top of page
Image by Yura Fresh

Victim Survivor Training

Victim Survivor Training

Educating Domestic Violence victims about technology abuse is crucial because perpetrators often exploit technology to maintain control, harass, or stalk their victims.

 

As technology becomes an integral part of everyday life, understanding how it can be used against them helps victims protect themselves, maintain privacy, and regain control. 

​Early detection of technology abuse allows victims to take action before the abuse escalates. Teaching them how to recognize red flags can help prevent further harm or harassment, especially in cases where the abuse is escalating towards physical violence.

Technology abuse is often covert and can be difficult to detect. Abusers can track victims’ locations, monitor communications, or even control devices without their knowledge. Educating victims helps them recognize these hidden forms of abuse and understand the extent of the control being exerted over them.

Topics may include:

  • What is Technology Abuse?

  • Where we see and find technology abuse

  • Tech Abuse impact on victims

  • The ease of inflicting Tech Abuse

  • Cloud environments

  • Smart home technology

  • Children and technology

  • Technology Safety

  • Safety tips

  • Questions

Explore our various licenses and insurance policies that ensure the highest level of protection for our clients. We are fully accredited and compliant with industry standards.

A Current Affair | Apple AirTag and how an innocent device can be turned sinister.
ABC News | Technology Abuse | Featuring Protective Group
The Project | Aussies Helping Women Rid Their Homes of Tracking Devices | Featuring Protective Group
ABC Statewide Drive | Technology Abuse | Featuring Protective Group
Channel 7 News | Disturbing ways tech is used to control DV victims | Featuring Protective Group
Protective Group have featured on

Support Services Training may include:

Forms of Technology Abuse

  • Digital surveillance: Using spyware or tracking devices on phones and computers to monitor victims’ activities.

  • Cyberstalking and harassment: Abusive messages, emails, or social media posts that intimidate or threaten victims.

  • Location tracking: GPS tracking through phones, shared apps, or car systems.

  • Device control: Restricting or monitoring a victim’s use of devices like smartphones, computers, or smart home systems.

  • Non-consensual image sharing: Also known as revenge porn, where intimate images or videos are shared without the victim's consent.

How to Detect Technology Abuse

  • Victims may not realize their devices are being used against them.

Securing Devices and Accounts

  • Changing passwords regularly and using strong, unique passwords for each account.

  • Setting up two-factor authentication (2FA) on devices and online accounts.

  • Avoiding public Wi-Fi or using a virtual private network (VPN) when needed.

  • Reviewing apps and permissions on their phone to ensure no unwanted tracking apps or spyware are installed.

Social Media Safety

  • Adjust privacy settings on platforms like Facebook, Instagram, and Twitter to limit who can see their posts and personal information.

  • Be cautious about sharing location information in real-time.

  • Block or report the abuser on social media platforms and recognize the possibility of the abuser creating fake accounts to gain access.

  • Avoid sharing sensitive or personal information, including photos, that can be used against them.

Keeping Up with Technological Advances

  • Technology evolves quickly, and so do the methods of abuse. Training ensures VS stay updated on new tools and strategies abusers may use, as well as on the latest ways to help victims protect themselves.

Location Tracking and GPS

  • Disabling location tracking on mobile phones and in apps like Google Maps or social media platforms.

  • Avoiding using location-based check-ins or tagging themselves in places where the abuser may find them.

  • Learning how shared accounts or family plans might allow the abuser to track them through phone carriers or apps like “Find My Phone.”

Creating a Technology Safety Plan

  • Using a safe device that the abuser doesn’t have access to for important communications.

  • Setting up secure, private accounts for email and social media.

  • Having backup communication methods (e.g., a “burner phone”) in case their primary device is compromised.

  • Documenting incidents of technology abuse for legal purposes, including taking screenshots of harassing messages or logging instances of tracking or surveillance.

Training and Learning

Support Services Training

Perpetrators often use technology to control, stalk, or harass their victims, making it essential for staff to understand.

Law Enforcement ​Training


Technology is increasingly being used a tool of control, harassment, and intimidation by perpetrators.

Learning
Portal

Our dedicated purpose-built Tech Learning Portal was built to with one purpose- keep victims safe online when they are offline.

Have a Question?

Visit our Help Center! Here, you can find answers to frequently asked questions, shipping information, and general details to assist you. If you need further assistance, feel free to reach out!

Police hold AirTag located by Protective Group

News and Events

Keep up to date with the latest news from Protective Group

Protective Group Online Store

Store

Keeping you safe online and in your home

 

Protective Group are proud to have worked with

bottom of page