Documenting Domestic Violence: Considerations When Recommending Tech Tools for Victims

Current Status
Not Enrolled
Price
USD$49
Get Started
or

Duration
60 Minutes

Originally Aired
December 17, 2020

Sheri Kurdakul
Sheri Kurdakul
CEO, VictimsVoice

Technology has increasingly become a necessity for professionals, agencies, and organizations since the pandemic. The speed for which available tools come to market can cause confusion as to which ones should be recommended for victims and survivors to use. We will discuss vast considerations that should be vetted before a product or tool should be recommended. This course will explore the history and governance that oversee victim data, describe the technology types used, look at liabilities faced by the recommending entity, discuss the consequences of user experience, legal proceedings and how the information interacts with the case, and community access and inclusion.

Objectives

Objectives of this course include the following:

  • Explore the four key areas of documentation-based tech tools: Evidence, Legal, Security, and Technology
  • Explain all of the information in terms and analogies that can be understood by any non-professional in any of the areas in the preceding bullet
  • Know the federal regulations and legal standards that must be followed and how they may apply to the technology
  • Understand how information moves from entry point to exit point
  • Identify the different levels of technology ownership
  • Examine the liabilities to ownership and or recommendation of the technology
  • Discuss the legal and moral responsibilities to users
  • Gain a basic understanding of how victim behavior can influence the interactions and outcomes of the different entry/access types
  • See how different prompts affect outcomes
  • Learn when, how, and to whom those different outcomes may be delivered
  • Know the responsibilities to divisions of justice including defense discovery and training
  • Examine evidentiary considerations
  • Learn the difference between technology and evidence authentication
  • Explore what constitutes substantive evidence
  • Understand the significance of Chain of Custody
  • Learn about peripheral evidence
  • Discuss what access means and how it can impact your ability to serve your community
  • Review your purpose to compare it with your ROI – Return On your Investment

CONTINUING EDUCATION (NURSES ONLY)

EVAWI is approved by the California Board of Registered Nursing to provide Continuing Education contact hours for nurses (Provider #15641). 

Registered Nurses may purchase 1 contact hour after completing this webinar.


Intellectual Property Rights

Unless otherwise indicated, the content of this webinar is owned or controlled by End Violence Against Women International (EVAWI), and protected by various intellectual property rights and unfair competition laws of the United States, foreign jurisdictions, and international conventions. With a paid registration or subscription, you are free to personally listen to this webinar, as many times as you wish. You may also excerpt or cite the material following accepted conventions. However, you may not allow other individuals to listen to this webinar without a registration or subscription.