top of page

Victim Survivor Training

Safety through Knowledge

Domestic Violence Family Violence Victim Survivor Training

Victim Survivor Training

Technology Safe Victim-Survivor Training is a practical, trauma-informed program that helps people experiencing (or leaving) domestic and family violence understand how technology can be misused, and learn clear, safe steps to protect their privacy, devices, accounts, and daily routines.

​

Our training programs are available Australia wide in Adelaide, Brisbane, Canberra, Darwin, Hobart, Melbourne, Perth and Sydney.

 

Tailored for:

​

  • Individuals experiencing or recovering from domestic/family violence, stalking, or coercive control

  • People supporting a victim-survivor (family/friends) who need safe, concrete guidance​

​

Technology Safe also offers Support Services Training.

100+

Sesisons deliviered

3k+

Attendees Participated

4k+

Hours of Education

98%

Feel more confident

Early Identification of Risk

Training equips staff to recognise red flags of technology-facilitated abuse, from stalkerware symptoms and suspicious account activity to smart-home misuse and covert tracking. Earlier detection means faster, safer interventions, reducing the likelihood of escalation to physical harm and preventing months of undetected monitoring.

Consistent, Safe Responses

Clear frameworks and scripts help teams respond the same safe way every time: how to ask trauma-informed questions, what not to disclose (especially location or contact details), and when to escalate to TSCM sweeps, property assessments, or police. Consistency improves client safety.

Legal Compliance

Staff learn information-handling rules that protect clients and the organisation: consent, data minimisation, secure communications, and evidence-aware documentation. Training reduces the risk of privacy breaches, legal exposure, and reputational damage by embedding compliant practices.

Practical Skills

Teams gain hands-on skills: non-forensic device triage, account hardening (passwords, MFA, recovery), safer-use coaching, and safety-tech selection (duress watches, safety cards, apps). Ready-to-use checklists, flowcharts, and safety-plan templates turn learning into action the same day.

Continuous Improvement

Training builds a safety-first culture, trauma-informed, culturally and linguistically sensitive, and aligned across teams (intake, casework, reception, management). With metrics, refreshers, and a train-the-trainer option, capability becomes embedded and sustainable, enabling partnerships with specialists.

Domestic Violence Family Violence Victim Survivor Training

Process

How training is delivered

  • Workshops (2–4 hrs, 1-day, or multi-session series), in person or live online

  • On-demand portal with interactive modules, videos, checklists, and printable guides

  • Train-the-trainer pathway to embed capability across larger teams

 

Tools & resources included

  • Screening questions, red-flag checklists, device/account safety checklists

  • Incident flowcharts, sample safety plans, and client handouts (plain language)

  • Policy templates (confidentiality, information release, social media/image use)

  • Referral and escalation guides (TSCM sweeps, property assessments, legal supports)

 

Practice principles

  • Trauma-informed, culturally and linguistically sensitive, accessible delivery

  • Survivor-focused, discretion-first communications (no unnecessary data or location disclosure)

  • Vendor-agnostic, practical advice aligned to real-world constraints

​

Safety & Delivery Notes

  • Survivor-led pacing; no device changes made without consent.

  • Communications plan agreed first (safe number/email, voicemail rules).

  • Plain-language, interpreter-friendly materials; culturally safe practice.

  • Escalation pathways ready (TSCM sweeps, property checks, legal support) if risk is high.

 

Customisation

Sessions are tailored to your service type, client cohort, and outcomes, focusing on one priority area or combining modules to match your needs.

Residential

Providing peace of mind by ensuring personal conversations, activities, and sensitive information remain secure within your private space.

Commercial

Securing boardrooms, offices, and sensitive areas, businesses can protect confidential information, maintain competitive advantage, and ensure regulatory compliance.

Support Services

Detecting and removing covert surveillance that may be being used to monitor, control, or intimidate a victim, ensuring their safety and privacy.

Modules we offer:

Tech-Facilitated Abuse 101

  • Understand common tools and tactics used to monitor, control, or intimidate.

  • Spyware/stalkerware, account abuse, cloud leaks, trackers, smart-home misuse.

  • “A day in the life” threat-map.

  • Abuse patterns quick guide.

 

Red Flags & Safe Screening

  • Identify behavioural/technical red flags and ask trauma-informed questions.

  • Battery/data anomalies, unknown logins/devices, location “coincidences.”

  • Safe disclosure role-plays.

  • Red-flag checklist, screening scripts.

 

Device Triage (Non-Forensic)

  • Triage phones/computers for common compromise without destroying evidence.

  • Permissions, risky profiles, admin/MDM, accessibility abuse.

  • Guided triage on a demo device.

  • Triage flowchart; preserve/clean/replace guide.

 

Account Security & MFA Reset

  • Regain control of accounts safely.

  • Password strategy, recovery channels, OAuth tokens, session review.

  • Secure reset lab (sandboxed).

  • Account reset checklist, MFA guide.

​

Location & Tracking Protections

  • Reduce real-time tracking risks.

  • Find My/Google location, family sharing, Bluetooth trackers (AirTag/Tiles), car apps/telematics.

  • Simulated tracker alert response.

  • Location hygiene quick card.

​

Safer Communications & Quick-Exit

  • Communicate without tipping off an abuser.

  • App choices, disappearing messages, lock-screen privacy, code words, quick-exit tools.

  • Build a safe contact plan.

  • Safe comms cheat-sheet.

 

Social Media & Image-Based Abuse

  • Lock down profiles and respond to harm.

  • Privacy settings, geotags, impersonation, takedown/report pathways.

  • Privacy sweep of a mock profile.

  • Social privacy checklist; reporting links.

​

Cloud & Shared Accounts Pitfalls

  • Close “silent” data leaks.

  • Shared albums/calendars, device backups, shared drives, home assistants.

  • Audit a cloud account.

  • Cloud safety checklist.

​

Smart-Home & IoT Safety

  • Regain control of connected devices.

  • Doorbells/cameras/locks/speakers resets, access removal, logs.

  • Factory-reset & safe recommission demo.

  • IoT reset cards.

​

Vehicle & Transport Risks

  • Understand tracking via cars and routines.

  • Vehicle risk checklist.

  • GPS trackers, OBD-II devices, app access, safe pickup/drop-off.

  • “Where trackers hide” exercise.

​

Home/Property Basics for Survivors

  • Quick wins at home while awaiting upgrades.

  • Locks, lighting, sightlines, safe-room setup, visitor handling.

  • Room-by-room plan.

  • Home safety checklist.

​

Evidence-Aware Documentation

  • Keep options open for legal steps.

  • Logs, screenshots, timelines, chain-of-custody basics.

  • Build a simple incident log.

  • Evidence notes template.

​

Children, Co-Parenting & Schools

  • Safer tech for kids amidst custody dynamics.

  • Location sharing on kids’ devices, school apps, handover safety.

  • Co-parenting comms plan.

  • Family tech rules one-pager; school liaison template.

​

Financial & Identity Safety Online

  • Reduce financial control and fraud risks.

  • Banking/email security, 2FA tokens, recovery phone control, scam red flags.

  • Lock down a “banking bundle.”

  • ID-security checklist.

​

Technology Safe

Counter Surveillance

Sweeps to detect and remove hidden cameras, listening devices, GPS trackers, and digital spyware used for unauthorized monitoring. Our expert services ensure your home, vehicle, and personal technology remain secure, protecting your privacy and peace of mind.

Technology Safe

Property Safety

Thorough evaluation of your home, business, or facility to identify potential security risks, vulnerabilities, and safety hazards. Our expert team provides tailored recommendations to enhance overall safety, prevent unauthorized access, and ensure a secure environment for occupants and assets.

Are you from a Support Service or Organisation?

Technology Safe assist Domestic Violence, Family Violence and

other support services across Australia.

Technology Safe

Free Same Day Metro Delivery

Order by 11am AEST

Education and
Training Sessions

Complementary for our referral partners

Technology Safe are licensed, insured and exceed regulatory compliance.

Everyone in our team has Working with Children's Check.

Technology Safe

Online Store
and Wearables

Technology products that keep you safe 

Technology Safe

Help Centre
and FAQ

Complementary for our referral partners

bottom of page