Coercion versus Support: Navigating Shared Device Access

  Abbey Ward
  4 min read
April 25, 2025
Coercion versus Support: Navigating Shared Device Access image
Stay informed
Sign up to our newsletter
Stay ahead with insights delivered directly to your inbox.

In our previous blog post, we delved into the complexities of shared credentials those vital digital keys that unlock our accounts. Today, our focus shifts to the tangible tools that grant us access: our devices. Sharing smartphones, tablets, and computers within the household is a common part of modern family life, and understanding how to navigate this sharing thoughtfully can foster stronger connections and ensure everyone feels comfortable.

Think of your home security system. You might have alarms, strong locks, and even security cameras. These measures are in place to protect your physical space and belongings. Similarly, we need to think about the security system for our digital lives, especially when it comes to shared devices within the family. 

Sharing devices can be incredibly convenient. A family tablet for watching films, a shared computer for homework, or even occasionally letting a loved one use your phone can foster connection and make life easier. However, the line between helpful support and coercion or even theft can become blurred if we're not mindful.

Understanding Support with Shared Access

Consider a scenario where a family member is struggling to understand a new banking app. You might offer to guide them through it on their tablet, showing each step and explaining the process. This is an act of support, built on trust and a desire to help. 

When sharing devices, genuine support is characterised by a clear understanding of why access is needed and the willing participation of the device owner, free from any pressure. It also involves a respectful approach, focusing solely on the task at hand without delving into other personal areas on the device. Ultimately, the goal is to build the other person's confidence and independence in using technology, fostered by an open and comfortable environment for questions and concerns.

Navigating Coercion with Shared Access

In contrast to supportive sharing, coercion arises when access to a device is obtained through means that undermine an individual's independence and sense of security, such as subtle pressure, emotional manipulation, or even overt demands. This may appear in various forms within a family setting. For example, one partner might insist on knowing the other’s phone passcode and regularly check their messages without consent, or a parent might install monitoring software on a child’s device without open communication or a clear understanding of its purpose, leading to a feeling of being constantly watched rather than protected. These situations can undermine the fundamental sense of security we should all feel within our own homes, both physically and digitally, fostering a feeling of unease.

Beyond Boundaries: The Risk of Digital Theft

In more serious cases, a request for access can be a deliberate attempt at theft. A manipulative family member might want to access your computer to steal personal data, financial information, or install software that allows them ongoing, unauthorised access - effectively bypassing all the security measures you've put in place to protect your digital home and its keys. 

A recent report from the BBC highlights the critical importance of understanding how trust and access can be exploited within close relationships. The article details the case of John Wilcox, an elderly man with dementia who was isolated from his family by his granddaughter, who then gained control of his finances and changed his will.

While the specifics of this case revolve around Lasting Power of Attorney and financial manipulation rather than direct device sharing, the core principle remains relevant. It vividly illustrates how someone in a position of trust can exploit another's vulnerability to gain control and cause significant harm, both emotionally and financially. The isolation imposed on John mirrors the digital isolation someone might experience if their device access is used to cut off communication or monitor their interactions without consent. Overall, the article underscores the need for comprehensive security measures and a clear understanding of how easily trust can be undermined when boundaries are blurred or absent.

Identifying Uncomfortable Patterns

It can be helpful to recognise when device sharing might be moving away from supportive assistance. Here are some indicators to consider:

  • Persistent Demands: Repeated or insistent requests for unrestricted access to your devices or accounts can signal something other than simple help.
  • Feelings of Pressure: If you feel obligated or uneasy about sharing access, it’s important to acknowledge those feelings.
  • Secretive Actions: Discovering monitoring software or hidden tracking apps without your knowledge or consent can be a serious breach of trust.
  • Lack of Respect for Boundaries: If your requests for privacy are ignored or dismissed, it’s a clear sign of disrespect for your digital space.

Empowering Your Digital Boundaries: Practical Strategies

Just as you would take steps to secure your physical home, you need to establish boundaries and practices for shared devices. Here are some helpful approaches:

  • Open Conversations About Device Boundaries: Talk openly as a family about device usage, privacy expectations, and the importance of respecting each other's digital space.
  • Regular Check-Ins: Periodically revisit these conversations to ensure everyone still feels comfortable and that expectations are being met.
  • Promote Personal Device Security Habits: Encourage everyone to use screen locks, strong passwords (where applicable on individual profiles), and to be mindful of privacy settings on the device itself.
  • Utilise Guest Modes and Profiles: Where available, make use of guest modes or individual user profiles on shared devices to help maintain a degree of personal space and prevent accidental access to others' data.
  • Seek External Guidance: If you encounter situations that feel difficult to navigate, reaching out to trusted friends, family, or support organisations can provide valuable perspective.

Conclusion

Our devices are integral to modern life and sharing them within our homes can be a positive experience when grounded in mutual respect and clear understanding. By recognising the difference between supportive assistance and potentially harmful coercion, we can foster a safer and more secure digital environment for everyone in the family.

Looking ahead, our next post will explore the security of physical records, revealing the often-overlooked benefits of keeping important information together in one place.


What is an example of a shared device?

A shared device is a digital tool used by multiple people. Within a household, this might be a family tablet for entertainment or a shared desktop for general use.

What are the disadvantages of shared devices?

Sharing devices can lead to a lack of individual privacy and increases the risk of accidental data loss or unwanted changes. It can also create opportunities for misuse, ranging from subtle coercion to outright theft of personal information.