top of page

Support Services Training

Bringing experience to education

Domestic Violence Family Violence Support Services Training

Support Services Training

Technology Safe Support Service Training is a practical, survivor-focused program that equips domestic violence and family violence services, and other frontline organisations with the skills to identify, prevent, and respond to technology-facilitated abuse (alongside other forms of coercive control). It blends real-world scenarios, hands-on practice, and ready-to-use tools so staff can act safely and confidently.

​

Our Domestic Violence training programs are available Australia wide in Adelaide, Brisbane, Canberra, Darwin, Hobart, Melbourne, Perth and Sydney.

 

Tailored for:

​

  • Domestic & family violence services, refuges, crisis accommodation

  • Community organisations, case workers, social services, youth & refugee support

  • Health, education, housing, legal aid, and faith/community groups

  • Managers, intake/reception, outreach teams, volunteers

​

Technology Safe also offers Victim Survivor Training for Domestic Violence victims.

100+

Sesisons deliviered

3k+

Attendees Participated

4k+

Hours of Education

98%

Feel more confident

Early Identification of Risk

Training equips staff to recognise red flags of technology-facilitated abuse from stalkerware symptoms and suspicious account activity to smart-home misuse and covert tracking. Earlier detection means faster, safer interventions, reducing the likelihood of escalation to physical harm and preventing undetected monitoring.

Consistent, Safe Responses

Clear frameworks and scripts help teams respond the same safe way every time: how to ask trauma-informed questions, what not to disclose (especially location or contact details), and when to escalate to TSCM sweeps, property assessments, or police. 

Legal Compliance

Staff learn information-handling rules that protect clients and the organisation: consent, data minimisation, secure communications, and evidence-aware documentation. Training reduces the risk of privacy breaches, legal exposure, and reputational damage by embedding compliant practices.

Practical Skills

Teams gain hands-on skills: non-forensic device triage, account hardening (passwords, MFA, recovery), safer-use coaching, and safety-tech selection (Safety Watches, Safety Cards, Safety Apps). Ready-to-use checklists, flowcharts, and safety-plan templates turn learning into action the same day.

Continuous Improvement

Training builds a safety-first culture—trauma-informed, culturally and linguistically sensitive, and aligned across teams (intake, casework, reception, management). With metrics, refreshers, and a train-the-trainer option, capability becomes embedded and sustainable, enabling partnerships with specialists.

Domestic Violence Family Violence Support Services Training

Process

How training is delivered

  • Workshops (2–4 hrs, 1-day, or multi-session series), in person or live online

  • On-demand portal with interactive modules, videos, checklists, and printable guides

  • Train-the-trainer pathway to embed capability across larger teams

 

Tools & resources included

  • Screening questions, red-flag checklists, device/account safety checklists

  • Incident flowcharts, sample safety plans, and client handouts (plain language)

  • Policy templates (confidentiality, information release, social media/image use)

  • Referral and escalation guides (TSCM sweeps, property assessments, legal supports)

 

Outcomes for your team

  • Staff can recognise tech abuse early, reduce risk, and make safer referrals

  • Consistent, evidence-aware responses that protect client privacy and safety

  • Stronger organisational protocols and a clear escalation pathway for high-risk cases

 

Practice principles

  • Trauma-informed, culturally and linguistically sensitive, accessible delivery

  • Survivor-focused, discretion-first communications (no unnecessary data or location disclosure)

  • Vendor-agnostic, practical advice aligned to real-world constraints

 

Customisation

Sessions are tailored to your service type, client cohort, and outcomes—focusing on one priority area or combining modules to match your needs.

Residential

Providing peace of mind by ensuring personal conversations, activities, and sensitive information remain secure within your private space.

Commercial

Securing boardrooms, offices, and sensitive areas, businesses can protect confidential information, maintain competitive advantage, and ensure regulatory compliance.

Support Services

Detecting and removing covert surveillance that may be being used to monitor, control, or intimidate a victim, ensuring their safety and privacy.

Modules we offer:

Tech-Facilitated Abuse 101

  • Understand how phones, apps, cloud accounts, trackers, cameras, and smart devices are misused to coerce, monitor, or isolate.

  • Threat-model mapping; “a day in the life” scenario.

  • Glossary of terms; device/tech abuse patterns quick guide.

 

Red Flags & Safe Screening

  • Spot behavioural and technical indicators; ask trauma-informed, non-leading questions without increasing risk.

  • Roleplay intake calls; design safer screening forms.

  • Red-flag checklist; sample screening scripts.

 

Device & Account Triage (Non-Forensic)

  • Triage phones/computers for common signs of stalkerware/spyware, unsafe settings, and account compromise; know when to escalate.

  • Guided walk-through on a demo device; account session review.

  • Triage flowchart; do/don’t list (preserve vs. clean vs. replace).

 

Safety Planning with Technology

  • Build digital components into safety plans: safer comms, location hygiene, account hardening, quick-exit strategies, safe cloud use.

  • Draft a tech-aware safety plan for two client profiles.

  • Safety plan template; “safer settings” cheat-sheet.

 

Property & Vehicle Basics (When to Request TSCM)

  • Recognise household/vehicle risks (locks, lighting, trackers, covert mics); know triggers for home/car sweeps and how to brief a specialist.

  • Room-by-room and vehicle checklist exercise.

  • Printable home/vehicle checklists; TSCM referral form.

 

Evidence-Aware Practice

  • Document indicators without tipping off a perpetrator; understand preserve/clean/replace decisions and chain-of-custody basics.

  • Build an incident log; screenshot/redaction practice.

  • Evidence note template; disclosure guidelines.

 

Legal, Ethical & Confidentiality

  • Duty of care, consent, privacy; avoiding location disclosure; information-sharing protocols and subpoenas/records handling.

  • Case study on info-sharing dilemmas.

  • Confidentiality policy template; safe-contact matrix.

 

Organisational Readiness & Incident Response

  • Establish escalation paths, code words, visitor controls, breach responses; align policy, people, and tech.

  • Tabletop exercise: “urgent escalation in a refuge.”

  • Incident playbook; on-call/escalation tree template.

​

​Cloud, Accounts & Family-Sharing Pitfalls

  • Close data-leak paths in iCloud/Google/Microsoft; review recovery channels, OAuth tokens, shared albums/calendars.

  • Account hardening lab.

  • Account reset checklist; MFA guide.

 

Smart Home & IoT Safety

  • Secure/reset cameras, doorbells, locks, speakers, hubs; review logs and revoke access safely.

  • Factory reset & safe recommission demo.

  • IoT reset/hardening quick cards.

 

Social Media, OSINT & Image-Based Abuse

  • Reduce doxxing/OSINT risk; manage geotags, followers, impersonation, image-based abuse reporting.

  • Privacy sweep of a mock profile.

  • Social privacy checklist; takedown/Report links.

 

Children, Co-Parenting & Schools

  • Manage location sharing on kids’ devices; safe handover points; school app risks; consent and guardianship complexities.

  • Co-parenting comms plan workshop.

  • Family tech rules one-pager; school liaison template.

 

High-Risk Cohorts & Cultural Safety

  • Tailor practice for CALD communities, disability, LGBTQIA+, rural/remote; interpreter use and safety; tech access barriers.

  • Scenario adaptation by cohort.

  • Inclusive practice checklist.

 

Staff Digital Safety & Vicarious Trauma

  • Reduce staff doxxing and harassment; safe social media use; boundaries and wellbeing.

  • Personal security settings clinic.

  • Staff digital-safety checklist.​

Coordination with Police, Courts & Specialists

  • Engage law enforcement effectively; brief TSCM teams; prepare concise case summaries; align legal timelines.

  • Writing a one-page specialist brief.

  • Referral pack templates.

​

Technology Safe

Counter Surveillance

Sweeps to detect and remove hidden cameras, listening devices, GPS trackers, and digital spyware used for unauthorized monitoring. Our expert services ensure your home, vehicle, and personal technology remain secure, protecting your privacy and peace of mind.

Technology Safe

Property Safety

Thorough evaluation of your home, business, or facility to identify potential security risks, vulnerabilities, and safety hazards. Our expert team provides tailored recommendations to enhance overall safety, prevent unauthorized access, and ensure a secure environment for occupants and assets.

Are you from a Support Service or Organisation?

Technology Safe assist Domestic Violence, Family Violence and

other support services across Australia.

Technology Safe

Free Same Day Metro Delivery

Order by 11am AEST

Education and
Training Sessions

Complementary for our referral partners

Technology Safe are licensed, insured and exceed regulatory compliance.

Everyone in our team has Working with Children's Check.

Technology Safe

Online Store
and Wearables

Technology products that keep you safe 

Technology Safe

Help Centre
and FAQ

Complementary for our referral partners

bottom of page