Gender-Based Violence IT Help
- Information Security Policy
- 10 Steps to Cyber Success
- Training & Policies
- Reporting an Incident
- Protect Yourself from COVID 19 Scams
- Phishing
- Social Engineering
- Strong Passwords
- Ransomware
- Social Networking
- CyberSafe Zooming
- Updates and Anti-virus
- Mobile Devices
- Protect Your Data
- Storing Data Securely
- Public Wi-Fi Hotspots
- Physical Security
- Cyber Security Programme
- Password Managers
- Cyber Security Inductions
- Gender-Based Violence IT Help
- Password security
- Use a device you trust
- Secure your device
- Good email practice
- Be aware of how much info you share
- Check for trackers and keyloggers
- Wipe devices before disposal
- Find a safe place to study
- How to take a screenshot
- How to block a caller
- How to take down an image or post
- How to report an incident
Gender-Based Violence refers to harmful acts which target someone because of their gender. It can happen to anyone of any gender, but it disproportionately affects women.
Information technology has allowed Gender-Based Violence to take new forms, such as cyberstalking, online harassment, and sharing intimate images online without consent.
Everyone has an equal right to safety as they work or study.
To combat Gender-Based Violence through IT, we have put together some information which might be helpful.
Taking preventative measures can make it more difficult for abusers to access your private information or track your location.
We understand it is not always possible for people who are currently experiencing Gender-Based Violence to take such measures, or have full control over the choices made about their IT equipment and accounts. However, where it is safe to do so, even following some of this guidance can close off avenues for abuse.
Be aware of how much info you share
If you want to contact the police, please contact them BEFORE deleting anything.
Even if you do not want to contact the police, at this time or at all, you should still gather evidence of the abuse first, before taking any other steps. It is understandable that you might want to delete or take down anything hurtful immediately, but even taking a few moments to take a screenshot can help support any report of abuse to the University, or an external website, or other body.
You may want to get support after experiencing Gender-Based Violence. Even if you are not sure what kind of support you need, or if you need any, it can help to talk it over.
For more information about Gender-Based Violence, see Equally Safe in Higher Education
For more information about cybersecurity, see Cybersecurity
If you have any questions or concerns, email help@strath.ac.uk
- Information Security Policy
- 10 Steps to Cyber Success
- Training & Policies
- Reporting an Incident
- Protect Yourself from COVID 19 Scams
- Phishing
- Social Engineering
- Strong Passwords
- Ransomware
- Social Networking
- CyberSafe Zooming
- Updates and Anti-virus
- Mobile Devices
- Protect Your Data
- Storing Data Securely
- Public Wi-Fi Hotspots
- Physical Security
- Cyber Security Programme
- Password Managers
- Cyber Security Inductions
- Gender-Based Violence IT Help
- Password security
- Use a device you trust
- Secure your device
- Good email practice
- Be aware of how much info you share
- Check for trackers and keyloggers
- Wipe devices before disposal
- Find a safe place to study
- How to take a screenshot
- How to block a caller
- How to take down an image or post
- How to report an incident