Individual Strategies for Managing Privacy Risk

Rosa Strategy-1.png

01

Personal information. Avoid providing personal information by email or phone if you do not know who is asking for the information or if you are contacted without prior knowledge. Do not share your passwords or give your date of birth.

02

Call them up. If you have a specific question or concern, it may be beneficial to take this up directly with the business. Look for a phone number on the website. You may find this under ‘contact’ at the top of the bottom of the site. Consider using a ‘chat function’ or email option if they do not have a phone number.

03

Passwords. Use highly secure passwords and frequently change your passwords. You can use a password book (e.g., a traditional notebook or encrypted excel file) to keep track of your passwords. Other options are keychain or password manager. Keep your password book secured, updated, and consider having a backup of your password book.

04

Incognito. Consider using the Incognito/private function in your internet browser when searching online.

05

Search engines. Most web users rely heavily on Google as their search engine, but you might be better off using private – or anonymous –search engines. Private Search engines do not collect or share your search history or clicks. Anonymous search engines can also block ad trackers on the websites you visit.

06

Further research. If you are interested in privacy, security risks and tracking cookies, there are several online resources, websites and YouTube videos that can help you better understand privacy, cookies, and security issues.

07

When scammed. Do not feel embarrassed if you are being scammed. It is very common. Be careful online and keep updating with news on scams from https://www.scamwatch.gov.au/ or https://www.snopes.com/). Subscribe to scam alerts such as Scamwatch Radar to help you recognise and avoid scams.

08

Be wary. Before clicking on suspicious links (email or text messages), hover your cursor over the link to view the destination URL. If it doesn’t match a website you normally use, don’t click. It is probably a phishing scam trying to gain access to your data. Alternatively, try to go to your account with that specific service (e.g., ATO) and find the information you need there.

09

Banking. Go onto your financial institutions’ website and explore their tutorials on online banking.

10

Antivirus software. Consider using antivirus software (e.g., Norton or Kaspersky). Consult your friends or specialist about an adequate antivirus for you.

11

Social media. Don’t overshare on social media. Providing too much information on Facebook, Twitter, and Instagram could make it easier for cybercriminals to obtain identifying information, allowing them to steal your identity or access your financial information.

Relational Strategies for Managing Privacy Risk

Rosa Strategy-2.png

01

Be wary. If you are suspicious of anything, stop and find someone to ask. If you receive a suspicious email from your bank, financial institution or accountant, call them and check if the email is valid. If you receive unusual emails/messages from your friends, phone them to check.

02

Banking and financial institutions. Contact your bank if you are suspicious that you are being scammed immediately. Banks can stop transactions in your account and prevents you from losing money

03

Seek assistance. Ask your partner, friends and/or family members to help make your accounts safe and secure. Some tasks happen only once (e.g., install an antivirus, install a password manager). Whereas other tasks are common and repetitive (e.g., signing in your email, using double authentication, updating your system). Ask family or friends to go slowly, explain it step by step and be patient with you. Take notes so you can practice your own.

04

Partner involvement. Your partner can be an ally on the journey to keeping your life private and secure. Try to engage in learning tasks together as one can support the other in their issues about privacy and security. Agree to consult each other before moving forward on a risky movement online.

05

Courses. Join ICT courses for beginners developed for older adults. Ask for classes that discuss scams, privacy, and security issues. Discuss your issues with tutors and learning buddies.

06

Cyber legacy. If you cannot operate your accounts anymore, you need to consider who is going to have access to your data and accounts. Check this online resource: How to prepare your digital legacy plan (esafety.gov.au)

07

Scamwatch. Consider creating a family club for Scamwatch, where you all share the scams you are being exposed to. It turns a threat into an opportunity to build a relationship with your family members.

08

Support groups. Privacy and security issues are standard features of using ICT. One can never fully master these issues. So, consider forming support groups with other tech-savvy seniors where you can discuss scams, security, and privacy issues. Helping others can also help you learn and sharpen your ICT skills.
 

Strategies to Managing Perceived Privacy Risk

Privacy risk is aligned both with the person’s ICT ability and the person’s confidence to overcome the perceived risk and try to engage with the digital device. There are individual strategies people can do themselves to manage this risk, as well as relational strategies which consider the role of social influence on a person’s ability to try new things and interact with ICT.

Rosa-2
Rosa-1

You may be interested in
Other potential risks that Rosa is facing:

will this digital device work the way I want it to – it includes forgetting instructions and managing passwords.
concerns about feeling incompetent, getting frustrated and being overwhelmed with digital technology.
worries about online transactions, not receiving the purchased goods and processing errors.
fear of buying too much online and the costs with upgrading software and devices.
concerns that digital devices encourage physical inactivity and becoming addicted to the devices as well as the strains on eyesight.