NRCDV Logo
  • Adult Children Exposed to Domestic Violence
  • Runaway & Homeless Youth Toolkit
  • Prevent Intimate Partner Violence
  • Violence Against Women Resource Library
  • Domestic Violence and Housing Technical Assistance Consortium
  • Domestic Violence Awareness Project
  • National Resource Center on Domestic Violence

img-user-picture.png

 Create an account to save and access your bookmarked materials anytime, anywhere.

  create account  |   login

An Online Resource Library on Gender-Based Violence.

Privacy & Confidentiality Content Topic Results

The results displayed below have been grouped first by VAWnet Special Collections - containing our most highly valued resources - then by individual related materials. Refine your search by category, types, author and/or publisher using the options provided. Sort by date published, date added, or alphabetically. For assistance in locating a resource, use our online contact form.
Results displayed are grouped first by VAWnet Special Collections then by individual related materials. For assistance in locating a resource, use our online contact form.
total results: 103  | date published date added a-z

Materials

Materials
  • General Material
January 2008

Computers and Networks

Publisher(s):
The ways in which agencies and innovative partnerships use their computers and networks impacts the safety and confidentiality of services for victims and survivors, and their children. This tip sheet briefly highlights: basics about how computers and networks work; how agencies and partnerships are or might use computers and networks; and, some benefits, risks and things to consider including issues of: technical support, essentials, training, disposal, cost, security, authorized access and user names, backups, and, security in colocated sites.
Materials
  • General Material
January 2008

Tech Savvy Teens: Choosing Who Gets To See Your Info

Publisher(s):
This 2 page handout for teens and students discusses important choices they can make about who gets to access their personal information.
Materials
  • General Material
January 2008

Data Security Checklist to Increase Victim Safety & Privacy

Publisher(s):
For use by local domestic violence and rape crisis service programs and other community service providers, this checklist is a starting point in discussing client safety and data security for agencies. IMPORTANT NOTE: This checklist is not intended to replace intensive training. Please work with your State Domestic Violence and Sexual Assault Coalitions to increase your community's awareness of data security.
Materials
  • General Material
September 2007

Social Networking Sites: A Parent's Guide

Publisher(s):
This document offers tips to parents on how they can talk to their children about social networking sites and using these sites safely.
Materials
  • General Material
September 2007

Confidentiality: An Advocate's Guide

Author(s): Publisher(s):
Confidentiality and privilege are key to keeping battered women safe and represent the cornerstones of all successful advocacy and shelter programs. This guide is intended to familiarize advocates with a variety of laws, policies, requirements, and best practices on the topic of confidentiality.
Materials
  • General Material
August 2007

Intimate Partner Violence, Technology, and Stalking

Author(s): Publisher(s):
This research note describes the use of a broad range of technologies in intimate partner stalking, including cordless and cellular telephones, fax machines, e-mail, Internet-based harassment, global positioning systems, spy ware, video cameras, and online databases.
Materials
  • General Material
June 2007

Model Protocol on Confidentiality When Working with Battered Women

Author(s): Publisher(s):
This model protocol on confidentiality covers definitions, federal and state obligations, recommended policy and procedure, training, protecting confidentiality of immigrant and refugee women, and dealing with the media. It also contains sample forms for releases.
Materials
  • General Material
August 2006

Providing Counseling Online: Because We Can, Should We?

Author(s):
This article reviews common characteristics of many online counseling consumers, risks associated with online counseling, and ethical issues to consider when thinking about implementing online counseling practices.
Materials
  • General Material
June 2006

Secure File Deletion: Fact or Fiction?

Author(s): Publisher(s):
This document describes how information contained in deleted files on one's personal hard drive may be recoverable or found in other files. It describes methods for secure file deletion, including a list of resources for free and commercial tools.
Materials
  • General Material
November 2005

The Practical Aspects of Online Counseling: Ethics, Training, Technology, and Competency

Author(s): Publisher(s):
This article addresses the strengths and limitations of online counseling. It also offers information on present guidelines for when and who online counseling may be appropriate.
Materials
  • General Material
January 2005

2005 ACA Code of Ethics: Section A.12. Technology Applications (Page 6)

Publisher(s):
The Code establishes principles that define ethical behavior and best practices for ACA members. Section A.12. offers guidelines for the use of technology applications in counseling work re: benefits, limitations, access, informed consent, and web sites.
Materials
  • General Material
October 2004

Online Information Brokers and Your Privacy

Publisher(s):
This tip sheet includes steps to take to guard personal information from appearing in directory listings and public records. Includes a detailed listing of data vendors with complete contact information for each.