Shared computer
Notifications OFFPost deleted by user
I can see every website he's looked at, every message sent, every call made etc etc.
We use ever accountable and pay £9 a month for it, but there's various options out there
This would be a more protective option for you in my opinion
1. Are separate, passworded user accounts “enough” on their own?
Technically:[/b] If: You each have your own OS user account[/b] Each account has its own login password[/b] He does not[/b] know your[/i] password His account is not an administrator account[/b] Then: His browser history does not[/b] mix with yours His downloads are stored under his[/i] user folder His browser logins and autofill are not accessible to you (and vice versa) From a forensic[/i] perspective, investigators can see which OS account did what[/b], when, and where. So your instinct here is correct: this setup already creates an important boundary. Even with separate accounts: You already understand this, but to say it clearly: **If he breaches conditions, the physical device can still be seized I hear how stressful this is. You’re trying to do the right[/i] thing—supporting someone’s rehab and[/b] protecting yourself from very serious consequences. That’s a heavy position to be in. I’m not a lawyer, but I can give you practical, commonly-recommended safeguards[/b] that people in your situation use to protect themselves. Think of this as risk reduction + evidence of good faith[/i], not a magic shield. You’re correct about one thing that’s uncomfortable but crucial: If he violates conditions, the device can still be seized no matter what.[/b] The goal isn’t to prevent seizure at all costs — it’s to: show you took reasonable, proactive steps[/b] clearly demonstrate separation of access[/b] avoid being treated as complicit or negligent That does[/i] matter in investigations. What you’re doing now is a good start[/b], but on its own it’s not enough protection[/b]. Yes: Separate user accounts do[/i] keep browser history, downloads, cookies, saved passwords, etc. separate within the OS[/b]. But: Investigators know user accounts can be misused You still own/administer the device Without logging, filtering, and documentation, they may say you didn’t do enough So: keep this, but layer protections[/b]. This is critical. Make sure: Your account = admin[/b] His account = standard user[/b] He cannot: install software use incognito/private browsing change system settings add browsers, VPNs, or extensions On Windows/macOS this is doable and important. This is one of the strongest ways to protect yourself. Look for software that: logs websites accessed blocks categories (adult, anonymizers, file sharing, etc.) disables private browsing timestamps activity keeps logs you cannot alter[/b] Examples (not endorsements): Qustodio Covenant Eyes Net Nanny Bark (depending on OS) Why this helps you[/b]: It shows active supervision[/b] It creates an independent record[/b] It demonstrates you weren’t “turning a blind eye” Even better than device-only controls: Put DNS filtering[/b] on your router (e.g. OpenDNS / CleanBrowsing) This applies to any device[/i] on your network Logs exist outside the computer itself[/b] That matters if: the device is seized or someone claims logs were tampered with This feels awkward, but it’s actually smart. Have a written agreement[/b] (even informal) stating: he only accesses the internet under supervision only on his user account only at agreed times you retain admin control violations end access immediately You don’t need legal language. Date it. Both sign it. Keep a copy. This helps show: intent structure accountability You don’t need to be obsessive. Something like: date duration of access purpose (email, job search, rehab work, etc.) confirmation you were present If anything ever happened, this shows pattern and diligence[/b]. You’re already doing this right. Also: Don’t stay logged into your account Enable auto-lock when switching users Use a strong admin password he doesn’t know This is huge[/i] if available. If he has: a probation officer therapist treatment provider Ask (in writing) what they recommend or approve[/b] regarding internet access. If you can show: “I followed the guidance of his supervising authority” that is one of the strongest protections you can have. There is no zero-risk setup[/b]. Anyone telling you otherwise is lying. What you can[/i] do is make it very clear that: you were cautious you set limits you monitored access you did not enable or ignore risk That’s how people protect themselves in real life.
Yes — properly configured[/i] separate user accounts do keep browsing history, files, saved passwords, cookies, and app data separate[/b] at the operating-system level.
2. Where the risk still exists (this part is important)
???? Device seizure risk
how do i protect myself
Big picture (important to be clear about)
1. Separate user accounts: necessary but NOT sufficient on their own
2. You should be the ONLY administrator
3. Use monitoring + filtering software (not just history)
4. Network-level protection (very important)
5. Written rules + boundaries (this is protection, not mistrust)
6. Keep a simple supervision log
7. Do NOT share passwords, ever
8. Consider written guidance from his supervising authority
The honest bottom line