A Note on Language
In this toolkit, we will sometimes use the word woman/women and feminine pronouns for simplicity and to recognize the significant impact technology-facilitated violence has on women and girls. We recognize that TFGBV also impacts trans, non-binary, and Two-Spirit people. We hope that all people impacted by TFGBV will find these documents useful.
Many shelters and transition houses have computers or Wi-Fi networks available for survivors to research housing, apply for jobs or benefits, and more. Access to Wi-Fi or a computer can also help survivors stay in touch with their support system and keep them from feeling isolated.
Organizations should ensure that the computer and Wi-Fi network are as safe and secure as possible to protect the privacy and safety of staff and survivors. Below are some tips and best practices for securing shared computers and Wi-Fi networks.
Shared Computers & Devices
Set up a guest account for survivors. Guest accounts don’t have administrator rights, making it more difficult for malware like viruses or spyware to be installed accidentally. Protect shared computers and devices from malware by running anti-virus and anti-spyware software and by keeping all operating systems, software, and apps up to date. Speak with your IT staff or consultants about additional steps to secure the computer or device.
Protect against accidental or inappropriate access from the shared computer. Set up your network so that the shared computer doesn’t have access to your organization’s shared drive and vice versa. Set up a separate printer for survivors.
Place the computer in an area that allows for privacy. If the computer has a built-in camera or a webcam, provide a space for survivors to use the webcam that will not reveal others in the background or give away any location information (e.g. street sign through the window). Place a removable webcam cover over the camera lens when the camera is not in use, to prevent accidentally showing the room or whoever is in front of the camera if it is turned on automatically.
On computers and other devices, install basic programs for word processing, a secure web browser, Adobe Acrobat reader, and other programs or apps users would typically need. Remind survivors not to save personal files on the shared computer.
Data Storage for Survivors
When survivors need to save documents like resumes, forms, or other information, one option is to give them USB drives or sticks. Some USB drives offer additional security options such as password protection and encryption.
Another option is to help survivors set up a new “cloud” account for online storage. If a survivor is concerned about an abusive person or anyone else accessing the account, discuss setting up a brand new account that doesn’t connect to older accounts through the same email account, phone number, or profile picture, for example. Online storage is available for free; paid services offer more space and options.
Internet Access from Shared Computers
For survivors to be able to use the shared computer most effectively, it should be connected to the Internet. To support privacy and security, use a combination of technical security and education for survivors.
Set all browsers on shared computers and devices to the most private and secure modes by default. Detailed information for most major web browsers can be found in our resource Browser Privacy Tips.
Educate users about online privacy and remind them to log out of online accounts. For more information, read Online Privacy and Safety. Remind survivors not to save personal information, such as website favourites or bookmarks, usernames and passwords, credit card information, or other personal information on the shared computer. Encourage them to use a password manager for usernames, passwords, and other sensitive information. For more information, read Password Security.
Shared Wi-Fi Network Access
Survivors may bring their own devices, such as smartphones or tablets, to the shelter, program, or office. Set up an alternate guest network for survivors and visitors to use. This separate network can have a different network name and password than the one used by staff for program delivery. You can then easily change the password to that guest network when you need to, without having to update staff access. A guest network also protects against accidental or inappropriate access to Wi-Fi administrator settings or to information from the traffic of the main network. For more information, read Wi-Fi Safety & Privacy: Tips for Anti-Violence Organizations.
Blocking Content or Websites
You may consider blocking potentially offensive content from web browsers on shared devices or networks. Most web browsers, and some Wi-Fi network settings, allow you to block certain content. This is usually found under “parental controls.” If necessary, you can use these features or other site blockers to restrict access to certain websites.
*Keep in mind that there may be legitimate reasons for survivors to access “adult” content. For example, victims may be harassed through revenge porn sites or online communities that might have sexual, offensive, or violent content, and access to those websites may help them stay up to date on the abusive person’s activities, threats, or harassment. Alternatively, survivors might want to look up information about sexual health and healing on websites that might be blocked because it includes adult or sexual content. While some shelters may not want to allow adult content because children are around, having a blanket policy that prohibits access to adult sites, or certain search terms, might be a barrier. Bear in mind that requiring survivors to ask you for permission to access some content, or monitoring web browsing, does not support their autonomy.
Policies & Procedures
Some organizations may want to ask survivors to agree to certain policies or conditions before accessing shared devices or Wi-Fi networks. Try to keep any such policies simple, clear, and relevant. Remember that some abusive people control access to devices and the Internet as part of their abuse, and you don’t want to replicate abusive behaviours. As much as possible, organizations should support survivor autonomy and empowerment. Help survivors to understand the reason behind any restrictions. For example, a shelter’s Internet bandwidth might not allow for residents to stream videos. Explain that the limitation is due to budget or technology, not because they aren’t allowed to watch movies.
Education & Resources
Organizations can offer (but should not require) Internet safety information. Providing survivors with education and resources on technology safety and security empowers them and enhances self-advocacy. In turn, less staff time is needed to monitor shared technology security issues. These resources could be available through bookmarks on a shared computer, printed out, or discussed during support group meetings, for example.
You can share our resources on Password Security and Online Privacy and Safety with survivors to help increase privacy and security.
To support your development of safe tech use policies, WSC has developed a Use of Technology Policy Template Guide for Women’s Shelters and Transition Houses (PDF, in English only).
Technology-Facilitated Gender-Based Violence (TFGBV) is part of a continuum of violence that can be both online and in-person. If you or someone you know is experiencing TFGBV, you are not alone. You can use sheltersafe.ca to find a shelter/transition house near you to discuss options and create a safety plan. You don’t need to stay in a shelter to access free, confidential services and support.
Adapted for Canada with permission from NNEDV’s Safety Net project, based on their resource Shared Computers & Internet Access: Best Practices for Privacy & Security