Documenting Domestic Violence: Considerations When Recommending Tech Tools for Victims

Get full access to our extensive webinar library at a reduced rate! Sign up now for an individual subscription or invest in your team with agency subscriptions.
Current Status
Not Enrolled
Get Started

60 Minutes

Originally Aired
December 17, 2020

Sheri Kurdakul
Sheri Kurdakul
CEO, VictimsVoice

Technology has increasingly become a necessity for professionals, agencies, and organizations since the pandemic. The speed for which available tools come to market can cause confusion as to which ones should be recommended for victims and survivors to use. We will discuss vast considerations that should be vetted before a product or tool should be recommended. This course will explore the history and governance that oversee victim data, describe the technology types used, look at liabilities faced by the recommending entity, discuss the consequences of user experience, legal proceedings and how the information interacts with the case, and community access and inclusion.


Objectives of this course include the following:

  • Explore the four key areas of documentation-based tech tools: Evidence, Legal, Security, and Technology
  • Explain all of the information in terms and analogies that can be understood by any non-professional in any of the areas in the preceding bullet
  • Know the federal regulations and legal standards that must be followed and how they may apply to the technology
  • Understand how information moves from entry point to exit point
  • Identify the different levels of technology ownership
  • Examine the liabilities to ownership and or recommendation of the technology
  • Discuss the legal and moral responsibilities to users
  • Gain a basic understanding of how victim behavior can influence the interactions and outcomes of the different entry/access types
  • See how different prompts affect outcomes
  • Learn when, how, and to whom those different outcomes may be delivered
  • Know the responsibilities to divisions of justice including defense discovery and training
  • Examine evidentiary considerations
  • Learn the difference between technology and evidence authentication
  • Explore what constitutes substantive evidence
  • Understand the significance of Chain of Custody
  • Learn about peripheral evidence
  • Discuss what access means and how it can impact your ability to serve your community
  • Review your purpose to compare it with your ROI – Return On your Investment

With a paid registration or subscription, you are free to personally listen to this webinar, as many times as you wish. You may also excerpt or cite the material following accepted conventions. However, you may not allow other individuals to listen to this webinar without their own registration or subscription.

This content is for Individual – Monthly, Individual – Annual, Individual – Lifetime, Agency – Bronze (1-10 Users), Agency – Silver (11-25 Users), Agency – Gold (26-50 Users), Agency – Platinum (51-500 Users), and Lifetime Access – Documenting Domestic Violence: Considerations When Recommending Tech Tools for Victims members only.
Login Join Now