{"id":323,"date":"2026-02-04T11:13:21","date_gmt":"2026-02-04T16:13:21","guid":{"rendered":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/?post_type=chapter&#038;p=323"},"modified":"2026-04-21T09:37:05","modified_gmt":"2026-04-21T13:37:05","slug":"module-3a-identifying-tfgbv-carmen-naomi","status":"publish","type":"chapter","link":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/module-3a-identifying-tfgbv-carmen-naomi\/","title":{"raw":"Chapter 14: Identifying TFGBV in Client Care","rendered":"Chapter 14: Identifying TFGBV in Client Care"},"content":{"raw":"<p style=\"text-align: right\"><a id=\"quick-exit-btn\" href=\"https:\/\/google.ca\" title=\"Quick Exit\">EXIT SITE<\/a><\/p>\r\n\r\n<h1>Chapter 14: Identifying TFGBV in Client Care<\/h1>\r\nTechnology\u2011facilitated gender\u2011based violence (TFGBV) can be difficult to detect in service settings. Clients may not recognize digital abuse, may feel ashamed, or may fear losing support. Staff may overlook digital harm because it leaves no visible injuries. Identifying TFGBV requires noticing behavioural changes, shifts in communication, and inconsistencies in how clients describe their digital lives.\r\n\r\nIn this chapter we will review ways to identify TFGBV in care contexts. For more information on how to reocgnise subtle signs that someone may be experiencing TFGBV, you can read more in\u00a0<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/rec\/\">Chapter 11: Recognizing that TFGBV is Happening<\/a>.\r\n<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Learning Objectives<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul>\r\n \t<li>Understand your role as a service provider in facing TFGBV cases.<\/li>\r\n \t<li>Second<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<h3><!--StartFragment --><\/h3>\r\n<h2>Why Health and Frontline Care Staff Need This Training<\/h2>\r\nStaff benefit from reflecting on their own assumptions about \u201cdigital abuse\u201d in clinical or support environments. This helps them notice signs that might otherwise be dismissed.\r\n\r\nFrontline workers (such as healthcare providers, disability\u2011support staff, GBV workers, and law enforcement) are often the first people clients trust. Clients may disclose indirectly or show distress through behaviour rather than words. Because TFGBV is often hidden, staff must create safe, nonjudgmental spaces where clients feel comfortable sharing concerns.\r\n\r\nEarly intervention matters. Sensitive documentation, careful listening, and timely referral can prevent further harm and preserve evidence. Staff do not need to be technology experts; they need awareness, gentle inquiry, and clear referral pathways.\r\n<div class=\"textbox textbox--key-takeaways\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\" style=\"text-align: center\">Reflection<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n\r\nA useful starting point is to reflect on your own assumptions.\r\n\r\nWhat comes to mind when you hear the term digital abuse in a clinical or supportive environment? This reflection might help prepare staff to notice signs that might otherwise be dismissed\r\n\r\n<\/div>\r\n<\/div>\r\n<h2><strong>How TFGBV Appears in Service Environments<\/strong><\/h2>\r\nTFGBV can occur across many service settings, including healthcare facilities, disability services, shelters, home\u2011care agencies, and community programs. Technology is embedded in daily operations, such as appointment booking systems, caregiver apps, telehealth, communication platforms, digital records, and assistive devices. These tools can support care but can also be misused for surveillance or coercion. <span style=\"text-decoration: underline\"><strong>Common indicators include:<\/strong><\/span>\r\n<ul>\r\n \t<li>Repeated loss of device access<\/li>\r\n \t<li>Unexplained gaps in communication<\/li>\r\n \t<li>Sudden changes in online activity<\/li>\r\n \t<li>Anxiety around device use<\/li>\r\n \t<li>Inconsistencies in caregiver app logs<\/li>\r\n \t<li>Unusual device behaviour<\/li>\r\n \t<li>A caregiver or partner managing all digital communication<\/li>\r\n<\/ul>\r\n<div class=\"textbox textbox--examples\">\r\n<div class=\"textbox__content\">\r\n\r\n<strong>Example:<\/strong> A support worker notices that a client suddenly avoids using her phone and becomes tense whenever messages arrive. Her caregiver insists on answering questions for her and manages all her digital communication.\r\n\r\n<\/div>\r\n<\/div>\r\n<h3><span style=\"text-decoration: underline\"><strong>Digital tools within the service can also be misused:<\/strong><\/span><\/h3>\r\n<ul>\r\n \t<li>Falsified entries in caregiver or support apps<\/li>\r\n \t<li>Photos taken without consent<\/li>\r\n \t<li>Monitoring through clinic Wi\u2011Fi or waiting areas<\/li>\r\n<\/ul>\r\nObserving relational dynamics around technology is essential. Staff should <em><strong>consider the following questions:<\/strong><\/em>\r\n<ul>\r\n \t<li>Who holds or controls the device?<\/li>\r\n \t<li>Who answers questions?<\/li>\r\n \t<li>Who insists on being present during digital interactions?<\/li>\r\n \t<li>How might digital abuse be occurring within the systems and <strong>tools we use every day?<\/strong><\/li>\r\n<\/ul>\r\nThese questions may reveal power imbalances that place clients at risk.<!--EndFragment -->\r\n<div class=\"textbox textbox--examples\">\r\n<div class=\"textbox__content\">\r\n\r\n<strong>Example:<\/strong> A staff member uses his personal phone to contact a client and secretly edits her caregiver\u2011app logs to make her appear non\u2011compliant. He restricts her access to shared devices and stores photos of her without consent.\r\n\r\n<\/div>\r\n<\/div>\r\n\r\n<hr \/>\r\n\r\n<h2><strong>Organizational Factors Can Increase Risk of TFGBV<\/strong><\/h2>\r\nService environments can unintentionally create conditions that allow TFGBV to go unnoticed. Contributing factors include limited privacy, shared devices, rushed appointments, and unclear policies on device use or harassment.\r\n\r\nWomen with disabilities may face additional risks due to reduced privacy, lower digital literacy, and greater reliance on caregivers. Staff may also blur boundaries by using personal phones for client communication or storing client information on unsecured devices.\r\n\r\nPower imbalances matter. Clients who depend on staff or caregivers for mobility, communication, or daily living may feel unable to question digital decisions or raise concerns.\r\n\r\n<hr \/>\r\n\r\n<h2><strong>Recognizing TFGBV Across the Service Journey<\/strong><\/h2>\r\n<!--StartFragment -->\r\n\r\nTFGBV can appear at any stage of service interaction.\r\n\r\nAt <strong>client intake<\/strong>, it may resemble a client hesitating to share contact information, or requests for unusual communication arrangements.\r\n<div class=\"textbox textbox--examples\">\r\n<div class=\"textbox__content\">\r\n\r\n<strong>Example:<\/strong> During intake, a client named Rina asks the clinic to only contact her through her partner\u2019s email address and says she \u201cisn\u2019t allowed\u201d to receive texts directly. When staff try to confirm her phone number, her partner answers every question and insists all follow\u2011up messages should go through him.\r\n\r\n<\/div>\r\n<\/div>\r\nDuring <strong>appointments or meetings with clients<\/strong>, it may look like avoidance around discussing home life, relationships, or even technology use, or anxiety when devices ring or vibrate.\r\n\r\nIn can show up in <strong>follow-up calls and communication<\/strong> (often through phone calls or email) as messages going unanswered or being answer by someone else, or as sudden changes in communication patterns.\r\n\r\nDuring <strong>home care visits or community care settings<\/strong>, you might see that devices are frequently missing broken, or \"being fixed\", that family or caregivers are monitoring all digital interactions, or that there are high levels of restriction of device use.\r\n\r\nRecognizing TFGBV requires looking beyond isolated incidents and considering how systems, routines, or technologies might enable harm.<!--EndFragment -->\r\n\r\n<hr \/>\r\n\r\n<h2><strong>The Importance of Trauma\u2011Informed, Nonjudgmental Inquiry<\/strong><\/h2>\r\nClients may not have the language to describe digital abuse. They may feel ashamed, confused, or afraid of retaliation. Staff should use open\u2011ended questions, avoid assumptions, and ask privately about device safety and account control.\r\nTrust is essential. Clients are more likely to share concerns when they feel respected and believed. Confidentiality should be emphasized, and next steps explained clearly\r\n\r\n<hr \/>\r\n\r\n<h2><strong>Building a Culture of Awareness<\/strong><\/h2>\r\n<!--StartFragment -->\r\n\r\nRecognizing TFGBV is an organizational responsibility. Services need clear digital\u2011conduct policies, regular staff training, and safe reporting systems. When staff share a common understanding of TFGBV, they are better equipped to identify risks and respond appropriately.\r\n<div class=\"textbox textbox--key-takeaways\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\" style=\"text-align: center\">Reflect<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n\r\nWhat <strong>changes<\/strong> in your service environment would <strong>make it easier to recognize and respond to digital abuse<\/strong>?\r\n\r\n<\/div>\r\n<\/div>\r\n&nbsp;\r\n\r\n<!--StartFragment -->\r\n\r\n<!--EndFragment -->","rendered":"<p style=\"text-align: right\"><a id=\"quick-exit-btn\" href=\"https:\/\/google.ca\" title=\"Quick Exit\">EXIT SITE<\/a><\/p>\n<h1>Chapter 14: Identifying TFGBV in Client Care<\/h1>\n<p>Technology\u2011facilitated gender\u2011based violence (TFGBV) can be difficult to detect in service settings. Clients may not recognize digital abuse, may feel ashamed, or may fear losing support. Staff may overlook digital harm because it leaves no visible injuries. Identifying TFGBV requires noticing behavioural changes, shifts in communication, and inconsistencies in how clients describe their digital lives.<\/p>\n<p>In this chapter we will review ways to identify TFGBV in care contexts. For more information on how to reocgnise subtle signs that someone may be experiencing TFGBV, you can read more in\u00a0<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/rec\/\">Chapter 11: Recognizing that TFGBV is Happening<\/a>.<\/p>\n<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li>Understand your role as a service provider in facing TFGBV cases.<\/li>\n<li>Second<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<h3><!--StartFragment --><\/h3>\n<h2>Why Health and Frontline Care Staff Need This Training<\/h2>\n<p>Staff benefit from reflecting on their own assumptions about \u201cdigital abuse\u201d in clinical or support environments. This helps them notice signs that might otherwise be dismissed.<\/p>\n<p>Frontline workers (such as healthcare providers, disability\u2011support staff, GBV workers, and law enforcement) are often the first people clients trust. Clients may disclose indirectly or show distress through behaviour rather than words. Because TFGBV is often hidden, staff must create safe, nonjudgmental spaces where clients feel comfortable sharing concerns.<\/p>\n<p>Early intervention matters. Sensitive documentation, careful listening, and timely referral can prevent further harm and preserve evidence. Staff do not need to be technology experts; they need awareness, gentle inquiry, and clear referral pathways.<\/p>\n<div class=\"textbox textbox--key-takeaways\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\" style=\"text-align: center\">Reflection<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p>A useful starting point is to reflect on your own assumptions.<\/p>\n<p>What comes to mind when you hear the term digital abuse in a clinical or supportive environment? This reflection might help prepare staff to notice signs that might otherwise be dismissed<\/p>\n<\/div>\n<\/div>\n<h2><strong>How TFGBV Appears in Service Environments<\/strong><\/h2>\n<p>TFGBV can occur across many service settings, including healthcare facilities, disability services, shelters, home\u2011care agencies, and community programs. Technology is embedded in daily operations, such as appointment booking systems, caregiver apps, telehealth, communication platforms, digital records, and assistive devices. These tools can support care but can also be misused for surveillance or coercion. <span style=\"text-decoration: underline\"><strong>Common indicators include:<\/strong><\/span><\/p>\n<ul>\n<li>Repeated loss of device access<\/li>\n<li>Unexplained gaps in communication<\/li>\n<li>Sudden changes in online activity<\/li>\n<li>Anxiety around device use<\/li>\n<li>Inconsistencies in caregiver app logs<\/li>\n<li>Unusual device behaviour<\/li>\n<li>A caregiver or partner managing all digital communication<\/li>\n<\/ul>\n<div class=\"textbox textbox--examples\">\n<div class=\"textbox__content\">\n<p><strong>Example:<\/strong> A support worker notices that a client suddenly avoids using her phone and becomes tense whenever messages arrive. Her caregiver insists on answering questions for her and manages all her digital communication.<\/p>\n<\/div>\n<\/div>\n<h3><span style=\"text-decoration: underline\"><strong>Digital tools within the service can also be misused:<\/strong><\/span><\/h3>\n<ul>\n<li>Falsified entries in caregiver or support apps<\/li>\n<li>Photos taken without consent<\/li>\n<li>Monitoring through clinic Wi\u2011Fi or waiting areas<\/li>\n<\/ul>\n<p>Observing relational dynamics around technology is essential. Staff should <em><strong>consider the following questions:<\/strong><\/em><\/p>\n<ul>\n<li>Who holds or controls the device?<\/li>\n<li>Who answers questions?<\/li>\n<li>Who insists on being present during digital interactions?<\/li>\n<li>How might digital abuse be occurring within the systems and <strong>tools we use every day?<\/strong><\/li>\n<\/ul>\n<p>These questions may reveal power imbalances that place clients at risk.<!--EndFragment --><\/p>\n<div class=\"textbox textbox--examples\">\n<div class=\"textbox__content\">\n<p><strong>Example:<\/strong> A staff member uses his personal phone to contact a client and secretly edits her caregiver\u2011app logs to make her appear non\u2011compliant. He restricts her access to shared devices and stores photos of her without consent.<\/p>\n<\/div>\n<\/div>\n<hr \/>\n<h2><strong>Organizational Factors Can Increase Risk of TFGBV<\/strong><\/h2>\n<p>Service environments can unintentionally create conditions that allow TFGBV to go unnoticed. Contributing factors include limited privacy, shared devices, rushed appointments, and unclear policies on device use or harassment.<\/p>\n<p>Women with disabilities may face additional risks due to reduced privacy, lower digital literacy, and greater reliance on caregivers. Staff may also blur boundaries by using personal phones for client communication or storing client information on unsecured devices.<\/p>\n<p>Power imbalances matter. Clients who depend on staff or caregivers for mobility, communication, or daily living may feel unable to question digital decisions or raise concerns.<\/p>\n<hr \/>\n<h2><strong>Recognizing TFGBV Across the Service Journey<\/strong><\/h2>\n<p><!--StartFragment --><\/p>\n<p>TFGBV can appear at any stage of service interaction.<\/p>\n<p>At <strong>client intake<\/strong>, it may resemble a client hesitating to share contact information, or requests for unusual communication arrangements.<\/p>\n<div class=\"textbox textbox--examples\">\n<div class=\"textbox__content\">\n<p><strong>Example:<\/strong> During intake, a client named Rina asks the clinic to only contact her through her partner\u2019s email address and says she \u201cisn\u2019t allowed\u201d to receive texts directly. When staff try to confirm her phone number, her partner answers every question and insists all follow\u2011up messages should go through him.<\/p>\n<\/div>\n<\/div>\n<p>During <strong>appointments or meetings with clients<\/strong>, it may look like avoidance around discussing home life, relationships, or even technology use, or anxiety when devices ring or vibrate.<\/p>\n<p>In can show up in <strong>follow-up calls and communication<\/strong> (often through phone calls or email) as messages going unanswered or being answer by someone else, or as sudden changes in communication patterns.<\/p>\n<p>During <strong>home care visits or community care settings<\/strong>, you might see that devices are frequently missing broken, or &#8220;being fixed&#8221;, that family or caregivers are monitoring all digital interactions, or that there are high levels of restriction of device use.<\/p>\n<p>Recognizing TFGBV requires looking beyond isolated incidents and considering how systems, routines, or technologies might enable harm.<!--EndFragment --><\/p>\n<hr \/>\n<h2><strong>The Importance of Trauma\u2011Informed, Nonjudgmental Inquiry<\/strong><\/h2>\n<p>Clients may not have the language to describe digital abuse. They may feel ashamed, confused, or afraid of retaliation. Staff should use open\u2011ended questions, avoid assumptions, and ask privately about device safety and account control.<br \/>\nTrust is essential. Clients are more likely to share concerns when they feel respected and believed. Confidentiality should be emphasized, and next steps explained clearly<\/p>\n<hr \/>\n<h2><strong>Building a Culture of Awareness<\/strong><\/h2>\n<p><!--StartFragment --><\/p>\n<p>Recognizing TFGBV is an organizational responsibility. Services need clear digital\u2011conduct policies, regular staff training, and safe reporting systems. When staff share a common understanding of TFGBV, they are better equipped to identify risks and respond appropriately.<\/p>\n<div class=\"textbox textbox--key-takeaways\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\" style=\"text-align: center\">Reflect<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p>What <strong>changes<\/strong> in your service environment would <strong>make it easier to recognize and respond to digital abuse<\/strong>?<\/p>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p><!--StartFragment --><\/p>\n<p><!--EndFragment --><\/p>\n","protected":false},"author":554,"menu_order":1,"comment_status":"open","ping_status":"closed","template":"","meta":{"pb_show_title":"","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-323","chapter","type-chapter","status-publish","hentry"],"part":26,"_links":{"self":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/users\/554"}],"replies":[{"embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/comments?post=323"}],"version-history":[{"count":13,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/323\/revisions"}],"predecessor-version":[{"id":1041,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/323\/revisions\/1041"}],"part":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/parts\/26"}],"metadata":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/323\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/media?parent=323"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapter-type?post=323"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/contributor?post=323"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/license?post=323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}