Victim Survivor Training
Victim Survivor Training
Educating Domestic Violence victims about technology abuse is crucial because perpetrators often exploit technology to maintain control, harass, or stalk their victims.
As technology becomes an integral part of everyday life, understanding how it can be used against them helps victims protect themselves, maintain privacy, and regain control.
Early detection of technology abuse allows victims to take action before the abuse escalates. Teaching them how to recognize red flags can help prevent further harm or harassment, especially in cases where the abuse is escalating towards physical violence.
Technology abuse is often covert and can be difficult to detect. Abusers can track victims’ locations, monitor communications, or even control devices without their knowledge. Educating victims helps them recognize these hidden forms of abuse and understand the extent of the control being exerted over them.
Topics may include:
-
What is Technology Abuse?
-
Where we see and find technology abuse
-
Tech Abuse impact on victims
-
The ease of inflicting Tech Abuse
-
Cloud environments
-
Smart home technology
-
Children and technology
-
Technology Safety
-
Safety tips
-
Questions
Explore our various licenses and insurance policies that ensure the highest level of protection for our clients. We are fully accredited and compliant with industry standards.
Protective Group have featured on
Support Services Training may include:
Forms of Technology Abuse
-
Digital surveillance: Using spyware or tracking devices on phones and computers to monitor victims’ activities.
-
Cyberstalking and harassment: Abusive messages, emails, or social media posts that intimidate or threaten victims.
-
Location tracking: GPS tracking through phones, shared apps, or car systems.
-
Device control: Restricting or monitoring a victim’s use of devices like smartphones, computers, or smart home systems.
-
Non-consensual image sharing: Also known as revenge porn, where intimate images or videos are shared without the victim's consent.
How to Detect Technology Abuse
-
Victims may not realize their devices are being used against them.
Securing Devices and Accounts
-
Changing passwords regularly and using strong, unique passwords for each account.
-
Setting up two-factor authentication (2FA) on devices and online accounts.
-
Avoiding public Wi-Fi or using a virtual private network (VPN) when needed.
-
Reviewing apps and permissions on their phone to ensure no unwanted tracking apps or spyware are installed.
Social Media Safety
-
Adjust privacy settings on platforms like Facebook, Instagram, and Twitter to limit who can see their posts and personal information.
-
Be cautious about sharing location information in real-time.
-
Block or report the abuser on social media platforms and recognize the possibility of the abuser creating fake accounts to gain access.
-
Avoid sharing sensitive or personal information, including photos, that can be used against them.
Keeping Up with Technological Advances
-
Technology evolves quickly, and so do the methods of abuse. Training ensures VS stay updated on new tools and strategies abusers may use, as well as on the latest ways to help victims protect themselves.
Location Tracking and GPS
-
Disabling location tracking on mobile phones and in apps like Google Maps or social media platforms.
-
Avoiding using location-based check-ins or tagging themselves in places where the abuser may find them.
-
Learning how shared accounts or family plans might allow the abuser to track them through phone carriers or apps like “Find My Phone.”
Creating a Technology Safety Plan
-
Using a safe device that the abuser doesn’t have access to for important communications.
-
Setting up secure, private accounts for email and social media.
-
Having backup communication methods (e.g., a “burner phone”) in case their primary device is compromised.
-
Documenting incidents of technology abuse for legal purposes, including taking screenshots of harassing messages or logging instances of tracking or surveillance.
Training and Learning
Have a Question?
Protective Group are proud to have worked with
NSW Government are a client of Protective Group
Go to linkBenevolent Society are a client of Protective Group
Go to linkVictoria Police engages Protective Group The Orange Door
Go to link