Navigating mobile phones
Mobile phones are a key part of our daily lives, and they also hold sensitive information, from personal photos, messages, banking details and more.
Learning how to secure your mobile phone helps protect you from scams, harassment, and other dangers. Here are some things you or an autistic person you know should keep in mind when using a mobile phone.
Everyday mobile phone security
Lock and secure your phone
Make sure your phone can be locked. Use strong passphrases, PINs, or biometric options such as fingerprint scanners or facial recognition technologies. Avoid PINs or patterns that are easy to guess, such as your birthday or simple sequences like ‘1234’. Set their phone to auto-lock after a short period of inactivity, preferably less than five minutes.
Encrypt your data
Encryption is a powerful tool in protecting the data stored on a mobile phone. It ensures that even if someone accesses your phone, the information remains unreadable without the correct encryption key.
Modern smartphones, including those running the latest versions of iOS and Android, offer encryption options typically enabled by default. Still, it’s a good idea to check that this feature is actually enabled on your device.
Enable remote tracking and erasing features
Your mobile phone should have built-in features like Apple's Find My iPhone or Google's Find My Device enabled. These tools help locate your phone if it gets lost and allow you to remotely erase data if it’s unlikely you’ll get your phone back, preventing data and identity theft.
Regularly back up your phone
Regular backups are essential, as you can restore your phone's data remotely if it's lost, stolen, or damaged. Regular backups should be stored in multiple locations (e.g., cloud services and external drives).
Keep your software up-to-date
Software updates often contain critical security patches that protect their phone from new cyber threats. Turn on automatic updates to protect your phone’s operating system and apps. Remember that outdated systems can put your phone and personal information at risk of being compromised.
Download secure and reputable apps
Only install apps from trusted sources like the Google Play Store or the App Store. Be wary of what information apps ask to have access to, and delete apps that constantly ask for your personal information, particularly if it’s not needed by the app. Regularly review and adjust app permissions from the phone's settings.
Be cautious with public Wi-Fi
Public Wi-Fi networks, although convenient, are often not secure. Avoid using public Wi-Fi for banking or personal messaging. Consider installing a Virtual Private Network (VPN) to encrypt the connection on your device. You could also use cellular data; however, this can be expensive.
Watch out for phishing and scams
Stay alert to common scams and phishing attempts (suspicious emails, SMS, or phone calls attempting to steal personal information) so you can stay vigilant. If you are a carer of an autistic adult, discuss what a scam or phishing attempt looks like with them, and encourage them to speak to you before making purchases or sending money or personal information to other people.
Protect your phone in public spaces
Always keep their phone on you or in a safe place in public (e.g., in a bag rather than your pocket). Be mindful of using their phone in crowded areas or leaving it on a desk or table, where it could easily be snatched. Avoid plugging your phone into public charging stations or using USB devices from people you don’t know, as they could be used to deliver malware.
Safely dispose of your device
Before selling or disposing of your phone, ensure all personal data is erased by performing a factory reset. This prevents the next user from accessing your private information.
Risks of using mobile phones
Although mobile phones have lots of benefits, they can also pose risks to our safety and wellbeing. It’s important mobile phone users understand the risks involved and what to do if they feel unsafe or uncomfortable.
Unwanted messages
You might receive messages from people you don’t know when using a mobile phone. These messages can sometimes be harmless, but it’s important to remember that not everyone online has the best intentions.
Receiving unsolicited images and videos that are sexually explicit is classed as sexual harassment. You should block the sender, report these messages if they have been sent on social media and speak to someone you trust to help prevent further contact.
Sexting
Sexting, a blend of the words "sex" and "texting," involves sharing sexual, explicit, or intimate photos or videos via mobile phones or online platforms. Sexting between consenting adults is legal, and it is a crime to send, receive, or ask for sexually explicit content from another person without their knowledge or consent.
In Australia, sexting involving minors (people under the age of 18) is illegal. Sending, receiving or asking for sexually explicit content from a minor or someone who appears to be a minor has serious legal consequences, even if the minor has consented or has taken the sexually explicit photo or video of themselves.
Individuals convicted of engaging in sexting with minors or as a minor can be fined and potentially registered as a sex offender. This has long-lasting impacts on where the person can live, work, and travel.
Image-based abuse and revenge porn
Image-based abuse, or revenge porn, involves sharing intimate images or videos of someone without their consent, often to embarrass, threaten, or blackmail them. This form of abuse can have devastating effects on the victim's life, leading to emotional distress, reputational damage, and in some cases, physical harm.
It is critical for victims not to comply with any demands if they are being blackmailed and to stop communicating with the perpetrator. Instead, they should report the incident to the relevant social media platforms and local authorities and seek guidance on further protective measures.
Support for online abuse
Victims of sexual abuse and their loved ones have a range of legal and support options. If you or an autistic person you know receives an unsolicited message that is sexually explicit, the following actions should be taken:
- Do not engage: Avoid responding to unsolicited messages. Engagement can encourage further contact.
- Report and block: Use social media platforms' reporting features to block the sender and prevent further communication.
- Seek support: If the situation escalates or becomes threatening, contact the police.
Australia also has laws around revenge porn, helping victims take legal action to have the content removed and to hold perpetrators accountable.
Various organisations offer support and advice to victims of image-based abuse or online sexual abuse. Engaging with these resources can provide emotional support and practical steps to manage the situation.
Preventing online abuse
The best way to address the risks of using a mobile phone is to prevent them from occurring in the first place. Although receiving unwanted messages isn’t something that can always be controlled, how you respond to these messages and engage with other people online can be. When it comes to children sharing explicit content with adults online, it’s important to remember the risks and impacts.
Information for parents, carers and educators
If you are a carer of an autistic adult, having an open discussion about what is and isn’t appropriate to do on a mobile phone and the potential consequences of certain behaviours is important. Here are some things you should emphasise in this discussion:
Loss of control over shared content
Once intimate or explicit content is shared, the original sender loses control over where it is shared and who can see it. This can lead to widespread sharing without their consent, impacting a person's personal reputation and privacy. Everyone must understand that in the digital world, once something is shared, it is nearly impossible to retract or completely delete it from the internet.
Emotional and psychological impact
The sharing of intimate content can lead to emotional distress, particularly if the content is shared with other people without the original sender’s consent. Victims often experience significant stress, anxiety, and, in some cases, public embarrassment or humiliation.
Legal and criminal consequences
Any form of sexting involving minors can lead to criminal charges. The legal system may impose penalties that range from fines to more severe consequences like their inclusion on the sex offender registry, which can have lifelong impacts on a person’s professional and personal life.
Mobile phone users should be cautious about sharing personal information and intimate content online to prevent unwanted or unsafe interactions. It’s also important to have strong privacy settings on social media and understand the terms of service of the platforms they use.
Some community programs or health professionals offer education and support around cyber safety for autistic adults. If an autistic adult you know is already receiving professional support, this might be worth discussing with their provider/s. Otherwise, researching to find online programs or programs in your area can help you find support.
Parental controls for parents/carers of autistic adults
Parents and carers may wish to use or continue using parental controls to help keep an autistic adult in their care safe online:
Built-in parental controls on mobile devices
- Apple products: From iOS 12, Apple has a range of parental controls, allowing parents and carers to help their family stay safe online. These controls can restrict app downloads and online purchases and filter out inappropriate content. They can also prevent users from sharing certain information (e.g., photos, locations) or interacting with certain people, helping prevent scams, data breaches or online abuse.
- Android products: Unlike Apple, Android doesn’t currently offer general built-in parental controls across its devices. However, Google does have its Family Link app, which allows parents and carers to perform the same functions as Apple’s built-in parental controls, as well as setting limits on screen time if this helps to prevent excessive phone use.
Third-party software
Many parents and carers use commercial third-party parental controls for additional control and convenience. These apps offer more detailed customisation and monitoring features than the built-in system mentioned above. Third-party controls can be applied to individual devices or all devices connected to a particular Wi-Fi network (e.g., home Wi-Fi), allowing for more specific monitoring. Often, these controls operate on a subscription basis, with prices varying by the number of devices they cover, which can be more cost-effective for families.
For families new to parental controls, searching terms like ‘internet filters’ or ‘family filters’ can provide a list of reputable options. Some services offer free trials, which can be a good starting point to determine whether a service is right for you.
Mobile service providers
Many mobile service providers offer parental controls as part of their mobile phone plans. These tools can be handy for managing how someone uses mobile data and interacts with mobile services. These services are commonly used to block access to inappropriate content, set times when the internet can and cannot be used and monitor online behaviour, such as the types of apps accessed on a mobile device.