Support Services Training
Bringing experience to education

Support Services Training
Technology Safe Support Service Training is a practical, survivor-focused program that equips domestic violence and family violence services, and other frontline organisations with the skills to identify, prevent, and respond to technology-facilitated abuse (alongside other forms of coercive control). It blends real-world scenarios, hands-on practice, and ready-to-use tools so staff can act safely and confidently.
​
Our Domestic Violence training programs are available Australia wide in Adelaide, Brisbane, Canberra, Darwin, Hobart, Melbourne, Perth and Sydney.
Tailored for:
​
-
Domestic & family violence services, refuges, crisis accommodation
-
Community organisations, case workers, social services, youth & refugee support
-
Health, education, housing, legal aid, and faith/community groups
-
Managers, intake/reception, outreach teams, volunteers
​
Technology Safe also offers Victim Survivor Training for Domestic Violence victims.

100+
Sesisons deliviered
3k+
Attendees Participated
4k+
Hours of Education
98%
Feel more confident
Early Identification of Risk
Training equips staff to recognise red flags of technology-facilitated abuse from stalkerware symptoms and suspicious account activity to smart-home misuse and covert tracking. Earlier detection means faster, safer interventions, reducing the likelihood of escalation to physical harm and preventing undetected monitoring.
Consistent, Safe Responses
Clear frameworks and scripts help teams respond the same safe way every time: how to ask trauma-informed questions, what not to disclose (especially location or contact details), and when to escalate to TSCM sweeps, property assessments, or police.
Legal Compliance
Staff learn information-handling rules that protect clients and the organisation: consent, data minimisation, secure communications, and evidence-aware documentation. Training reduces the risk of privacy breaches, legal exposure, and reputational damage by embedding compliant practices.
Practical Skills
Teams gain hands-on skills: non-forensic device triage, account hardening (passwords, MFA, recovery), safer-use coaching, and safety-tech selection (Safety Watches, Safety Cards, Safety Apps). Ready-to-use checklists, flowcharts, and safety-plan templates turn learning into action the same day.
Continuous Improvement
Training builds a safety-first culture—trauma-informed, culturally and linguistically sensitive, and aligned across teams (intake, casework, reception, management). With metrics, refreshers, and a train-the-trainer option, capability becomes embedded and sustainable, enabling partnerships with specialists.

Process
How training is delivered
-
Workshops (2–4 hrs, 1-day, or multi-session series), in person or live online
-
On-demand portal with interactive modules, videos, checklists, and printable guides
-
Train-the-trainer pathway to embed capability across larger teams
Tools & resources included
-
Screening questions, red-flag checklists, device/account safety checklists
-
Incident flowcharts, sample safety plans, and client handouts (plain language)
-
Policy templates (confidentiality, information release, social media/image use)
-
Referral and escalation guides (TSCM sweeps, property assessments, legal supports)
Outcomes for your team
-
Staff can recognise tech abuse early, reduce risk, and make safer referrals
-
Consistent, evidence-aware responses that protect client privacy and safety
-
Stronger organisational protocols and a clear escalation pathway for high-risk cases
Practice principles
-
Trauma-informed, culturally and linguistically sensitive, accessible delivery
-
Survivor-focused, discretion-first communications (no unnecessary data or location disclosure)
-
Vendor-agnostic, practical advice aligned to real-world constraints
Customisation
Sessions are tailored to your service type, client cohort, and outcomes—focusing on one priority area or combining modules to match your needs.
Residential
Providing peace of mind by ensuring personal conversations, activities, and sensitive information remain secure within your private space.
Commercial
Securing boardrooms, offices, and sensitive areas, businesses can protect confidential information, maintain competitive advantage, and ensure regulatory compliance.
Support Services
Detecting and removing covert surveillance that may be being used to monitor, control, or intimidate a victim, ensuring their safety and privacy.
Modules we offer:
Tech-Facilitated Abuse 101
-
Understand how phones, apps, cloud accounts, trackers, cameras, and smart devices are misused to coerce, monitor, or isolate.
-
Threat-model mapping; “a day in the life” scenario.
-
Glossary of terms; device/tech abuse patterns quick guide.
Red Flags & Safe Screening
-
Spot behavioural and technical indicators; ask trauma-informed, non-leading questions without increasing risk.
-
Roleplay intake calls; design safer screening forms.
-
Red-flag checklist; sample screening scripts.
Device & Account Triage (Non-Forensic)
-
Triage phones/computers for common signs of stalkerware/spyware, unsafe settings, and account compromise; know when to escalate.
-
Guided walk-through on a demo device; account session review.
-
Triage flowchart; do/don’t list (preserve vs. clean vs. replace).
Safety Planning with Technology
-
Build digital components into safety plans: safer comms, location hygiene, account hardening, quick-exit strategies, safe cloud use.
-
Draft a tech-aware safety plan for two client profiles.
-
Safety plan template; “safer settings” cheat-sheet.
Property & Vehicle Basics (When to Request TSCM)
-
Recognise household/vehicle risks (locks, lighting, trackers, covert mics); know triggers for home/car sweeps and how to brief a specialist.
-
Room-by-room and vehicle checklist exercise.
-
Printable home/vehicle checklists; TSCM referral form.
Evidence-Aware Practice
-
Document indicators without tipping off a perpetrator; understand preserve/clean/replace decisions and chain-of-custody basics.
-
Build an incident log; screenshot/redaction practice.
-
Evidence note template; disclosure guidelines.
Legal, Ethical & Confidentiality
-
Duty of care, consent, privacy; avoiding location disclosure; information-sharing protocols and subpoenas/records handling.
-
Case study on info-sharing dilemmas.
-
Confidentiality policy template; safe-contact matrix.
Organisational Readiness & Incident Response
-
Establish escalation paths, code words, visitor controls, breach responses; align policy, people, and tech.
-
Tabletop exercise: “urgent escalation in a refuge.”
-
Incident playbook; on-call/escalation tree template.
​
​Cloud, Accounts & Family-Sharing Pitfalls
-
Close data-leak paths in iCloud/Google/Microsoft; review recovery channels, OAuth tokens, shared albums/calendars.
-
Account hardening lab.
-
Account reset checklist; MFA guide.
Smart Home & IoT Safety
-
Secure/reset cameras, doorbells, locks, speakers, hubs; review logs and revoke access safely.
-
Factory reset & safe recommission demo.
-
IoT reset/hardening quick cards.
Social Media, OSINT & Image-Based Abuse
-
Reduce doxxing/OSINT risk; manage geotags, followers, impersonation, image-based abuse reporting.
-
Privacy sweep of a mock profile.
-
Social privacy checklist; takedown/Report links.
Children, Co-Parenting & Schools
-
Manage location sharing on kids’ devices; safe handover points; school app risks; consent and guardianship complexities.
-
Co-parenting comms plan workshop.
-
Family tech rules one-pager; school liaison template.
High-Risk Cohorts & Cultural Safety
-
Tailor practice for CALD communities, disability, LGBTQIA+, rural/remote; interpreter use and safety; tech access barriers.
-
Scenario adaptation by cohort.
-
Inclusive practice checklist.
Staff Digital Safety & Vicarious Trauma
-
Reduce staff doxxing and harassment; safe social media use; boundaries and wellbeing.
-
Personal security settings clinic.
-
Staff digital-safety checklist.​
Coordination with Police, Courts & Specialists
-
Engage law enforcement effectively; brief TSCM teams; prepare concise case summaries; align legal timelines.
-
Writing a one-page specialist brief.
-
Referral pack templates.
​






Counter Surveillance
Sweeps to detect and remove hidden cameras, listening devices, GPS trackers, and digital spyware used for unauthorized monitoring. Our expert services ensure your home, vehicle, and personal technology remain secure, protecting your privacy and peace of mind.

Property Safety
Thorough evaluation of your home, business, or facility to identify potential security risks, vulnerabilities, and safety hazards. Our expert team provides tailored recommendations to enhance overall safety, prevent unauthorized access, and ensure a secure environment for occupants and assets.



