a Password Manager<\/h2>\n<p>A password manager is a tool that stores all your passwords securely. You only need to remember one master password. Examples of good, secure password managers include Bitwarden, 1Password, and KeePassXC.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-18-e1773066990826.png\" alt=\"Logos of KeePassXC, bitwarden, and 1Password, which are different password management platforms.\" width=\"518\" height=\"200\" class=\"wp-image-695 aligncenter\" srcset=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-18-e1773066990826.png 1920w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-18-e1773066990826-300x116.png 300w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-18-e1773066990826-1024x395.png 1024w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-18-e1773066990826-768x296.png 768w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-18-e1773066990826-1536x592.png 1536w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-18-e1773066990826-65x25.png 65w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-18-e1773066990826-225x87.png 225w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-18-e1773066990826-350x135.png 350w\" sizes=\"auto, (max-width: 518px) 100vw, 518px\" \/><\/p>\n<p>Password managers can ensure that you\u00a0 have <strong>strong, unique passwords<\/strong> for each of your linked accounts, while providing convenience of using <strong>only one password as the main user.<\/strong><\/p>\n<p>It remembers your passwords, so you don&#8217;t have to. Many password managers are also able to <strong>detect if your chosen passwords are weak,<\/strong> or if your privacy has been breached.<\/p>\n<p>&nbsp;<\/p>\n<figure style=\"width: 481px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dashlane.com\/_next\/image?url=https%3A%2F%2Fripleyprd.wpenginepowered.com%2Fwp-content%2Fuploads%2F2022%2F11%2FHow-Password-Managers-Work-Beginners-Guide_Online-Password-Manager-1024x645.png&amp;w=3840&amp;q=90\" alt=\"Diagram of how a password manager works. The &quot;Password Vault&quot; or &quot;Password Manager&quot; is at the top, with a lock over it. Passwords desktop computer, tablet, and mobile phone are all connected to this Password Vault. This demonstrates the structure of a password manager as being the main secure part, with all other device passwords being protected by the password manager.\" width=\"481\" height=\"303\" \/><figcaption class=\"wp-caption-text\">Structure of password management by a password manager or &#8220;Password Vault&#8221;.<\/figcaption><\/figure>\n<h4><strong>Checklist: Password Safety<\/strong><\/h4>\n<table>\n<thead>\n<tr>\n<th>Task<\/th>\n<th>Done?<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Change all passwords to strong, unique ones<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<tr>\n<td>Use a password manager<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<tr>\n<td>Don\u2019t share passwords with anyone<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<tr>\n<td>Don\u2019t use social media accounts to sign in to other services<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Strong passwords and password managers are your first line of defense. They make it much harder for someone to guess or steal your login information. Changing passwords regularly and not reusing them keeps your accounts safer.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<h1><a id=\"6.7\"><\/a>Smart Home Devices and Webcam Privacy<\/h1>\n<p>Smart home devices (like Alexa, Google Home, Ring Security cameras, smart cameras, or smart thermostats) can be used to monitor or harass you if someone else has access.<\/p>\n<h2><strong>Tips for smart home safety:<\/strong><\/h2>\n<ul>\n<li>Change default passwords on all devices.<\/li>\n<li>Review who has access to your smart home accounts.<\/li>\n<li>Regularly check and delete voice recordings (see device settings).<\/li>\n<li>Use the physical mute button on smart speakers when not in use.<\/li>\n<li>Place smart speakers in common areas, not bedrooms.<\/li>\n<li>Cover webcams when not in use (a piece of tape works).<\/li>\n<\/ul>\n<h2><strong>How to delete voice recordings:<\/strong><\/h2>\n<div class=\"postbox h5p-sidebar\">\n<div class=\"h5p-action-bar-settings h5p-panel\"><code><\/p>\n<div id=\"h5p-16\">\n<div class=\"h5p-iframe-wrapper\"><iframe id=\"h5p-iframe-16\" class=\"h5p-iframe\" data-content-id=\"16\" style=\"height:1px\" src=\"about:blank\" frameBorder=\"0\" scrolling=\"no\" title=\"Chapter 6: Smart Home\"><\/iframe><\/div>\n<\/div>\n<p><\/code><\/div>\n<\/div>\n<div class=\"postbox h5p-sidebar\"><\/div>\n<h4><strong>Checklist: Smart Device Safety<\/strong><\/h4>\n<table>\n<thead>\n<tr>\n<th>Task<\/th>\n<th>Done?<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Change passwords on smart devices<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<tr>\n<td>Review and remove unwanted account access<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<tr>\n<td>Delete stored voice recordings regularly<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<tr>\n<td>Use mute buttons and cover webcams<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Smart devices can make life easier, but they also create new risks. Taking control of your devices and who can access them helps protect your privacy.<\/p>\n<hr \/>\n<h1><a id=\"6.8\"><\/a>Social Media Privacy Settings and Audience Control<\/h1>\n<p>Social media is a common place for TFGBV. Protecting your privacy on these platforms is essential. <strong>Key settings to check across all social media platforms include:<\/strong><\/p>\n<ul>\n<li>Set your account to private. If you wish to keep it public, then aim to do regular checks of your following, and limit interactions.<\/li>\n<li>Only accept requests from people you know.<\/li>\n<li>Ignore or delete requests from strangers.<\/li>\n<li>Block or report suspicious accounts.<\/li>\n<li>Limit who can comment or message you.<\/li>\n<li>Turn off location tagging.<\/li>\n<li>Review tagged photos before they appear on your profile.<\/li>\n<li>Regularly audit your followers and remove suspicious accounts.<\/li>\n<\/ul>\n<p>Social media privacy settings help you control who sees your information and interacts with you. Regularly reviewing and updating these settings keeps you safer from harassment and unwanted contact.<\/p>\n<h4><strong>Checklist: Social Media Safety<\/strong><\/h4>\n<table>\n<thead>\n<tr>\n<th>Task<\/th>\n<th>Done?<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Set accounts to private<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<tr>\n<td>Limit comments and messages<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<tr>\n<td>Turn off location tagging<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<tr>\n<td>Review tagged photos and followers<\/td>\n<td>Yes\/No<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Social media privacy settings help you control who sees your information and interacts with you. Regularly reviewing and updating these settings keeps you safer from harassment and unwanted contact.<\/p>\n<hr \/>\n<h1><a id=\"6.3\"><\/a>Two-Factor Authentication (2FA) and Authenticator Apps<\/h1>\n<p>Two-factor authentication (2FA) adds an extra step when you log in. After entering your password, you\u2019ll need to enter a code sent to your phone or generated by an app. This makes it much harder for someone to break in, even if they know your password. Many apps use 2FA for online security.<\/p>\n<h3><strong>Tips for 2FA Apps:<\/strong><\/h3>\n<ul>\n<li>Use an authenticator app instead of SMS if possible.<\/li>\n<li>Save backup codes in a safe place in case you lose your phone.<\/li>\n<li>Don\u2019t share your 2FA codes with anyone.<\/li>\n<\/ul>\n<p>Please keep in mind that 2FA <strong>requires you to have more than one device, or for you to be able navigate multiple apps<\/strong>. Sometimes, people with disabilities have a difficult time using these systems because they are not built with access in mind.<\/p>\n<p><span><\/p>\n<div id=\"h5p-17\">\n<div class=\"h5p-iframe-wrapper\"><iframe id=\"h5p-iframe-17\" class=\"h5p-iframe\" data-content-id=\"17\" style=\"height:1px\" src=\"about:blank\" frameBorder=\"0\" scrolling=\"no\" title=\"Chapter 6: 2FA\"><\/iframe><\/div>\n<\/div>\n<p><\/span><\/p>\n<p>&nbsp;<\/p>\n<div class=\"textbox textbox--examples\">\n<div class=\"textbox__content\">\n<p><strong>Example: <\/strong>When logging into her email, Priya enters her password and then a code from her authenticator app. Even if someone knows her password, they can\u2019t get in without her phone.<\/p>\n<\/div>\n<\/div>\n<h4><strong>Checklist: 2FA Setup<\/strong><\/h4>\n<table style=\"height: 60px\">\n<thead>\n<tr style=\"height: 15px\">\n<th style=\"height: 15px;width: 596.406px\">Task<\/th>\n<th style=\"height: 15px;width: 117.01px\">Done?<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 15px\">\n<td style=\"height: 15px;width: 596.74px\">Enable 2FA on all important accounts<\/td>\n<td style=\"height: 15px;width: 117.344px\">Yes\/No<\/td>\n<\/tr>\n<tr style=\"height: 15px\">\n<td style=\"height: 15px;width: 596.74px\">Use an authenticator app, not just SMS<\/td>\n<td style=\"height: 15px;width: 117.344px\">Yes\/No<\/td>\n<\/tr>\n<tr style=\"height: 15px\">\n<td style=\"height: 15px;width: 596.74px\">Save backup codes securely<\/td>\n<td style=\"height: 15px;width: 117.344px\">Yes\/No<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>2FA is like adding a <strong>second lock to your door<\/strong>. Even if someone has your key (password), they can\u2019t get in without the code from your phone. Authenticator apps are safer than SMS because texts can be intercepted or stolen.<\/p>\n<hr \/>\n<div class=\"textbox textbox--key-takeaways\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\" style=\"text-align: center\">Reflect<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p>Based on this chapter, do you have secure devices and accounts?<\/p>\n<p>What can applications and organizations do to make online security more accessible for you? For other women with disabilities?<\/p>\n<p style=\"text-align: center\"><em>Leave suggestions in the comments below!<\/em><\/p>\n<\/div>\n<\/div>\n<h2>Resources<\/h2>\n<div class=\"csl-bib-body\">\n<div class=\"csl-bib-body\">\n<ul>\n<li>\n<div class=\"csl-bib-body\">\n<div class=\"csl-entry\">National Network to End Domestic Violence. (2022). Stalkerware: Phone Surveillance &amp; Safety for Survivors. <i>Safety Net Project<\/i>. <a href=\"https:\/\/www.techsafety.org\/spyware-and-stalkerware-phone-surveillance#:~:text=Stalkerware%20can%20also:%20*%20Turn%20on%20your,usage%20*%20The%20other%20person's%20suspicious%20behavior\">https:\/\/www.techsafety.org\/spyware-and-stalkerware-phone-surveillance#:~:text=Stalkerware%20can%20also:%20*%20Turn%20on%20your,usage%20*%20The%20other%20person&#8217;s%20suspicious%20behavior<\/a><\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<\/li>\n<li class=\"csl-entry\">National Network to End Domestic Violence. (2018). Evidence Collection Series: Mobile Spyware. <i>Safety Net Project<\/i>. <a href=\"https:\/\/www.techsafety.org\/spyware-evidence\">https:\/\/www.techsafety.org\/spyware-evidence<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n","protected":false},"author":554,"menu_order":8,"comment_status":"open","ping_status":"closed","template":"","meta":{"pb_show_title":"","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[48],"contributor":[],"license":[],"class_list":["post-941","chapter","type-chapter","status-web-only","hentry","chapter-type-standard"],"part":33,"_links":{"self":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/users\/554"}],"replies":[{"embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/comments?post=941"}],"version-history":[{"count":9,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/941\/revisions"}],"predecessor-version":[{"id":1045,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/941\/revisions\/1045"}],"part":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/parts\/33"}],"metadata":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/941\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/media?parent=941"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapter-type?post=941"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/contributor?post=941"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/license?post=941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}