<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.digitalrights.community/index.php?action=history&amp;feed=atom&amp;title=General_tips_for_home_security</id>
	<title>General tips for home security - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.digitalrights.community/index.php?action=history&amp;feed=atom&amp;title=General_tips_for_home_security"/>
	<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=General_tips_for_home_security&amp;action=history"/>
	<updated>2026-04-30T23:12:52Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.42.3</generator>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=General_tips_for_home_security&amp;diff=50318&amp;oldid=prev</id>
		<title>Kristin1: /* Check list: Home Security */</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=General_tips_for_home_security&amp;diff=50318&amp;oldid=prev"/>
		<updated>2024-05-15T13:37:30Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Check list: Home Security&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 13:37, 15 May 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Check list: Home Security ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Check list: Home Security ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;(Source: Appendix 6 of the [https://www.frontlinedefenders.org/en/resource-publication/workbook-security-practical-steps-human-rights-defenders-risk Workbook on Security by Front Line Defenders])&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&#039;&#039;&lt;/ins&gt;(Source: Appendix 6 of the [https://www.frontlinedefenders.org/en/resource-publication/workbook-security-practical-steps-human-rights-defenders-risk Workbook on Security by Front Line Defenders])&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&#039;&#039;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;This check list is not intended to be a blueprint for security. Your own context is the key determining factor. Consider the risks and threats you face, and any vulnerabilities you have in order to supplement and personalize this list.  &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;This check list is not intended to be a blueprint for security. Your own context is the key determining factor. Consider the risks and threats you face, and any vulnerabilities you have in order to supplement and personalize this list.  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
	<entry>
		<id>https://wiki.digitalrights.community/index.php?title=General_tips_for_home_security&amp;diff=50317&amp;oldid=prev</id>
		<title>Kristin1: Created page with &quot;== Check list: Home Security == (Source: Appendix 6 of the [https://www.frontlinedefenders.org/en/resource-publication/workbook-security-practical-steps-human-rights-defenders-risk Workbook on Security by Front Line Defenders])  This check list is not intended to be a blueprint for security. Your own context is the key determining factor. Consider the risks and threats you face, and any vulnerabilities you have in order to supplement and personalize this list.   # Use th...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.digitalrights.community/index.php?title=General_tips_for_home_security&amp;diff=50317&amp;oldid=prev"/>
		<updated>2024-05-15T13:37:14Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;== Check list: Home Security == (Source: Appendix 6 of the [https://www.frontlinedefenders.org/en/resource-publication/workbook-security-practical-steps-human-rights-defenders-risk Workbook on Security by Front Line Defenders])  This check list is not intended to be a blueprint for security. Your own context is the key determining factor. Consider the risks and threats you face, and any vulnerabilities you have in order to supplement and personalize this list.   # Use th...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Check list: Home Security ==&lt;br /&gt;
(Source: Appendix 6 of the [https://www.frontlinedefenders.org/en/resource-publication/workbook-security-practical-steps-human-rights-defenders-risk Workbook on Security by Front Line Defenders])&lt;br /&gt;
&lt;br /&gt;
This check list is not intended to be a blueprint for security. Your own context is the key determining factor. Consider the risks and threats you face, and any vulnerabilities you have in order to supplement and personalize this list. &lt;br /&gt;
&lt;br /&gt;
# Use the best protection measures you can afford and those which are normal in your community – if you have unusual security measures you may make others more suspicious of you. Consider: locks, bars, gates, fences, spyhole, alarms, CCTV, good lighting around your house etc &lt;br /&gt;
# Keep emergency numbers by the phone – police, ambulance, fire services, and also the numbers of colleagues / allies to be called in an emergency &lt;br /&gt;
# Have fire alarms, fire extinguishers and first aid kit available • Have separate entrance and emergency exit if possible &lt;br /&gt;
# Consider the safety of our car parking area - could anyone plant a surveillance or explosive device? If yes, you need to have a checking routine &lt;br /&gt;
# Tell family members and any staff not to accept unexpected packages in case of explosives &lt;br /&gt;
# Invest time and effort in developing good relations with your neighbours. Trusted neighbours could alert you to anything suspicious in the neighbourhood (cars, people asking questions about you etc) and give you an escape route through their property &lt;br /&gt;
# Discuss with your family as far as possible what the risks are: have plans in place for what to do in case certain risks materialise &lt;br /&gt;
# Spouse: some HRDs tell their spouse everything about the risks they face (and what the spouse should do in different security situations); some tell them nothing, believing that ignorance of the risks will protect the spouse. Consider what is best for you – secrecy can damage relationships &lt;br /&gt;
# Children: consider what you can tell them and how you can prepare them in a way which will keep them safer but not scare them - include telling them not to talk to strangers - including those asking questions or go with any strangers &lt;br /&gt;
# Consider having a code for a sudden danger such as “go and play with your [name of toy]” means ‘run to your auntie’s house.’ &lt;br /&gt;
# Teachers: develop a good relationship with your childrens’ teachers and tell them that only authorised people can pick up your children &lt;br /&gt;
# Staff (domestic worker, driver, guard etc): only hire trusted people and train them to – report anything suspicious – unusual vehicles or people in the area – not to let any person into your home without your permission – to check (by phoning the office) of any repair workers who say they need access to the premises, eg phone repairs, electricity, water. Do not let such people out of their sight whilst on the premises &lt;br /&gt;
# Consider having a simple Emergency ‘Traffic Light’ system to code the situation: – Green = normal – Amber = heightened risk where special precautions are taken, eg children are taken to and from school, a guard is hired – Red = high risk where appropriate action is taken, eg family to relocate to a pre-arranged place &lt;br /&gt;
# Do not leave sensitive documentation at home &lt;br /&gt;
# Avoid taking work home if the content is sensitive &lt;br /&gt;
# Ensure you obey laws and regulations, eg personal taxation, rules of the road etc &lt;br /&gt;
# If you are invited out, do not accept drinks or food from unknown people (in case they are drugged)&lt;/div&gt;</summary>
		<author><name>Kristin1</name></author>
	</entry>
</feed>