Take Back The Tech! Be safe
The Take Back the Tech!Source: APC Annual Report 2006 ">i Be safe website section offers tips, ideas and strategies on how women and girls can increase their security while browsing and communicating online or via their mobile phones.
It addresses security issues regarding privacyepic.org/privacy/gender/default.html">i protection (emailStyle information: Do not use e-mail with a hyphen. i and secure online browsing. The section is periodically updated in order to offer meaningful responses to new and growing forms of violence against womenStyle Information: N/a Source: www.takebackthetech.net/whatstheissue ">i mediated through information and communication technologies.
1. Strategies for protecting your privacy online
If your computer is connected to the interneti, or is shared between a few people, always imagine that there is a road that can connect others into your computer. Sometimes we put in a lot of information about who we are and what we do. It's not hard to be aware of a few things to protect your personal data on your computer, and on the internet.
Read more www.takebackthetech.net/be-safe/privacy
2. Cyberstalking and how to prevent it
Cyberstalking includes (repeatedly) sending threats or false accusations via email or mobile phone, making threatening or false posts on websites, stealing a person’s identity or data or spying and monitoring a person’s computer and internet use. Sometimes the threats can escalate into physical spaces. As in other types of violence against women, cyberstalking is about power relations, intimidation and establishing control. If you are being stalked, know first and foremost that you did not “provoke” this harassment.
Read more www.takebackthetech.net/be-safe/2-cyberstalking-and-how-prevent-it
How many passwords do you have? How many times do you get asked for a password as you use different spaces on the internet? One of the number one problems – and concerns – cited by women's rights activistsWHRD IC, UN Special Rapporteur on the situation of human rights defenders">i in secure online communications workshops is that email and social networkingWikipedia.org; Take Back The Tech! ">i accounts “get hacked”. There are many ways that people can gain access to our private accounts that never entail actual hacking, but one of the most common is our own poor password management. Find out what the risks are, and how to build better passwords and practice.
Read more www.takebackthetech.net/be-safe/3-passwords
4. Secure online browsing
When you are browsing websites, information about your activity is also collected & stored, for example through temporary cache files. Domestic violence abusers are able to know if their partners have tried to search for information about support services and help by going through the computer cache files. Learn how to surf securely and erase your online tracks.
Read more www.takebackthetech.net/be-safe/browsing
5. Emails & webmails
Learn about some good practices to help you protect yourself as you use emails. For example, don't automatically open attachments, choose the option to view and send email in plain text, learn how to use PGP - an encryptioncryptography Style Information: n/a">i programme - to improve your privacy, and more!
Read more www.takebackthetech.net/be-safe/emails
6. Online chat
Chat securely. Learn how to disable archive, switch on private conversations where available, and handy tips like don't reveal too much personal information on your online profile.
Read more http://www.takebackthetech.net/be-safe/online-chat
7. Mobile phones
Mobile phones, especially now that even basic handsets incorporate camera and recording capabilities, are excellent tools for documenting violence and harrassers. At the same time, they can also be used to track and monitor someone's location or private communication. Learn how to better protect your privacy on mobile phones.
Read more http://www.takebackthetech.net/be-safe/mobile-phones
8. Tool kit - Take Back The Tech! portable apps
A portable application is a computer programme that you can store and carry around with you using devices like a USB memory stick or hard drive, mp3 player or mobile phone. Portable Apps allows you to have your software and personal data everywhere you go. DownloadStyle information: N/a
Read more www.takebackthetech.net/be-safe/online-safety
9. Mobile phone risks and good practice
Because mobile phones have become such a central part of our lives, it's important to be aware of some of the associated risks and vulnerabilities. As they get more advanced there are increasing points of vulnerability to be aware of regarding your personal safety and privacy. Since we tend to store a lot of information about your friends, family and contacts on your phone, protecting your privacy also means protecting theirs.
Read more http://www.takebackthetech.net/be-safe/mobile-phone-risks-and-good-practice