Operating systems (Windows, OSX, Android, and IOS) offer the opportunity for users to lock their device when it is inactive. This is a ‘soft-lock’ that prevents access when the device is powered on or inactive for a certain time period. By setting up your device to detect when you are inactive and automatically lock the device, you can prevent others from working on your device. To unlock access to the device, the person must enter an accepted username and authenticator(s).
Your username on the device may be displayed or known. You should control the security of your authenticator(s). If you use a password, make sure it is a strong password that nobody else knows or can guess. Some devices enable you to use your fingerprint as the authenticator. This is more secure than a password. Some devices use a pattern recognition system as opposed to a password. Choose an approach that you believe offers the best security.
If the applications and internet services you use offer their own security, this is a good option to prevent specific access should someone be able to access the device, or if the device was for some reason not locked.
Application access on shared devices
If a device is used by multiple users, the operating system may support user accounts. If each user has their own account, they can customise their workspace and ensure that their applications and internet services are separate from other user profiles. This is a good idea and offers more protection of your data. A system administrator can however access all user profiles, accounts and data. Ensure that the system administrator is a trusted party.
Internet browser specific risks
You use an internet browser to access application services on the internet. These services may give you the ability to access email, search for information, interact on social media etc.
When using an internet browser, your activity is recorded. There are a few ways in which this takes place:
While all of the above motivations for keeping track of you are possibly well intentioned, there are a number of risks that arise.
When accessing application services over the internet, you receive information from, and you send information to the service application. This information can be transferred ‘in the clear’ or ‘encrypted’ depending on the service providers site security.
It is possible for your traffic to be monitored as it flows to and from the service providers site. If information is ‘in the clear’, anyone that can see the traffic flow can see exactly what is being transferred. This could include sensitive information.
When accessing high risk sites, where information is private and confidential, you should always make sure the site is transferring information securely. This can be done by checking the site’s address or URL (universal resource locator) that shows in your browser address bar. The site must indicate ‘https://…” as part of the address, or it must show a padlock symbol indicating data transfers are encrypted.
![]()
When accessing general internet sites, where you are simply consuming data in the public domain, security is not a major issue. The address of the site may indicate ‘http://…’ without the secure confirmation:
![]()
The browser may, as in the example above, give a warning indication that the site is not secure, and provide some guidance:

You have the ability to change your browser settings to mitigate risks:
Browser Settings to Mitigate Risks