Safety, Privacy, Security, & Access: Four Pillars of Consumer and Survivor Wellbeing

Stalking Awareness Month Graphic

Stalking Awareness Month Graphic

As we commemorate National Stalking Awareness Month and Data Privacy Day today, we recognize four pillars to ensuring both consumer and survivor well-being: Safety, Privacy, Security, and Access. These pillars are the foundation that guides our work every day in helping to safeguard technology safety for all. While all of these go hand-in-hand, we’ll look at each one below. 

 Safety: In today’s digital age, survivors have an exhausting list of considerations to protect their information and their safety. Whether protecting location, online activity, home, and work addresses, or children’s whereabouts, so much of this is critical for a survivor’s safety. Survivors have a right to technology and shouldn’t have to choose between staying safe and using a device or platform. Many people rely on the internet to shop, look for jobs, search for resources, maybe even conduct business as part of their livelihood. Strong privacy and security policies and settings, along with access to technology, help keep all of us safe.   

 Privacy: Today is Data Privacy Day, but survivors and consumers alike always have a need for privacy. Whether a person wants to make sure that their accounts are private from the prying eyes of family members or future employers, or survivors of stalking who need to know the platforms they use do not share information with others, privacy benefits everyone. Strong privacy policies, settings, and protections mean that survivors and consumers can have one more way to take back control over their digital lives.

Security: Having a secure way to communicate with trusted individuals, seek online resources or help, or have a place to store legal, health, or other personal documents is incredibly important. As consumers, we share our information when using online spaces, services, and apps and hope that it remains secure. Strong security measures help ensure that personal information does not get into the wrong hands. 

 Access: Building a platform that is intentional in centering the needs of survivors and consumers means considering the accessibility needs of those who live with disabilities, speak another language, or have culturally-specific privacy and safety needs. Built from these perspectives, technology can be used by as many survivors and consumers as possible. Accessibility barriers that keep survivors from getting assistance can be a significant safety risk. Making sure that we have accessible products, platforms, and technologies should be a core tenet of our work.

Building and using technology with all this in mind can be challenging. For survivors, it can be exhausting and terrifying. Fortunately, more and more online platforms and services are building in End-to-End (E2E) Encryption as the default functionality to protect the privacy and security of users and their data. We’re always happy to see these announcements and even more thrilled when the platform has clearly also considered safety and accessibility!

E2E Encryption can be a little hard to understand, but it’s a really important feature to ensure privacy – and if you’re a victim service provider, to protect confidentiality. Safety Net worked with the Internet Society on a new resource to help survivors and service providers understand E2E Encryption more. Whether you’re a technology start-up, a victim service provider, or a survivor – understanding and using E2E encryption can be an important step to prioritizing safety, privacy, security, and ensuring access.

These four pillars guide us in this work and allow survivors and consumers the ability to harness the power to remain online in a safe and meaningful way.

Social Media and Stalking: Q&A with the Safety Net Team

The Safety Net team recently wrote an article on social media and stalking for the New York State Office for the Prevention of Domestic Violence. Check out the full Q&A here!

Here is a snippet of some of the questions and answers:

Q: What is social media?
A: Social media is user generated content that promotes engagement, sharing, and collaboration. It includes a wide range of websites and applications that can be accessible from computers, smart phones, and tablets. Facebook, Twitter, and Instagram are three of the most popular social media platforms, although there are many more. 

Q: How do abusers misuse social media?
A: Abusers misuse social media as a tool to harass, manipulate, and threaten. Abusers often send harassing messages or post offensive images – even explicit images of the victim that may or may not have been taken with consent (sometimes referred to as “revenge porn”). 

Q: How do survivors safely use social media? 
A: Social media usually involves sharing personal information. Users should look at privacy options and take note of what will always be public and what they have more control over. Some sites have rules against using fake names while others allow it. Many sites encourage users to share their location as well. Survivors should only share information that they are comfortable with. 

Q: What can a survivor do if an abuser is misusing online spaces? 
A: It depends on what the survivor wants to happen. One important step is documenting all contact and harassment. The survivor can take screenshots or photographs of the activity. A few platforms, like SnapChat, will tell the sender if the recipient takes a screenshot, so it might be safer to take a picture of the screen since notification may escalate abusive behavior. The survivor can also save all messages. It may be tempting to hit delete to make them disappear, but original messages will be important for evidence. 

Read the full article here.