Show Me:

An Online Resource Library on Gender-Based Violence.

Privacy & Confidentiality Content Topic Results

The results displayed below have been grouped first by VAWnet Special Collections - containing our most highly valued resources - then by individual related materials. Refine your search by category, types, author and/or publisher using the options provided. Sort by date published, date added, or alphabetically. For assistance in locating a resource, use our online contact form.
Results displayed are grouped first by VAWnet Special Collections then by individual related materials. For assistance in locating a resource, use our online contact form.

Materials

Materials
  • General Material
July 2008

CPS: Closing the Distance Between Domestic Violence Advocacy and Child Protective Services

Author(s): Jennifer Inman
This article explains collaboration efforts between domestic violence agencies and CPS in Oregon. Additionally, it gives detailed observations from a first-person perspective and includes resources (including a report by Ellen Pence and Terri Taylor of Praxis International).
Materials
  • General Material
January 2008

Myths & Realities of Identity Change

This 2 page handout addresses common issues for victims who are considering changing their identity (e.g. name, U.S. social security number, birth certificate, etc.) as part of an attempt to remain safe and hidden from an abuser or stalker. It dispels seven common myths by describing realities of what can happen after an identity change and by providing introductory tips on protecting your identity.
Materials
  • General Material
January 2008

Technology Safety Planning with Survivors: Tips to discuss if someone you know is in danger

This handout provides some simple but critical tips about phone, computer, email, instant messaging and other technology use to discuss if someone you know is in danger. Available in English, Spanish, Chinese, Korean, Vietnamese, Somali, and Russian.
Materials
  • General Material
January 2008

Data Security Checklist to Increase Victim Safety & Privacy

For use by local domestic violence and rape crisis service programs and other community service providers, this checklist is a starting point in discussing client safety and data security for agencies. IMPORTANT NOTE: This checklist is not intended to replace intensive training. Please work with your State Domestic Violence and Sexual Assault Coalitions to increase your community's awareness of data security.
Materials
  • General Material
January 2008

Chart a Course: Policies that Affect Victim Services for Teens

This booklet is a guide on examining policies for working with teens who experience crime and abuse. It provides information about mandatory reporting, confidential communications, boundaries, and building partnerships with advocates and schools.
Materials
  • General Material
January 2008

Computers and Networks

The ways in which agencies and innovative partnerships use their computers and networks impacts the safety and confidentiality of services for victims and survivors, and their children. This tip sheet briefly highlights: basics about how computers and networks work; how agencies and partnerships are or might use computers and networks; and, some benefits, risks and things to consider including issues of: technical support, essentials, training, disposal, cost, security, authorized access and user names, backups, and, security in colocated sites.
Materials
  • General Material
January 2008

Tech Savvy Teens: Choosing Who Gets To See Your Info

This 2 page handout for teens and students discusses important choices they can make about who gets to access their personal information.
Materials
  • General Material
September 2007

Confidentiality: An Advocate's Guide

Author(s): Julie Kunce Field, Deb Goelman, Barbara Hart, Rebekah Lee, Sandra Murphy, Kim Tolhurst, Roberta Valente
Confidentiality and privilege are key to keeping battered women safe and represent the cornerstones of all successful advocacy and shelter programs. This guide is intended to familiarize advocates with a variety of laws, policies, requirements, and best practices on the topic of confidentiality.
Materials
  • General Material
August 2007

Intimate Partner Violence, Technology, and Stalking

Author(s): Cindy Southworth, Jerry Finn, Shawndell Dawson, Cynthia Fraser, Sarah Tucker
This research note describes the use of a broad range of technologies in intimate partner stalking, including cordless and cellular telephones, fax machines, e-mail, Internet-based harassment, global positioning systems, spy ware, video cameras, and online databases.
Materials
  • General Material
June 2007

Model Protocol on Confidentiality When Working with Battered Women

Author(s): Lupita Patterson, Christine Olah
This model protocol on confidentiality covers definitions, federal and state obligations, recommended policy and procedure, training, protecting confidentiality of immigrant and refugee women, and dealing with the media. It also contains sample forms for releases.
Materials
  • General Material
August 2006

Providing Counseling Online: Because We Can, Should We?

Author(s): Pamela K. S. Patrick
This article reviews common characteristics of many online counseling consumers, risks associated with online counseling, and ethical issues to consider when thinking about implementing online counseling practices.
Materials
  • General Material
June 2006

Secure File Deletion: Fact or Fiction?

Author(s): John R. Mallery
This document describes how information contained in deleted files on one's personal hard drive may be recoverable or found in other files. It describes methods for secure file deletion, including a list of resources for free and commercial tools.