New Resources Help Programs Choose the Right Database

Victim service providers across the country are grappling with the same challenge – what kind of database will allow them to properly track records without compromising the privacy of survivors?

There isn’t a simple answer for this question. Choosing and implementing a safe and secure database is a complex process. Fortunately, we have created a series of resources to help programs choose and maintain a database that upholds confidentiality to the extent required by law and best practice.

The Safety Net Team and Confidentiality Institute have gathered information from many database companies that is specifically pertinent to privacy for domestic and sexual violence programs.  Standard questionnaires have been completed by the companies to allow programs to compare the database products side-by-side, and each company participated in a recorded webinar presentation that dives deeper into their policies and processes for securing data.

In addition, some new resources have been developed to help programs narrow down what they are looking for. The handout, “5 Characteristics of a Secure & Victim-Centered Database” explores the key elements to selecting a database that takes into account survivors’ privacy needs and the confidentiality obligations of programs.

You can access these resources by visiting Safety Net’s Selecting a Database section of our Agency’s Use of Technology Best Practices & Policies Toolkit.

For more information on confidentiality obligations, including various templates to use within partnerships, also visit www.nnedv.org/tools

Technology Summit 2014 Starts Today!

Today is the first day of our 2014 Technology Summit in beautiful San Jose, CA. We are so excited to welcome advocates, law enforcement, and attorneys from all over the country, Guam, Canada, and Australia! The morning opened with remarks from NNEDV president and CEO Kim Gandy and Santa Clara County Supervisor Cindy Chavez, and the day will continue with presentations on what service providers need to know when abusers misuse technology to abuse, stalk, and harass.

In our 15 years of working on this issue, the most important thing that we’ve learned is how critical it is for everyone to work together and be a part of this conversation. The collective knowledge, skills, and expertise of everyone are needed to address the multifaceted needs of survivors and move forward towards an end to violence.

We are so thrilled to have so many people dedicated to supporting victims of domestic and sexual violence and stalking join us. To all our attendees, and all the advocates and service providers working to help victims, thank you for what you do every day. You never know how many lives you’ve changed in your work. The work you do not only changes the lives of women and men you serve, but their children’s lives and their children’s lives. Thank you for getting up every day and doing this important work.

We are looking forward to 3 more days of expert trainings and information from all 27 of our amazingly brilliant presenters. Follow us on Twitter and Instagram, #techsummit14, to follow the conversation.

 

Cell Phone Location, Privacy and Intimate Partner Violence

The Domestic Violence Report recently published an article Safety Net wrote on cell phone location privacy and safety. This comprehensive article discusses how cell phone location is misused by abusers to stalk and monitor victims and tips on what victims can do. It explores the different ways cell phone location information can be revealed and concludes with proposed federal legislation on location privacy and best practices for app developers who want to collect location information through their apps.  Read the full article.

photo: Ron Wiecki

photo: Ron Wiecki

Meanwhile, here are a few safety tips on what to do if someone is misusing your cell phone location information as a tool to monitor or stalk you.  

1.      Safety first. If removing the tracking app or turning the phone off may be more dangerous, develop a safety plan regarding how to continue using the phone so that the abuser does not become suspicious. Simultaneously create a plan on how to communicate with others until the program can be removed completely or you’re able to get a new phone.

2.      Keep a log. Knowing the pattern of the abusive person’s behavior and what information they seem to know can help the survivor narrow down how the abuser is getting his or her information. Abusers can be creative and can find many ways to monitor and stalk a victim, often using more than one technology or method.

3.      Secure your phone. Become familiar with the security settings and put a lock code on the phone.

4.      Don’t install unknown apps or programs. Be careful not to install programs that are unknown, especially if the suggested app is from the abuser or mutual friends. Also, be aware of what permissions or access to data on your phone that the app requires before you download.

5.      Limit apps that are using your location. Know which applications are using your location and either limit its ability to use your location or delete the app, unless you are confident in what the purpose is and the extent of the sharing and access to your personal information.

6.      Use privacy settings. If a location program is already on the phone, the user should learn about its settings and features. Knowing what controls are available may allow for continued use while also maintaining privacy and control.

7.      Turn off phone. For short periods of time, a survivor can cut off communication from the phone by putting the phone on airplane mode or turning the phone off and taking out the battery. However, be aware that when the phone is turned back on, all communications will continue and location information may be shared again.

8.      Start fresh. When getting a new cell phone, don’t import everything from the old phone to the new one. Porting over all the data may inadvertently install the tracking application as well.

Want a more thorough safety plan? Download our Cell Phone & Location Safety Strategies handout.