Before asking a survivor to fill out any form that asks about safe methods of communication, you should first have a conversation with them. The ways that a survivor wants to communicate with your organization should match their needs. An organization should never contact a survivor in a way that the survivor has not specifically indicated is safe and private. When you talk with a survivor about how the organization can communicate with them, the focus should be on helping the survivor:

  • identify their goals
  • consider if/how having the organization contact the survivor meets those goals
  • consider current or future risks that may arise if the organization contacts the survivor in particular ways
  • consider alternative ways for the organization to contact the survivor (for example, the survivor could contact the organization again when they are ready, and in a safe and private location)

If the survivor does want the organization to contact them, then write down those preferences on an intake form or other place where an advocate working with the survivor can easily find that information. NOTE: What is safe or private for a survivor can change, so be sure to check back in regularly, or even each time, to make sure that contact methods are up to date and match the survivor’s wishes.

See this Safe Contact Intake Form template from the National Network to End Domestic Violence (NNEDV) in the United States

Step 1: Ask Questions and Provide Information

  • Begin this discussion with the reasons why the organization may want to follow up with the survivor (for example, with additional resources or information). Then help the survivor decide if they want to be contacted by the organization, or if the survivor wants to be the one to follow up. It should be clear to the survivor that they can choose whether and how to follow up.
  • If the survivor prefers to follow up with the organization, the organization can share a reasonable timeframe when the information or resource will be available. Let the survivor know how to reach someone within the organization safely and quickly.
  • If the survivor chooses to have the organization contact them, ask about the preferred ways to communicate. This might include phone, voicemail, text, email, postal mail, or other means. Offer the methods that your organization has the capacity to provide information in a way that increases survivor safety and privacy, and meets your confidentiality obligations.
  • Assess for potential safety or privacy risks. Ask: Do you have any concerns that anyone might be monitoring your phone or computer? Does anyone else regularly use your phone or computer who you wouldn’t want to see a message or call from us?

Step 2: Discuss Each of the Following:

  • If the survivor is worried about someone else having access to their phone, computer, or accounts, talk about common risks associated with different technologies. Learn more about information to share in the next section.
  • What information can be safely and privately shared in messages like voicemail, text, or email.
  • If there are any other conditions that would make communication safer or more private, for example, only during certain hours.
  • The survivor’s right to change the way they want to be contacted, or even to be contacted at all, at any time.

Step 3: Make Notes

  • Fill in the How to Contact Me form or make notes based on your discussions with this particular survivor (not based on standardized practice or habit).
  • Check back in regularly to ask about any changes to the ways a survivor wants to be contacted.

Talking Points for Common Risks

  • An abusive person can monitor your phone or computer use by looking at it when you’re not there, by accessing your accounts through another device, or by attaching hardware or installing software or an app that records everything you do on your phone or computer.
  • If you’re worried that someone is monitoring your phone or computer, we can talk about next steps, including changing passwords, security settings, or setting up new accounts.
  • Some steps may result in the loss of evidence of the abuse, or the abusive person might escalate their behaviour. We can make a plan before you take action to decrease or address those risks, and you can always decide not to take any action.
  • Other people (such as friends, family, coworkers) who share your pone or computer, even just once, might accidentally see messages, or information about calls or messages. We want to consider how we would contact you and what we would share when contacting you to try to increase your privacy as much as possible.
  • We can talk about other ways you can communicate safely and privately, including using someone else’s phone or a computer at a library, school, or community center.

You may also want to use this guide to Assessing for Technology Abuse with the survivor, to help determine how technology may be being misused.

Suggested Resources for Survivors

They may also want to browse through our Technology Safety and Privacy Toolkit for more information.

To support your development of safe tech use policies, WSC has developed a Use of Technology Policy Template Guide for Women’s Shelters and Transition Houses (PDF, in English only).

Technology-Facilitated Gender-Based Violence (TFGBV) is part of a continuum of violence that can be both online and in-person. If you or someone you know is experiencing TFGBV, you are not alone. You can use sheltersafe.ca to find a shelter/transition house near you to discuss options and create a safety plan. You don’t need to stay in a shelter to access free, confidential services and support.

Adapted for Canada with permission from BCSTH’s Technology Safety Project, based on their resource PEACE Organization Informed Consent for Digital Support Services Template.

Adapted for Canada with permission from NNEDV’s Safety Net project, based on their resource How to Talk with Survivors About Safe Methods of Contact.

Safety Check!

If you think someone is monitoring your devices, visit this website from a computer, tablet, or smartphone that isn’t being monitored.

EXIT NOW from this website and delete it from your browser history.

Exit Site