The password is mine and I manage it

Fiorenza Sarzanini (photo by Carlo Furgeri Gilbert).

AND like in the real world, but the consequences can be even worse. Why violence can be exercised via the web while always keeping the victim under control, circulating his images and videos, activating blackmail, making his identity known. This applies to everyone, it applies even more to women.

The investigations of police post demonstrate that the number of crimes is increasingbut above all that the attackers are increasingly determined, probably in the belief that they can hide behind a screen.

That’s why it is It is important to report and it is essential to take precautions which may seem trivial and instead become decisive for protecting oneself.

The dossier prepared by analysts led by Ivano Gabrielli and relating to the activities carried out up to last October 31st contains precious indications that must always be followed, even when the request to the contrary comes from the person who says he loves you (commissioneratedips.it).

Violence against women: documentaries and TV series to watch

To avoid transforming the access mechanism to mobile phones and computers into a deadly control weapon.
The first suggestion concerns social media: «Do not allow anyone to log in with your credentialsnever share your password, use a different one for each social network and change them at least every 3 months”.

The second points to cell phones: «Provide for its initialization independently. The activation profiles must be registered in your name, set up directly by you, and protected with “robust” passwords, freely chosen and kept confidential because there are software that allow you to control the data and have access to your online interactions. Set a passcode and keep it confidential, activate facial recognition or fingerprint. Reject or disable automatic tracking».

Finally, the computer: «After accessing your email, your online messaging, your social profiles from a PC or another device shared with others, log out and disconnect the device from your profiles. Do not store credentials automatically. Pay attention to which technology tools are connected to your social or messaging accounts: If you don’t know some of these, it’s possible that someone is reading your communications without permission.”

Is it time for women to claim the right to disconnect in the family (from parents, children, partners)? Write to us at [email protected]

All articles by Fiorenza Sarzanini

iO Donna © ALL RIGHTS RESERVED

ttn-13