Victim Survivor Training
Safety through Knowledge

Victim Survivor Training
Technology Safe Victim-Survivor Training is a practical, trauma-informed program that helps people experiencing (or leaving) domestic and family violence understand how technology can be misused, and learn clear, safe steps to protect their privacy, devices, accounts, and daily routines.
​
Our training programs are available Australia wide in Adelaide, Brisbane, Canberra, Darwin, Hobart, Melbourne, Perth and Sydney.
Tailored for:
​
-
Individuals experiencing or recovering from domestic/family violence, stalking, or coercive control
-
People supporting a victim-survivor (family/friends) who need safe, concrete guidance​
​
Technology Safe also offers Support Services Training.

100+
Sesisons deliviered
3k+
Attendees Participated
4k+
Hours of Education
98%
Feel more confident
Early Identification of Risk
Training equips staff to recognise red flags of technology-facilitated abuse, from stalkerware symptoms and suspicious account activity to smart-home misuse and covert tracking. Earlier detection means faster, safer interventions, reducing the likelihood of escalation to physical harm and preventing months of undetected monitoring.
Consistent, Safe Responses
Clear frameworks and scripts help teams respond the same safe way every time: how to ask trauma-informed questions, what not to disclose (especially location or contact details), and when to escalate to TSCM sweeps, property assessments, or police. Consistency improves client safety.
Legal Compliance
Staff learn information-handling rules that protect clients and the organisation: consent, data minimisation, secure communications, and evidence-aware documentation. Training reduces the risk of privacy breaches, legal exposure, and reputational damage by embedding compliant practices.
Practical Skills
Teams gain hands-on skills: non-forensic device triage, account hardening (passwords, MFA, recovery), safer-use coaching, and safety-tech selection (duress watches, safety cards, apps). Ready-to-use checklists, flowcharts, and safety-plan templates turn learning into action the same day.
Continuous Improvement
Training builds a safety-first culture, trauma-informed, culturally and linguistically sensitive, and aligned across teams (intake, casework, reception, management). With metrics, refreshers, and a train-the-trainer option, capability becomes embedded and sustainable, enabling partnerships with specialists.

Process
How training is delivered
-
Workshops (2–4 hrs, 1-day, or multi-session series), in person or live online
-
On-demand portal with interactive modules, videos, checklists, and printable guides
-
Train-the-trainer pathway to embed capability across larger teams
Tools & resources included
-
Screening questions, red-flag checklists, device/account safety checklists
-
Incident flowcharts, sample safety plans, and client handouts (plain language)
-
Policy templates (confidentiality, information release, social media/image use)
-
Referral and escalation guides (TSCM sweeps, property assessments, legal supports)
Practice principles
-
Trauma-informed, culturally and linguistically sensitive, accessible delivery
-
Survivor-focused, discretion-first communications (no unnecessary data or location disclosure)
-
Vendor-agnostic, practical advice aligned to real-world constraints
​
Safety & Delivery Notes
-
Survivor-led pacing; no device changes made without consent.
-
Communications plan agreed first (safe number/email, voicemail rules).
-
Plain-language, interpreter-friendly materials; culturally safe practice.
-
Escalation pathways ready (TSCM sweeps, property checks, legal support) if risk is high.
Customisation
Sessions are tailored to your service type, client cohort, and outcomes, focusing on one priority area or combining modules to match your needs.
Residential
Providing peace of mind by ensuring personal conversations, activities, and sensitive information remain secure within your private space.
Commercial
Securing boardrooms, offices, and sensitive areas, businesses can protect confidential information, maintain competitive advantage, and ensure regulatory compliance.
Support Services
Detecting and removing covert surveillance that may be being used to monitor, control, or intimidate a victim, ensuring their safety and privacy.
Modules we offer:
Tech-Facilitated Abuse 101
-
Understand common tools and tactics used to monitor, control, or intimidate.
-
Spyware/stalkerware, account abuse, cloud leaks, trackers, smart-home misuse.
-
“A day in the life” threat-map.
-
Abuse patterns quick guide.
Red Flags & Safe Screening
-
Identify behavioural/technical red flags and ask trauma-informed questions.
-
Battery/data anomalies, unknown logins/devices, location “coincidences.”
-
Safe disclosure role-plays.
-
Red-flag checklist, screening scripts.
Device Triage (Non-Forensic)
-
Triage phones/computers for common compromise without destroying evidence.
-
Permissions, risky profiles, admin/MDM, accessibility abuse.
-
Guided triage on a demo device.
-
Triage flowchart; preserve/clean/replace guide.
Account Security & MFA Reset
-
Regain control of accounts safely.
-
Password strategy, recovery channels, OAuth tokens, session review.
-
Secure reset lab (sandboxed).
-
Account reset checklist, MFA guide.
​
Location & Tracking Protections
-
Reduce real-time tracking risks.
-
Find My/Google location, family sharing, Bluetooth trackers (AirTag/Tiles), car apps/telematics.
-
Simulated tracker alert response.
-
Location hygiene quick card.
​
Safer Communications & Quick-Exit
-
Communicate without tipping off an abuser.
-
App choices, disappearing messages, lock-screen privacy, code words, quick-exit tools.
-
Build a safe contact plan.
-
Safe comms cheat-sheet.
Social Media & Image-Based Abuse
-
Lock down profiles and respond to harm.
-
Privacy settings, geotags, impersonation, takedown/report pathways.
-
Privacy sweep of a mock profile.
-
Social privacy checklist; reporting links.
​
Cloud & Shared Accounts Pitfalls
-
Close “silent” data leaks.
-
Shared albums/calendars, device backups, shared drives, home assistants.
-
Audit a cloud account.
-
Cloud safety checklist.
​
Smart-Home & IoT Safety
-
Regain control of connected devices.
-
Doorbells/cameras/locks/speakers resets, access removal, logs.
-
Factory-reset & safe recommission demo.
-
IoT reset cards.
​
Vehicle & Transport Risks
-
Understand tracking via cars and routines.
-
Vehicle risk checklist.
-
GPS trackers, OBD-II devices, app access, safe pickup/drop-off.
-
“Where trackers hide” exercise.
​
Home/Property Basics for Survivors
-
Quick wins at home while awaiting upgrades.
-
Locks, lighting, sightlines, safe-room setup, visitor handling.
-
Room-by-room plan.
-
Home safety checklist.
​
Evidence-Aware Documentation
-
Keep options open for legal steps.
-
Logs, screenshots, timelines, chain-of-custody basics.
-
Build a simple incident log.
-
Evidence notes template.
​
Children, Co-Parenting & Schools
-
Safer tech for kids amidst custody dynamics.
-
Location sharing on kids’ devices, school apps, handover safety.
-
Co-parenting comms plan.
-
Family tech rules one-pager; school liaison template.
​
Financial & Identity Safety Online
-
Reduce financial control and fraud risks.
-
Banking/email security, 2FA tokens, recovery phone control, scam red flags.
-
Lock down a “banking bundle.”
-
ID-security checklist.
​






Counter Surveillance
Sweeps to detect and remove hidden cameras, listening devices, GPS trackers, and digital spyware used for unauthorized monitoring. Our expert services ensure your home, vehicle, and personal technology remain secure, protecting your privacy and peace of mind.

Property Safety
Thorough evaluation of your home, business, or facility to identify potential security risks, vulnerabilities, and safety hazards. Our expert team provides tailored recommendations to enhance overall safety, prevent unauthorized access, and ensure a secure environment for occupants and assets.



