6 Cs of Cyber-safety

Image of a laptop computer where the screen is covered with a safety vest. Words on the side surround a lock and green check. Words include "scams" "passwords" online safety" "misinformation" "dependency" "cyber-bullying" and "social engineering"

Supporting People with ID and Autism in Managing Online Risk

There is no such thing as a one size fits all approach when supporting people to manage online risk. Many factors should be taken into consideration when assessing a person’s digital readiness, including any behavioral characteristics that might play a role in increasing potentially risky behavior online.

We must also remember, like it or not, that people with ID have the right to take risks, just like everyone. By enabling individual self–determination that might involve making risky decisions, our role then becomes one of supporting how these decisions can best be made.

Whether you’re just thinking about helping a person get online, you’re just getting started, or you support someone who is already using social media, online gaming, shopping, or other online activities, here are some tips to help you on your journey.

  1. Calm the Storm
    There is a ton of inappropriate and malicious content available on the internet, not to mention online predators. Once you realize and begin to consider all the risks to a person with intellectual disabilities or Autism, it can feel very overwhelming. This is the first of four stages: awareness, which is usually intermingled with the second stage: panic. It’s ok to feel everything you’re feeling about it. But try not to let those feelings paralyze you and push forward to the third stage: acceptance. Accept this new, challenging reality and march with the purpose you’re entrusted with to the fourth and final stage: action. Take action to protect the person you support. Make a plan but also stay flexible and patient as you travel through uncharted territory.
  2. Create a Safe and Secure Digital Space
    Work with the person to make a plan that sets clear expectations and guidelines. For example, you may want to set some agreed upon guidelines for using the internet: length of time online, what can be shared, etc. – any guidelines that are important in your situation. Consider writing them down and posting them somewhere as a reminder.

    Secure your home Wi-Fi with appropriate encryption and strong passwords. If you don’t know how to do that, you can google your Wi-Fi router’s make and model for instructions or ask a trusted techie friend to help you.

    Have good antivirus software and keep it updated.
  3. Communicate Openly and Honestly
    Be honest and talk openly about your concerns and about the potential risks. But be mindful of the way you present information about the potential risks of being online. The use of scare tactics may frighten people into digital self-exclusion.

    Take an interest in what they like to do online so you can talk about it often. Open communication is a great way to prevent something bad from occurring or at least catch it right away. Since communication is two-way, we should also listen to their concerns, ideas, and goals so we can work together to revise the plan as needed.

    When we talk about safety, be sure to touch on:
    • what information is unsafe to share online, including their name, where they work or go to school, their phone number, address, email address, financial or credit card information, or other identifying information. Even a photo can have identifying information in the background. It’s a good idea to make a “DO NOT SHARE” list and keep it somewhere visible.
    • Talk about how people aren’t always who they say they are online. Talking to strangers online carries the same risk as talking to strangers in real life so it’s best to only connect with people online that they know in real life. But, if the person you support is into social media or online gaming, it’s very likely they will encounter people they don’t know online, so understanding online risk is critical.
    • Talk about cyberbullying – what it is and what to do if they encounter it.
    • Talk about scams – how to recognize and avoid them
    • Help the person you support to set up privacy settings for the apps and services they use. Privacy settings allow a person to designate who can see which information in their profile. Privacy settings are usually set as public by default, which means everyone can see everything.
    • It’s also very important to talk about internet/gaming/social media dependency or addiction. People with Autism appear to be at higher risk for addiction to, and compulsive use of, social media. They may find sanctuary in a world that appears to be safe and offers them the opportunity to communicate with others comfortably, free from the usual social pressures of the ‘real world’.
  4. Collect Information about Digital Risks
    It’s critical for you to take the time to learn more about the different threats that can be faced online; misinformation, scams, social engineering, cyberbullying, and addiction, to name a few. The nonprofit organization, Connect Safely offers safety tips on numerous topics such as social media, gaming, and privacy, as well as quick guides to help you learn the basics about a lot of different apps and platforms. They are written for parents but can be adapted as needed.
  5. Connect with Organizations that Can Help
    There isn’t a lot of material available online related to internet use among people with intellectual disabilities or autism. But there are plenty of organizations for parents that provide a treasure trove of ideas and resources that can be adapted for your situation.
  6. Congratulations!
    If people with ID are to be full members of society, then they also need access to digital technology. Congratulate them, and yourself, for taking these steps toward securing their emotional and social well-being.

Taking the steps above can help you support someone to manage online risk. But one of the most powerful and potent strategies for protecting people from the dangers of cyberspace has nothing to do with computers at all. Most people who are victims of cyberbullying said that they didn’t think anyone would listen to their concerns and that no one was on their side. So, reach out and be on their side. Open communication is the best tool you have to prevent someone you support from being taken advantage of online.

Click here for a handout to help you remember the 6 Cs of cybersafety!

Leslie Dollman

Leslie is the MIS Administrator at Milestone HCQU West.

Verified by MonsterInsights