Online safety for visually impaired users and topics related to digital literacy are important concepts to discuss every day, and I make a point to discuss them on Safer Internet Day each February. Safer Internet Day is an annual event dedicated to raising awareness around online safety issues and taking action to make the internet and online spaces a safer and more positive experience for everyone, especially for children and young people.
Given how many blind people and people with low vision use the internet for social interaction, remote work, and to access information from around the world, discussing online safety for visually impaired users is critical not just because of how vision loss can influence how people access the internet, but because so many resources for digital literacy and staying safe online are not accessible. Here is a list of tips and strategies for digital literacy and online safety for visually impaired users, shared in honor of Safer Internet Day and curated by a writer/content creator with low vision.
Understand what identifiable information is and where it is shared
Identifiable information, also referred to as personal information or personally identifiable information, can be used to distinguish or trace an individual’s identity, or any other information that can be linked to an individual. Some examples of identifiable information that are commonly shared online include (but are not limited to):
- Name
- Age
- Address or location
- Birthday or place of birth
- Social security numbers or ID numbers
- Employment history (e.g. LinkedIn)
- Phone number
- Email address
- Medical history, including diagnoses
- Names of family members
- School names
- Answers to common security questions, which can show up in social media posts (names of pets, schools, former addresses, etc.)
People with visual impairments can sometimes be identified with as few as two pieces of personally identifiable information, such as a name and diagnosis. While there are situations where sharing certain types of identifiable information is relevant, it is important to ask the following questions before sharing any information online:
- Who can access this information?
- Is this information in a public space, like a blog comment, forum post that can be found on a search engine, or public website/social media profile?
- Why is this information necessary?
- What steps are being taken to keep my information safe, or from being shared by others?
- How will this information be used?
Sometimes, I receive phishing emails or suspicious emails that contain personally identifiable information. In many cases, these messages contain an email address or phone number that is not listed on a company website or directory. Avoid calling a phone number that is listed in a suspected scam message or responding to an email message, and instead search for a phone number or email address listed on the official company website— this strategy saved me from a phishing attempt that claimed to be from a credit reporting agency. Some companies like banks have dedicated lines for reporting phishing and scam attempts.
Caller ID can also be spoofed, so if I get a call from an organization or agency and I have no idea if it is legitimate, I hang up and find a verified phone number online and call it back. This happened with my bank once, and I called the verified phone number to make sure that the person I was talking to was actually an employee. Likewise, a hyperlinked phone number in an email or text message can sometimes mask a different phone number.
Related links
- How To Recognize Phishing Attempts With Low Vision
- How To Create A DonorsChoose Project For Visual Impairment
Use an email alias to sign up for services or newsletters
To avoid sharing my personal email address with others, I use an email alias or email forwarding address to sign up for services or newsletters. While I can’t reply to emails with these read-only addresses, using an email address or email protection helps to minimize the risk of my personal email address being shared without my consent. DuckDuckGo offers a free email protection service that can forward emails to a user’s address, and Microsoft Outlook also allows users to add email aliases to forward to an existing Outlook address. Of course, users can also create a separate email account that can both send and receive emails if preferred.
Another strategy that can be used to cut down on spam email is to use plus addressing (also known as subaddressing) to filter emails to a specific folder. Plus addressing creates a unique receive-only email address that can be used to filter emails to a specific folder or serve as a labeling tool for identifying emails on a specific subject/from a specific sender.
To use plus addressing, add a + sign and descriptor after the account name and before the @ symbol in the email address. For example, if I wanted to register to use websites for my assistive technology classes (which use the course prefix EDAT), I could create a plus address by writing “myusername+edat@myuniversity.edu” without the quotation marks. The emails can be filtered to a specific folder or appear automatically in my inbox. However, plus addressing cannot be used to compose a new email, so outgoing mail would be sent from “myusername@myuniversity.edu.”
Related links
- How I Organize Emails In College With Low Vision
- Add or remove an email alias in Outlook.com – Microsoft Support
- DuckDuckGo Email | Email Protection with DuckDuckGo
Opt-out of data collection and recording when possible
Visual assistance applications and assistive technology applications for blind and low vision users often collect recordings or images for data retention or collection purposes. When I am using tools like Aira in a public space where people around me cannot consent to being recorded, I request that the call not be recorded. Chancey Fleet, a technology educator who works at the New York Public Library, recommends that users start calls to Aira or similar visual interpreting services by saying “please stop recording” or “do not record” before working on the task at hand.
Another strategy is to go into app settings and turn off features for collecting usage data, data collection, AI training, or similar. When using websites, I recommend using a plug-in like Ghostery or DuckDuckGo to block third-party trackers when using web browsers like Edge, or use privacy features on web browsers to turn off tracking or send do not track requests; Brave and DuckDuckGo are two privacy-focused web browsers to consider. Some websites may require the use of third-party plugins (such as my college’s two-factor authentication system), and these websites may require users to enable tracking to ensure that users can access information.
Related links
- Best Ad Blocker & Privacy Browser | Ghostery
- Tweet from @ChanceyFleet
- DuckDuckGo Search & Tracker Protection – Microsoft Edge Addons
- All About Visual Assistance Apps For Visually Impaired
- Smartphone Apps For Orientation and Mobility
- Customize Microsoft Edge Accessibility For Low Vision
Enable content filters to block ads or other websites
Content filters can be a useful tool for keeping kids safe online, as well as helping other users avoid unwanted websites or online content. There are numerous block lists and filter lists available online that can be added to web browsers or ad blockers to help protect users from trackers or ads, or users can add websites manually to content filters so they can avoid them. For people looking for a list of website filters or list of websites to block, FilterLists is the most comprehensive repository of block lists and filter lists I have found online, though someone who is not very techie will likely need assistance with setting it up.
Other examples of content filters to enable include ad blockers and turning off auto-play for videos or other content, which can help with protecting users from surprise strobe or flashing lights. While flashing lights may not seem like it would be related to online safety for visually impaired users, they can be dangerous or disorienting for people who have photophobia, photosensitivity, or other neurological conditions!
Related links
- Smartphone Accessibility Settings For Photosensitivity
- Avoiding Flashing Lights On Social Media
- How I Watch Concert Videos Without Strobe Lights
- FilterLists | Subscriptions for uBlock Origin, Adblock Plus, AdGuard, …
Do not disclose identifying information without consent
It can be frustrating to have someone else tell a story on your behalf, especially if they get a lot of details wrong! When I made the choice to disclose my disability and talk about my experiences living with vision loss online, this choice was one that I made myself as an adult. I often encounter posts made by parents and teachers that share specific information about children or other people that live with a disability, sharing information such as:
- Person’s name and age
- Diagnosis
- Location
- Copies of IEPs and accommodations lists with personally identifiable information included
- Where they go to school or where they work/volunteer
Not everyone feels comfortable with having their experience shared by someone else, especially if they don’t like to reveal information about themselves or their disability to others. Alternatively, individuals may not want to share that they have a visual impairment or other disability online, which is their choice.
When it comes to navigating support groups, online forums, and leaving comments, I strongly recommend refraining from posting real names, ages (if possible), and precise location information such as a city or school district. In addition, allow individuals to choose how they answer questions about disability, including choosing not to answer questions at all— avoid answering questions on their behalf.
Strategies I use for my own writing and website
As part of maintaining a website that covers topics related to low vision and assistive technology, I take a few different steps to promote online safety for visually impaired users, which include:
- Referring to people or outside sources using they/them pronouns and sharing neutral examples or stories that do not identify others.
- Focusing on my own experiences as a student with low vision, instead of sharing about others without their consent.
- If I am sharing a more detailed example or if there is a chance that someone could be recognized from my post, I ask the subject for permission before sharing, and show them exactly what is being shared.
- I don’t post information in real time and often edit posts to include additional details months or years later. For example, I didn’t share the name of the dorms I lived in until I had already moved out, and also do not share the names of classes I am currently enrolled in.
- Comments are moderated or turned off entirely.
- I remove image metadata and location information.
- I do not follow friends or people I know in real life on social media accounts associated with my website.
- Third-party tracking tools such as analytics and social media are not enabled on my website, so I have no idea who is reading my articles or how many readers I have.
- I do not accept link insertions or guest posts, which could link to external sources that I have not personally reviewed.
Related links
- How To Choose Accessible Usernames
- BlueSky Accessibility Features For Low Vision
- How I Use Pinterest For Studying In College
Enable privacy settings on social media
When posting content that contains personally identifiable information such as school projects, ensure that privacy settings have been enabled so that the content is only visible to the intended audience. This can include:
- Setting up private social media accounts that require users to manually approve followers
- Sharing unlisted videos or presentations that can’t be accessed via search tools
- Creating password-protected blogs or portfolios
- Using forums or online discussion boards that require users to log in to view/reply
Since a lot of online content are public by default, users should ensure that they know how to lock their profiles down and delete or deactivate profiles at a later time. I use school projects as a specific example because a student’s first and last name, school, age/grade level, and teacher name will be visible on the project. Teachers should ask students and guardians for consent prior to having projects posted on social media or otherwise published online that contain identifying or sensitive information.
Check the background of images and videos before posting or streaming
When sharing photos and/or videos in a post, it is important to make sure that no personally identifiable information is visible in the foreground or background. When shared unintentionally, this information can make it easier for others to figure out private information like names or addresses that could have real-life consequences; to share an example from my own life, I almost posted a photo with a sign in the background that had the address of my internship housing on a public social media account.
Before posting an image or video, zoom in on the background or ask a trusted person to make sure that the following items are not accidentally visible:
- School t-shirts or sweatshirts, uniforms, and clothing for local teams. This can include items someone is wearing as well as items that are on the floor/in a laundry pile
- Local businesses or distinctive landmarks, items with local business names (e.g. coffee cups)
- Other people in the background, especially if their faces are visible or they are wearing clothing/holding items that include location-specific information
- Mirrors, glasses, and other reflective surfaces that may show screens or faces
- Name tags or badges, including personalized items
- Keys, which can be copied from a photo
- Class schedules with locations or times
- Meeting links, QR codes, tickets, order confirmations
- Buildings, houses, apartments, or the outside of a school
- Maps with home, school, or work locations visible
- Prescription medication bottles
- Screenshots or notes with emails, phone numbers, ID numbers, usernames, or passwords visible
- License plates or bumper stickers
- Signs, especially street signs, house numbers, hotels, or building signs
- Diplomas or certificates— these images can be used to create counterfeit items
If any of these items are visible, there are a few strategies that can be used to hide or remove them. For example, adding a sticker or solid shape over an item can be used to block out identifying information, which is better than scribbling lines over something as this can still show white space. Other options include cropping the image, using an eraser tool to remove the item(s), or removing the background of an image and replacing it with a solid-colored background. Alternatively, consider taking a different picture entirely with identifying information removed.
Related links
- Taking Selfies With Low Vision
- Emoji Accessibility and Low Vision
- Assistive Technology For Medication Labels
Avoid location tags
When writing or posting videos/images online, avoid providing descriptive location information or describing places that someone goes to on a routine or frequent basis. Even mentioning a chain restaurant nearby or a landmark near a house can narrow down someone’s location.
This is especially relevant for college or university students living in a dorm; I had someone correctly guess where my dorm was after reading one of my posts even though I hadn’t mentioned the name of my building, which led to me having to edit several posts and taking other steps to maintain my safety. While it can be helpful to share the names of dorms or information for prospective students, posts can always be created or updated later to share descriptive location information after moving out.
Before uploading photos, make sure to remove the location or other metadata from the file as this may contain the location coordinates of where the image was taken. Another option is to take a screenshot, which generally does not include location information.
Remove location from image metadata in Windows
- Open File Explorer (Windows key + E) and locate the image.
- Right-click the image and select Properties, or use keyboard shortcut Alt + Enter.
- Switch to the Details tab by pressing Ctrl + Tab twice
- Select Remove Properties and Personal Information at the bottom either by clicking or pressing Tab
- Choose one of the options:
- Create a copy with all possible properties removed: Create a new copy of the image without metadata such as location
- Remove the following properties from this file: Select specific fields to delete
- Select OK. Open the image again to verify that properties have been removed.
Remove location from image metadata in iOS Photos app and MacOS
- Open the Photos app and locate the image
- Swipe up or tap the Info (i) button to view the photo’s metadata.
- Tap Adjust at the bottom of the map.
- Select No Location to remove the location metadata
Related links
- How To Create Dorm Door Signs and Decorations For Low Vision
- How To Create High Resolution Images For Low Vision
Create secure passwords
Many users are tempted to use the same password for everything, even though they know it is a bad idea. However, there are several dangers associated with using the same password for everything or not changing passwords after a data leak/data breach, including:
- If a person can guess the password to an email account, they can go in and change all other passwords associated with that email
- Websites can be compromised and have passwords leaked, and it will make it easier for hackers to find the passwords to common accounts, especially since many breaches show emails/usernames and passwords together. If someone uses the same username/password combination on multiple accounts, all of these accounts could be compromised.
- For a user that creates a password that contains a word in the dictionary, a password with 6-8 characters can be guessed by a password cracking program in about thirty minutes.
- By adding characters such as letters, numbers, and symbols, the time to guess a password increases to be several hours, days, weeks, months, or even years
One of my favorite tips for how to create secure and easy-to-remember passwords is to use a base password that changes for each website, adding characters, symbols, numbers, and other things to make it secure and unique. I have an entire post dedicated to creating secure and easy to remember passwords linked below.
Related links
- How To Create Secure And Easy To Remember Passwords
- BioSig-ID Accessibility For Low Vision and Dysgraphia
Only share images with alt text and image descriptions
A few of my friends with no usable vision have accidentally shared images on social media because they had assumed the caption served as an image description— for example, one person had shared a picture with the caption “a beautiful sunset” that contained nudity. Since images without alt text are read out by screen readers as “image”, it’s important that accessibility allies share images and videos with alt text, image descriptions, and video descriptions that are accurate, or use another tool to determine what is in an image before sharing.
Related links
- How To Write Alt Text and Image Descriptions for the Visually Impaired
- How To Add Alt Text On Social Media
- How To Write Alt Text For Gifs
- How To Write Alt Text For Educational Content
- Purposes of Media Descriptions for Visual Impairment
Other online safety tips for visually impaired users
- I participated in an interview with Hadley Helps all about online safety tips for visually impaired users! Listen to the podcast or read the transcript at Hadley Presents: How To Avoid Phone and Online Scams With Vision Loss with Veronica Lewis
- To help with removing AI-generated misinformation from search results, I add “-ai” without quotation marks to the end of all of my web searches, and turn off AI summaries for search results. I share more tips for using search engines in How To Run Effective Web Searches
- Screen curtains and anti-glare protectors can be used to block out displays and make it more challenging for others to look at someone’s screen without their consent. This can be useful when accessing devices in public places.

Published February 8, 2022. Updated December 2025
