NRCDV Logo
  • Adult Children Exposed to Domestic Violence
  • Runaway & Homeless Youth Toolkit
  • Prevent Intimate Partner Violence
  • Violence Against Women Resource Library
  • Domestic Violence and Housing Technical Assistance Consortium
  • Domestic Violence Awareness Project
  • National Resource Center on Domestic Violence

img-user-picture.png

 Create an account to save and access your bookmarked materials anytime, anywhere.

  create account  |   login

An Online Resource Library on Domestic & Sexual Violence

Material Listing

Safe Start Centers Toolkit for Schools

Safe Start Centers Toolkit for Schools by the Safe Start Center (2012)

As the National Survey for Children Exposed to Violence has shown, children's exposure to home and community violence is prevalent in the U.S. Exposure to traumatic events is often unexpected and can leave educators with many uncertainties about what to do next. Faced with students struggling to cope and a community struggling to respond, schools need reliable information, practical tools, and pragmatic guidance.

Safety Tips For Using Computers & Cell Phones

This handout developed for survivors of domestic and sexual violence provides tips for the safer use of computers and cell phones. It reviews privacy settings, passwords, GPS tracking, and documentation.

How to Comply with the Children's Online Privacy Protection Rule

The Children's Online Privacy Protection Act, effective April 21, 2000, applies to the online collection of personal information from children under 13. This guide reviews the requirements for protecting children's privacy online and understanding the FTC's enforcement authority.

10 Tips for Wireless Home Network Security

This article provides recommendations for improving the security of your home wireless network, such as changing default administrator passwords, using encryption, changing the default SSID, and enabling firewalls on each computer and the router.

Online Privacy: Using the Internet Safely

This page reviews internet activities that reveal your personal information, how others can get information about your online privacy, and what to know about cloud computing.

High-Tech Stalking

Stalkers are increasingly misusing a variety of telephone, surveillance, and computer technologies to harass, terrify, intimidate, coerce, and monitor former and current intimate partners. Perpetrators are also misusing technology to stalk before, during, and after perpetrating sexual violence.

In Virtual Play, Sex Harassment Is All Too Real

The article reports, Sexism, racism, homophobia and general name-calling are longstanding facts of life in certain corners of online video games. But the Cross Assault episode was the first of a series this year that have exposed the severity of the harassment that many women experience in virtual gaming communities.

Tech Top 10 Tips: Social Media Use by Survivors

In recognition of the increasing role that social media plays in the lives of survivors as well as programs and staff, this tool addresses the benefits and risks of social media use by people who have experienced sexual and domestic violence.

Intimate Partner Violence, Technology, and Stalking

This research note describes the use of a broad range of technologies in intimate partner stalking, including cordless and cellular telephones, fax machines, e-mail, Internet-based harassment, global positioning systems, spy ware, video cameras, and online databases.

Hang Up on Harassment: Dealing with Cellular Phone Abuse

With cell phones now the primary way of communicating, harassing phone calls can be especially distressing and disruptive. This fact sheet offers steps that victims of harassing calls, text messages, or spam can take to increase safety.

Address Confidentiality Programs

Address Confidentiality Programs (ACPs) are programs administered by individual states enabling victims of domestic violence, and sometimes victims of sexual assault and/or stalking) to keep their current address hidden and use an alternate mailing address for a variety of public and official processes. The specific procedures and qualifications vary by state. The document below outlines the protections of various states' ACPs, the legislation that created or supports these ACPs and other relevant program information.

Computers and Networks

The ways in which agencies and innovative partnerships use their computers and networks impacts the safety and confidentiality of services for victims and survivors, and their children. This tip sheet briefly highlights: basics about how computers and networks work; how agencies and partnerships are or might use computers and networks; and, some benefits, risks and things to consider including issues of: technical support, essentials, training, disposal, cost, security, authorized access and user names, backups, and, security in colocated sites.

Myths & Realities of Identity Change

This 2 page handout addresses common issues for victims who are considering changing their identity (e.g. name, U.S. social security number, birth certificate, etc.) as part of an attempt to remain safe and hidden from an abuser or stalker. It dispels seven common myths by describing realities of what can happen after an identity change and by providing introductory tips on protecting your identity.

Online Privacy & Safety Tips

This 1-page handout provides tips for preventing sensitive and personal information from making its rounds on the Web. It highlights email, passwords, social networks, online accounts, and safe web browsing.

Selecting a Database

This page includes resources and information on how agencies can select the most secure and survivor-centered database for their program.

Sexting

This short tip sheet defines sexting, highlights different forms of sexting, and discusses how sexting is relevant to anti-violence agencies, partnerships and communities.