In our previous blog post, we delved into the complexities of shared credentials those vital digital keys that unlock our accounts. Today, our focus shifts to the tangible tools that grant us access: our devices. Sharing smartphones, tablets, and computers within the household is a common part of modern family life, and understanding how to navigate this sharing thoughtfully can foster stronger connections and ensure everyone feels comfortable.
Think of your home security system. You might have alarms, strong locks, and even security cameras. These measures are in place to protect your physical space and belongings. Similarly, we need to think about the security system for our digital lives, especially when it comes to shared devices within the family.
Sharing devices can be incredibly convenient. A family tablet for watching films, a shared computer for homework, or even occasionally letting a loved one use your phone can foster connection and make life easier. However, the line between helpful support and coercion or even theft can become blurred if we're not mindful.
Consider a scenario where a family member is struggling to understand a new banking app. You might offer to guide them through it on their tablet, showing each step and explaining the process. This is an act of support, built on trust and a desire to help.
When sharing devices, genuine support is characterised by a clear understanding of why access is needed and the willing participation of the device owner, free from any pressure. It also involves a respectful approach, focusing solely on the task at hand without delving into other personal areas on the device. Ultimately, the goal is to build the other person's confidence and independence in using technology, fostered by an open and comfortable environment for questions and concerns.
In contrast to supportive sharing, coercion arises when access to a device is obtained through means that undermine an individual's independence and sense of security, such as subtle pressure, emotional manipulation, or even overt demands. This may appear in various forms within a family setting. For example, one partner might insist on knowing the other’s phone passcode and regularly check their messages without consent, or a parent might install monitoring software on a child’s device without open communication or a clear understanding of its purpose, leading to a feeling of being constantly watched rather than protected. These situations can undermine the fundamental sense of security we should all feel within our own homes, both physically and digitally, fostering a feeling of unease.
In more serious cases, a request for access can be a deliberate attempt at theft. A manipulative family member might want to access your computer to steal personal data, financial information, or install software that allows them ongoing, unauthorised access - effectively bypassing all the security measures you've put in place to protect your digital home and its keys.
A recent report from the BBC highlights the critical importance of understanding how trust and access can be exploited within close relationships. The article details the case of John Wilcox, an elderly man with dementia who was isolated from his family by his granddaughter, who then gained control of his finances and changed his will.
While the specifics of this case revolve around Lasting Power of Attorney and financial manipulation rather than direct device sharing, the core principle remains relevant. It vividly illustrates how someone in a position of trust can exploit another's vulnerability to gain control and cause significant harm, both emotionally and financially. The isolation imposed on John mirrors the digital isolation someone might experience if their device access is used to cut off communication or monitor their interactions without consent. Overall, the article underscores the need for comprehensive security measures and a clear understanding of how easily trust can be undermined when boundaries are blurred or absent.
It can be helpful to recognise when device sharing might be moving away from supportive assistance. Here are some indicators to consider:
Just as you would take steps to secure your physical home, you need to establish boundaries and practices for shared devices. Here are some helpful approaches:
Our devices are integral to modern life and sharing them within our homes can be a positive experience when grounded in mutual respect and clear understanding. By recognising the difference between supportive assistance and potentially harmful coercion, we can foster a safer and more secure digital environment for everyone in the family.
Looking ahead, our next post will explore the security of physical records, revealing the often-overlooked benefits of keeping important information together in one place.
A shared device is a digital tool used by multiple people. Within a household, this might be a family tablet for entertainment or a shared desktop for general use.
Sharing devices can lead to a lack of individual privacy and increases the risk of accidental data loss or unwanted changes. It can also create opportunities for misuse, ranging from subtle coercion to outright theft of personal information.