Sitemap
Pages
Toolkit Pages
- #WHATSMYNAME: Tips for Staying Safe While Using Rideshare Apps
- 10 Easy Steps to Maximize Tech Use Privacy
- 6 Tips for Securing Your Online Financial Information
- A Guide for Anti-Violence Organizations
- A Survivor’s Guide to Location Tracking
- Accessibility of Documents
- Accessibility of Web Sites
- Accessibility Tips: Considerations For Shared Computer Workstations in Shelters and Transition Houses
- An Introduction to the Preserving Digital Evidence Toolkit
- An Overview of Canadian Courts
- An Overview of Legal Representation
- Android Privacy and Security Guide
- Assessing for Technology Abuse: Tips for Anti-Violence Workers
- Assistive Technology Considerations for Shelter Workers when Creating Safety Plans
- Authentication of Digital Evidence
- Being Web Wise
- Best Practices for Faxes
- Best Practices for Phone Communications
- Choosing and Using Safety Apps Designed for Women Experiencing Violence
- Coerced Debt: What It Is and How to Protect Yourself
- Common Types of Assistive Technology
- Connected Cars and Driverless Vehicles: Safety and Privacy Concerns
- Connected Health and Medical Devices: Survivor Privacy, Risks, and Strategies
- Conversation Guide: Harassing and Threatening Messages
- Conversation Guide: Harassing and Threatening Messages on Social Media
- Conversation Guide: Location Tracking
- Conversation Guide: Securing Online Bank Accounts
- Conversation Guide: Securing Personal Information Online
- Conversation Starters for Tech Safety Planning
- Database Considerations for Canadian Anti-Violence Organizations
- Dealing with Harassing Calls, Texts, and Messages
- Dealing with Harassing Calls, Texts, and Messages
- Definitions of Legal Terms: Civil and Family Law
- Definitions of Legal Terms: Criminal Law
- Designing Websites to Increase Survivor Safety and Privacy
- Digital Breakup Checklist: Online Safety After Separation
- Digital Financial Abuse and Phishing Scam Resources
- Digital Financial Abuse: Safety Planning Tips for Anti-Violence Workers
- Documenting Tech Abuse
- Exterior Video Surveillance: Minimizing Harm
- Funding Options and Assistive Technology Resources
- Having a Safe Online Presence After Leaving Your Community
- Help! My Ex is Harassing Me Online
- Help! My Partner is Threatening Me
- Home Automation: Privacy Risks and Strategies
- How to Speak with Survivors about Safe Methods of Contact
- Image-Based Abuse and the Non-Consensual Distribution of Intimate Images
- Informed Consent for Digital Support Services: Anti-Violence Organization Template
- Interior Video Surveillance Considerations
- Internet Browser Privacy Tips: In-Browser Settings
- iPhone Privacy and Security Guide
- Is Digital Financial Abuse Happening to You?
- Is Tech Abuse Happening to You?
- Legal and Victim Service Supports and Resources
- Legal Options and Remedies for Teens Experiencing Digital Dating Violence
- Legal Protections for TFGBV: What Laws Apply to You?
- Legal Remedies for Image-Based Abuse
- Legal Remedies for Online Harassment, Stalking, Spying, and Threats
- Mobile Phone Use: A Guide for Anti-Violence Organizations
- Mobile Spyware: Identification, Removal and Prevention
- Objections to Evidence
- Online Chat and Messaging: A Guide for Anti-Violence Organizations
- Online Dating: Privacy Risks and Strategies
- Online Gaming: Privacy Risks and Strategies
- Online Gaming: Privacy Risks and Strategies
- Online Misogyny and Abuse
- Online Privacy and Safety Tips
- Online Support Groups for Survivors: A Guide for Anti-Violence Organizations
- Overview of the Internet of Things and Connected Devices
- Passwords: Increasing Organizational Security
- Passwords: Simple Ways to Increase Your Security
- Peace Bonds and Protection Orders for Victims of TFGBV
- Phone Communications: A Guide for Anti-Violence Organizations
- Phone Stalkerware and Safety Guide
- Preserving and Storing Evidence of TFGBV: Best Practices
- Preserving Audio Recordings as Digital Evidence
- Preserving Digital Evidence Example: Online Harassment
- Preserving Digital Evidence Example: Sexual Images Shared Online
- Preserving Digital Evidence via Screenshot
- Preserving Digital Evidence via Video Screen Recording
- Preserving Digital Evidence: Considerations for Anti-Violence Workers
- Preserving Emails as Digital Evidence
- Preserving Evidence of Teen Digital Dating Violence
- Preserving Video Recordings as Digital Evidence
- Preserving Websites as Digital Evidence
- Preventing Harassment and Threats through Interac E-Transfers
- Privacy Considerations When Posting Content Online
- Resetting Your Wi-Fi Network
- Safeguarding Against Digital Financial Abuse When Opening a New Bank Account
- Safely Setting Up and Activating a Phone or Other Devices
- Safety & Privacy: Tips for Anti-Violence Organizations
- Safety Considerations for Preserving Digital Evidence
- Security Tips for Computers and Laptops
- Seeking Help Online: Safety and Privacy Considerations for Survivors
- Shared Computers & Internet Access: Best Practices for Privacy & Security
- Smart Toys and Location Tracking: Privacy and Safety Concerns with Children and Pets
- Social Media Policy Guidelines for Anti-Violence Organizations
- Social Media Safety and Privacy Tips
- Social Networking Safety for Teens
- Spyware and Stalkerware: Computer Surveillance and Safety
- Stalking and Technology-Facilitated Abuse Log
- Submitting Evidence in Court
- Supporting Indigenous Teens through Digital Dating Violence
- Supporting Teens through Digital Dating Violence
- Survivors’ Guide to Phones: Increasing Privacy and Responding to Abuse
- Tech Safety Planning Checklist
- Tech Safety Planning Conversation Starters for Anti-Violence Workers Supporting Indigenous Survivors
- Tech Safety Planning Tips for Indigenous Survivors Leaving a Community
- Technology Safety and Victim/Survivor Resources
- Technology Safety for Anti-Violence Organizations
- Technology Safety Plan Tip Sheet for Survivors
- The 4 Core Principles of Tech Safety Planning
- The Private Use Exception Rule and the Sharing of Intimate Images
- The Private Use Exception Rule and the Sharing of Intimate Images
- Tips for a Secure Email Account
- Tips for Using Video Sharing and Hosting Sites
- Understanding Teens and Technology: Safety, Privacy, and Empowerment
- Using Email: A Guide for Anti-Violence Organizations
- Using Technology Safely in Dating Relationships
- Using Technology Safely in Dating Relationships
- Utilities and Digital Financial Abuse
- Video Camera Use in Anti-Violence Organizations
- Video Communication: A Guide for Anti-Violence Organizations
- What is Technology-Facilitated Gender-Based Violence?
- What Is Teen Dating Violence?
- What Is Teen Dating Violence? For Adults Supporting Teens
- What Is Teen Digital Dating Violence?
- What Is Teen Digital Dating Violence? For Adults Supporting Teens
- What to Do If Someone Has Shared or Threatened to Share Your Intimate Image
- What to Do if You’re a Victim of Financial Fraud
- What to Do if Your Partner Threatens Suicide
Toolkits
- Digital Assistive Technology Toolkit
- Digital Financial Abuse Toolkit
- Legal Remedies for Technology-Facilitated Gender-Based Violence Toolkit
- Navigating Tech Abuse: Conversation Guides for Rural, Remote, Northern and Indigenous Shelter Workers
- Organizational Use of Technology Best Practices and Policy Toolkit
- Preserving Digital Evidence Toolkit
- Supporting Teens’ Experiences of Digital Dating Violence
- Tech Safety Planning Toolkit
- Teen Digital Dating Violence Toolkit
- The Technology Safety and Privacy Toolkit
