A Note on Language
In this toolkit, we will sometimes use the word woman/women and feminine pronouns for simplicity and to recognize the significant impact technology-facilitated violence has on women and girls. We recognize that TFGBV also impacts trans, non-binary, and Two-Spirit people. We hope that all people impacted by TFGBV will find these documents useful.
Despite the many ways technology enables us to communicate today, the fax machine is still used by many VAW shelters and transition houses. Although the basic use, of sending and receiving documents hasn’t changed much, how the technology works has evolved. Depending on the type of fax you use, the information you share could be vulnerable to interception or access by others. It is quite easy to accidentally access faxed communication if safety and privacy protocols aren’t in place.
Traditional Fax Machine: Traditional faxes use a phone line to send and receive information. Risks for this type of faxing depend on who picks up the fax at the receiving end. If you’re sending it to an office, your fax could be piling up along with all the other faxes they receive.
All‐In‐One Fax, Scanner, Copier Machine: Many fax machines are now multipurpose, with users able to send faxes as well as scan and print documents. These machines often have hard drives that retain a copy of every fax received, scanned, or printed. For this reason, if your shelter sells your fax/copier machine or the lease on it ends, it is important that you retain the hard drive and destroy it. Otherwise, all the sensitive documents you’ve ever received, printed, or scanned could be available to the new owner of your fax/copier machine simply by pulling them from the memory. Some machines have additional security and will wipe the hard drive regularly; check to see if this is an option on your fax machine but keep in mind that this may be an added expense.
E‐Fax: Another way to fax documents is through the Internet, without needing a fax machine at all. These services can send faxes to and from any device that has Internet access, such as your smartphone, tablet, laptop, or computer. If sent to a device other than an actual fax machine, the information will come in the form of an email. Documents that are received via email can be vulnerable to access, either by anyone who has access to that account or by interception. Moreover, unless you delete the email and attachments from your inbox, deleted folder, server, and backups, you could retain that information or document longer than you want.
Survivor Risks and Vulnerabilities
Faxes are often used when agencies want to transmit documentation for or on behalf of survivors. This documentation can contain sensitive or personal information; if intercepted or accessed, it could violate the survivor’s privacy. Moreover, be aware that even the fax number could reveal a survivor’s location, creating an increased safety risk.
Best Practices for Faxing
- Talk to survivors about the possible risks of using fax services and safety plan accordingly. They should be aware that it may be possible for someone to trace the original fax number and locate them. Be cautious about using public faxes or faxing services available at stores if sending sensitive information. That information may be stored in the hard drive of the machine.
- If you are forwarding a fax message to another organization, make sure that any identifying information (usually located at the top) is removed from the original fax.
- Before you send a fax, call to make sure that the person the fax is intended for will be there to pick it up.
- If leasing a machine, negotiate the contract to ensure that your organization can keep the hard drive at the end of the lease period to maintain control over the data. Alternatively, ask for a machine with additional security options, such as passcode access to a hard drive that periodically purges data.
- If you donate, sell, or end the lease of your fax machine, take out the hard drive or work with your vendor to shred the information storage device within the machine so the next owner doesn’t have access to your information.
- If you are sharing a fax machine with other organizations, the machine should be in a secure area with a strict policy on access and usage. Consider using personal passcodes to access faxed and printed documents. Support workers and organizations that have strong confidentiality obligations should not share a fax machine with other organizations that may have weaker confidentiality privileges or obligations. Have retention policies around emails so that faxed communications that are received via email aren’t kept longer than intended. Check with your provincial or territorial privacy laws to verify how long your organization can keep personal information.
- When using e‐faxing services, you may need to check with the receiver of the information to make sure all pages were transmitted. Unlike a traditional fax machine, e‐ faxing does not track and record each page sent. Because of various transmission practices, it is possible the fax is not received instantaneously.
- Fax services (e.g. E‐Fax, MyFax) often keep logs and records of documents and corresponding information sent and received. It is important to carefully read the privacy, retention, and access policies of the service provider so that you understand the limits of their protections.
To support your development of safe tech use policies, WSC has developed a Use of Technology Policy Template Guide for Women’s Shelters and Transition Houses (PDF, in English only).
Technology-Facilitated Gender-Based Violence (TFGBV) is part of a continuum of violence that can be both online and in-person. If you or someone you know is experiencing TFGBV, you are not alone. You can use sheltersafe.ca to find a shelter/transition house near you to discuss options and create a safety plan. You don’t need to stay in a shelter to access free, confidential services and support.
Adapted for Canada with permission from NNEDV’s Safety Net project, based on their resource Best Practices When Using Mobile Devices for Advocacy