{"id":325,"date":"2026-02-04T11:14:01","date_gmt":"2026-02-04T16:14:01","guid":{"rendered":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/?post_type=chapter&#038;p=325"},"modified":"2026-04-21T09:33:38","modified_gmt":"2026-04-21T13:33:38","slug":"module-3b-responding-to-tfgbv-nasha-evie","status":"publish","type":"chapter","link":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/module-3b-responding-to-tfgbv-nasha-evie\/","title":{"raw":"Chapter 15: Responding to TFGBV With Clients","rendered":"Chapter 15: Responding to TFGBV With Clients"},"content":{"raw":"<p style=\"text-align: right\"><a id=\"quick-exit-btn\" href=\"https:\/\/google.ca\" title=\"Quick Exit\">EXIT SITE<\/a><\/p>\r\n\r\n<h1>Chapter 15: Responding to TFGBV as Frontline Service Providers<\/h1>\r\nIn this chapter, we want to <strong>equip frontline service providers<\/strong> with a <strong>trauma\u2011 and disability\u2011informed approach<\/strong> to TFGBV, using a survivor centered approach. It centers an applied case, practical frameworks, and ready\u2011to\u2011use tools for assessment, documentation, immediate safety, and referral.\r\n<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Learning Objectives<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul>\r\n \t<li>Learn foundational principles of GBV responses and survivor-centered care.<\/li>\r\n \t<li>Apply the <strong>Ask\u2013Validate\u2013Document\u2013Refer<\/strong> framework in digital abuse disclosures, centering survivors throughout.<\/li>\r\n \t<li>Identify local and organizational referral pathways for survivors of digital abuse.<\/li>\r\n \t<li>Integrate emotional support while preserving survivor autonomy and safety.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<!--StartFragment -->\r\n\r\n<hr \/>\r\n\r\n<h1>Foundational Principles for Safe Responses<\/h1>\r\nIn your approaches to client disclosures of TFGBV there are several general considerations that you need to make regarding how to proceed in ways which are empowering to the survivor.\r\n\r\nIn general, following <strong>Gender-Based Violence (GBV) guiding principles<\/strong> (keeping standards of safety, confidentiality, respect, and non-discrimination) and a <strong>survivor-centered approach<\/strong> (ensuring that survivors' experiences and wishes are central and essential to guiding decisions and actions) are vital to best practices.\r\n<h3><strong>Gender-Based Violence (GBV) guiding principles are as follows:<\/strong><\/h3>\r\n<ul>\r\n \t<li><strong>Safety-based approach. <\/strong>Attending to both immediate, short-term, and long-term physical, emotional, mental, and digital risks.<\/li>\r\n \t<li><strong>Confidentiality. <\/strong>Give the survivor control over what is shared and when. Women with disabilities are frequently stripped of autonomy due to societal and structural barriers, and it is essential that service providers do not continue to do this. However, there are some limits to confidentiality, and service providers should inform survivors of this.<\/li>\r\n \t<li><strong>Respect.<\/strong> Respect the choices and dignity of all people who you serve, by including them, respecting their identity and experiences, and approaching with openness.<\/li>\r\n \t<li><strong>Non-discrimination. <\/strong>All actions should be informed with approaches that acknowledge the many parts of a person and survivor. Gender, race, disability, sexual orientation, religious affiliation and any other identifiers should be respected and approached without bias.<\/li>\r\n<\/ul>\r\nTo <strong>learn more about GBV Principles<\/strong>, you can go to the resource from the UNFPA, which is <strong><a href=\"https:\/\/gbvaor.net\/sites\/default\/files\/2019-11\/19-200%20Minimun%20Standards%20Report%20ENGLISH-Nov%201.FINAL_.pdf\">linked here.<\/a><\/strong>\r\n<h3>Core parts of a survivor-centered approach to GBV also include:<\/h3>\r\n<ul>\r\n \t<li><strong>Trustworthiness. <\/strong>Be transparent about limits of confidentiality and next steps. Disability and gender-based stigma experienced in many societal spheres can create atmospheres of distrust and fear.<\/li>\r\n \t<li><strong style=\"text-align: initial;font-size: 1em\">Collaboration<\/strong><span style=\"text-align: initial;font-size: 1em\">. Aim to co\u2011create safety plans and referrals with your clients. Nothing should occur without survivors' consultation and involvement, except in extreme circumstances.<\/span><\/li>\r\n \t<li><strong>Empowerment<\/strong>. Support digital autonomy and reduce shame around experiences. You can do this by providing resources around digital literacy and digital safety that are accessible, and facilitating teaching digital safety in ways that support self-sufficiency.<\/li>\r\n<\/ul>\r\n<div class=\"textbox textbox--key-takeaways\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\" style=\"text-align: center\">Reflect<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ol>\r\n \t<li><strong>What barriers in your context<\/strong> (healthcare, GBV support, advocacy, disability rights, et cetera) can you foresee in applying these principles?<\/li>\r\n \t<li>How might you plan to overcome or circumvent these barriers?<\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n\r\n<hr \/>\r\n\r\n<h1>Using an Ask\u2013Validate\u2013Document\u2013Refer framework<\/h1>\r\nThis framework provides a simple, structured way to respond to TFGBV disclosures.\r\n<h4><span style=\"background-color: #ccffff\"><strong>Ask (permission first):<\/strong><\/span> Ask about TFGBV.<\/h4>\r\nAsk permission to discuss, and then about the TFGBV. Ask about frequency, content, sender identity, platforms used, whether images were shared, and whether the perpetrator has offline access to locations or contacts.\r\n<ul>\r\n \t<li><strong>Try phrases like:<\/strong> \u201cMay I ask some questions about what happened and how it\u2019s affecting you? You can stop at any time.\u201d<\/li>\r\n<\/ul>\r\n<h4><span style=\"background-color: #ccffcc\"><strong>Validate:<\/strong><\/span> Validate the experience.<\/h4>\r\n<ul>\r\n \t<li>Avoid blame or minimising language; do not pressure immediate reporting unless there is an emergency situation.<\/li>\r\n \t<li><strong>Try phrases like:<\/strong> \u201cThat sounds frightening\u201d; or, \u201cYou did the right thing telling me.\u201d<\/li>\r\n<\/ul>\r\n<h4><span style=\"background-color: #ffff99\"><strong>Document (with consent):<\/strong><\/span> Record evidence.<\/h4>\r\n<ul>\r\n \t<li>Record <strong>verbatim<\/strong> statements, dates, times, platforms, and witnesses. Note whether the client consents to evidence collection and sharing. Use the documentation template below.<\/li>\r\n<\/ul>\r\n<h4><span style=\"background-color: #ffcc99\"><strong>Refer:<\/strong><\/span> Refer to services.<\/h4>\r\n<ul>\r\n \t<li>Offer options that you are able to directly refer them to, such as legal advice, digital forensics, police follow\u2011up, psychosocial counselling, medical appointments, shelter services, and peer support. Let the survivor choose which referrals to accept and when.<\/li>\r\n<\/ul>\r\nThe AVDR framework ensures that responses remain structured, supportive, and aligned with the survivor\u2019s needs.\r\n\r\nDeveloping an AVDR framework requires an organisation or institution has a base of <strong>knowledge around locally available facilities and services<\/strong>. If this is not yet in place, we deeply encourage a review of your internal policies and services. For reference, we have compiled a list of resources and services in South Africa, which may be useful to you, which is <a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/front-matter\/support-and-resources-page\/\">linked on our Support and Resources Page<\/a>.\r\n<h2>Communication with Clients Around TFGBV<\/h2>\r\nClear, respectful language supports safety and trust during difficult conversations. Example of possible scripts to use through the service delivery and reporting or response process include:\r\n<ul>\r\n \t<li>\u201cI\u2019d like to write down what you\u2019ve shared so we can support you appropriately. Is that okay?\u201d<\/li>\r\n \t<li>\u201cIf there is an immediate risk to your safety, I may need to involve others. I will tell you before I do that.\u201d<\/li>\r\n \t<li>\u201cI can connect you with legal support, a forensic specialist, or a counsellor. What would you prefer at this stage?\u201d<\/li>\r\n<\/ul>\r\n\r\n<hr \/>\r\n\r\n<h1>Incident Report Flow Charts<\/h1>\r\n<!--StartFragment -->\r\n\r\nAn incident\u2011report flow chart helps frontline workers know exactly what to do when TFGBV is suspected or disclosed, and to progress through the AVDR stages. Because digital abuse can escalate quickly and survivors may share information gradually or under pressure, staff need a clear sequence of steps that guides their actions from first concern to final follow\u2011up.\r\n\r\nThe flow chart provides this structure by outlining who to notify, what safety checks to complete, how to document the incident, and when emergency procedures must be activated.\r\n\r\nThese types of incidence reporting flow structures are common for many organizations, but they do not always follow survivor-led or GBV principles\r\n\r\nEach organisation should adapt the details to its own staffing and legal requirements to support a safe, coordinated, and trauma\u2011informed response to TFGBV.\r\n\r\nWe have provided a sample incident report flow chart, which should be updated to include roles, responsibilities, and organisation-specific practices to accompany each step.\r\n\r\nThe typical <span style=\"text-decoration: underline\"><strong>sample incident report flow chart<\/strong><\/span> is as follows:\r\n\r\n<!--EndFragment -->\r\n\r\n[caption id=\"attachment_862\" align=\"aligncenter\" width=\"700\"]<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/module-3b-responding-to-tfgbv-nasha-evie\/immediate-safety-actions-digital-3\/\" rel=\"attachment wp-att-862\"><img src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Immediate-safety-actions-digital-3-e1773165104852.png\" alt=\"\" width=\"700\" height=\"480\" class=\"wp-image-862\" \/><\/a> This is a typical flow diagram of incident responses to GBV. In this case, we can see that a lot occurs outside of the control of the survivor. Decisions are predetermined based on a care provider's perception of a situation, without discussing them with the survivor.[\/caption]\r\n<h3 style=\"text-align: center\">What should we do instead?<\/h3>\r\nTo help guide the development of your own responses, we have added survivor-centered processes to the sample flowchart. You can view these changes in the diagram below:\r\n\r\n[h5p id=\"30\"]\r\n\r\n<hr \/>\r\n\r\n<h2>Practical risk assessment and intake checklists<\/h2>\r\nAfter initial disclosure, providers must assess risk across both clinical and digital domains. This assessment guides immediate safety actions and determines which referrals are most urgent.\r\n<ul>\r\n \t<li><strong>Clinical risks<\/strong> may include threats of physical harm, suicidal ideation, lack of safe housing, or limited social support.<\/li>\r\n \t<li><strong>Digital risks<\/strong> may include device or account access by the perpetrator, spyware, image\u2011based abuse, doxxing, location tracking, online harassment, or other forms of TFGBV.<\/li>\r\n<\/ul>\r\nAccording to your service or institutional scope, you may also want to develop a combined intake checklist that flags:\r\n\r\n<!--StartFragment -->\r\n<ul>\r\n \t<li><a href=\"#Immediate danger\">Immediate danger<\/a> (requires emergency services)<\/li>\r\n \t<li>High digital risk (requires digital\u2011forensics referral)<\/li>\r\n \t<li>Psychosocial needs (requires counselling or support services)<\/li>\r\n<\/ul>\r\n<strong><a id=\"Immediate danger\"><\/a>Immediate danger<\/strong> that require calls for emergency or immediate reporting can include the following...\r\n\r\n<!--StartFragment -->\r\n<ul>\r\n \t<li><strong>Threats of physical or sexual violence<\/strong> delivered through digital means, especially when they include location details, stalking patterns, or timelines.<\/li>\r\n \t<li><strong>Real\u2011time stalking or tracking<\/strong>, such as live GPS monitoring, forced location sharing, or evidence that someone is on their way to the victim's physical location.<\/li>\r\n \t<li><strong>Compromised safety-critical accounts<\/strong>, like access to home security systems, medical devices, financial accounts, or communication channels the person relies on for safety.<\/li>\r\n \t<li><strong>Non\u2011consensual intimate image release<\/strong> that is happening now or is being used to coerce immediate compliance.<\/li>\r\n \t<li><strong>Escalating harassment<\/strong> that shows clear intent to harm or that coincides with in\u2011person threats or breaches of physical boundaries.<\/li>\r\n \t<li><strong>Digital abuse <\/strong>that prevents someone from calling for help, accessing medication, contacting support, or finding a safe shelter.<\/li>\r\n<\/ul>\r\nAs a service provider, you must be transparent about your role's mandatory reporting obligations and any limits to confidentiality at the beginning of conversations.\r\n\r\n<!--EndFragment -->\r\n<h2><strong>Immediate Digital Safety Strategies <\/strong><\/h2>\r\n<!--EndFragment -->\r\n\r\nOnce risks are identified, providers may support immediate digital safety steps. These actions must be taken carefully, especially when device monitoring is suspected. <span style=\"text-decoration: underline\"><strong>Immediate safety strategies<\/strong><\/span> (with informed consent) include:\r\n<ul>\r\n \t<li>Change passwords from a trusted device not accessible to the perpetrator.<\/li>\r\n \t<li>Enable two\u2011factor authentication on critical accounts.<\/li>\r\n \t<li>Turn off location sharing and make social accounts private.<\/li>\r\n \t<li>Preserve evidence (screenshots, message headers, timestamps).<\/li>\r\n \t<li>Use a temporary \u201csafe device\u201d if monitoring is suspected.<\/li>\r\n \t<li>Avoid deleting messages until a forensic specialist advises.<\/li>\r\n<\/ul>\r\n<div class=\"textbox 1\">\r\n<h2><em><strong><span style=\"background-color: #ffff00\">Safety Note:<\/span> <\/strong><\/em><\/h2>\r\nChanging any typical digital behaviour (changing passwords, logging out of or deleting accounts, turning off location, uninstalling apps) may alert an abuser. Ensure that the survivor has a safe shelter before making changes, and opt to use different devices and accounts other than the accounts which are accessible to the abuser.\r\n\r\n<\/div>\r\n<div class=\"textbox textbox--key-takeaways\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\" style=\"text-align: center\">Reflect<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n\r\nConsider the risks of altering device settings when a client\u2019s device may be monitored, and <strong>identify strategies<\/strong> to reduce those risks.\r\n\r\n<\/div>\r\n<\/div>\r\n\r\n<hr \/>\r\n\r\n<h1>Documentation Standards<\/h1>\r\n<!--StartFragment -->\r\n\r\nAccurate, secure documentation is essential for safety planning, continuity of care, organisational accountability, and potential legal supports. <span style=\"text-decoration: underline\"><strong>Documentation should include:<\/strong><\/span>\r\n<ul>\r\n \t<li>Date, time, and setting of the disclosure<\/li>\r\n \t<li>all individuals present<\/li>\r\n \t<li>Client\u2019s statements (verbatim)<\/li>\r\n \t<li>Observed behaviour and communication needs<\/li>\r\n \t<li>Evidence collected and consent status<\/li>\r\n \t<li>Referrals made and agreed next steps<\/li>\r\n<\/ul>\r\nRecords must be stored securely with restricted access and clear data retention and deletion policies.\r\n\r\n<!--EndFragment -->\r\n\r\n<hr \/>\r\n\r\n<h1>Accessibility and power dynamics<\/h1>\r\nWhen TFGBV intersects with disability, its experience and safe response may be impacted by factors such as caregiving relationships, and communication barriers. Providers must ensure that their approach does not reinforce existing power imbalances. <span style=\"text-decoration: underline\"><strong>Service p<\/strong><strong>roviders should:<\/strong><\/span>\r\n<ul>\r\n \t<li>Use the client\u2019s preferred communication mode (sign language, text, pictorial aids, assistive tech).<\/li>\r\n \t<li>Recognise that caregivers or staff may monitor devices; plan private, safe ways to communicate.<\/li>\r\n \t<li>Adapt phrasing and pacing for cognitive or sensory needs.<\/li>\r\n<\/ul>\r\n\r\n<hr \/>\r\n\r\n<h1>Legal, ethical, and data\u2011protection considerations<\/h1>\r\nLegal and ethical obligations shape how information is collected, stored, and shared. Providers should:\r\n<ul>\r\n \t<li>Explain confidentiality limits and mandatory reporting obligations clearly.<\/li>\r\n \t<li>Obtain informed consent before sharing evidence; use plain\u2011language consent forms.<\/li>\r\n \t<li>Store sensitive records securely and follow relevant data\u2011protection laws and organisational policies.<\/li>\r\n<\/ul>\r\n<div class=\"textbox textbox--key-takeaways\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\" style=\"text-align: center\">Reflect<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n\r\nHow might your documentation practices need to change to better protect TFGBV\u2011related data?\r\n\r\n<\/div>\r\n<\/div>\r\n\r\n<hr \/>\r\n\r\n<h1>Ongoing safety planning<\/h1>\r\n<!--StartFragment -->\r\n\r\nSafety planning is not a one\u2011time event; it is an evolving process that adapts to the survivor\u2019s changing circumstances.\r\n<ul>\r\n \t<li><strong>Develop a physical safety <\/strong><strong>plan.<\/strong> Identify important safe contacts, emergency numbers, safe locations.<\/li>\r\n \t<li><strong>Develop a digital safety plan. <\/strong>Consider safe devices, password rotation, trusted backups, and a plan for social media privacy.<\/li>\r\n \t<li><strong>Follow\u2011up.<\/strong> Schedule check\u2011ins, update risk assessment, and revise the plan as needed.<\/li>\r\n<\/ul>\r\nA well\u2011structured safety plan supports both immediate protection and long\u2011term sustainability.\r\n\r\n<!--EndFragment -->\r\n\r\n<hr \/>\r\n\r\n<h1>Building partnerships and referral networks<\/h1>\r\n<!--StartFragment -->\r\n\r\nNo single service can address all aspects of TFGBV. Effective response depends on strong partnerships across sectors. Organisations and service staff should:\r\n<ul>\r\n \t<li>Map local forensic, legal, psychosocial, and shelter services. You can see some examples of organisations in this textbook in on the following pages:\r\n<ul>\r\n \t<li><a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/front-matter\/global-support-and-resources-page\/\">South African Support and Resources Page<\/a><\/li>\r\n \t<li><a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/front-matter\/global-support-and-resources-page\/\">Global Support and Resources Page<\/a><\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li>Establish referral agreements and rapid\u2011response pathways with local resources to create an accessible network of support for survivors.<\/li>\r\n \t<li>Train staff in digital\u2011evidence preservation and trauma\u2011informed, survivor-directed care.<\/li>\r\n<\/ul>\r\nPartnerships can strengthen the organisation\u2019s capacity to respond comprehensively and consistently.\r\n<div class=\"textbox textbox--key-takeaways\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\" style=\"text-align: center\">Reflect<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n\r\nWhich local partners could strengthen your organisation\u2019s TFGBV response?\r\n\r\n<\/div>\r\n<\/div>\r\nResponding to TFGBV requires a structured, trauma\u2011informed, and disability\u2011inclusive approach. By applying the AVDR framework, conducting thorough risk assessments, documenting safely, and maintaining strong referral networks, frontline providers can offer survivors meaningful protection and support.\r\n\r\nWhen these practices are consistently applied, organisations strengthen their overall readiness and ensure that survivors receive responses that are safe, respectful, and empowering.\r\n\r\n<hr \/>\r\n\r\n<h2>Resources<\/h2>\r\n<div class=\"csl-bib-body\">\r\n<ul>\r\n \t<li class=\"csl-entry\">UNFPA. (2019). <i>The Inter-Agency Minimum Standards for Gender-Based Violence in Emergencies Programming<\/i>. United Nations Population Fund. <a href=\"https:\/\/gbvaor.net\/sites\/default\/files\/2019-11\/19-200%20Minimun%20Standards%20Report%20ENGLISH-Nov%201.FINAL_.pdf\">https:\/\/gbvaor.net\/sites\/default\/files\/2019-11\/19-200%20Minimun%20Standards%20Report%20ENGLISH-Nov%201.FINAL_.pdf<\/a><\/li>\r\n<\/ul>\r\n<div class=\"csl-bib-body\">\r\n<ul>\r\n \t<li class=\"csl-entry\">Women\u2019s Shelters Canada. (2026). <i>Toolkits<\/i>. Women and Gender Equality (WAGE) Canada. Tech Safety Canada. <a href=\"https:\/\/techsafety.ca\/resources\/toolkits\">https:\/\/techsafety.ca\/resources\/toolkits<\/a><\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>","rendered":"<p style=\"text-align: right\"><a id=\"quick-exit-btn\" href=\"https:\/\/google.ca\" title=\"Quick Exit\">EXIT SITE<\/a><\/p>\n<h1>Chapter 15: Responding to TFGBV as Frontline Service Providers<\/h1>\n<p>In this chapter, we want to <strong>equip frontline service providers<\/strong> with a <strong>trauma\u2011 and disability\u2011informed approach<\/strong> to TFGBV, using a survivor centered approach. It centers an applied case, practical frameworks, and ready\u2011to\u2011use tools for assessment, documentation, immediate safety, and referral.<\/p>\n<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li>Learn foundational principles of GBV responses and survivor-centered care.<\/li>\n<li>Apply the <strong>Ask\u2013Validate\u2013Document\u2013Refer<\/strong> framework in digital abuse disclosures, centering survivors throughout.<\/li>\n<li>Identify local and organizational referral pathways for survivors of digital abuse.<\/li>\n<li>Integrate emotional support while preserving survivor autonomy and safety.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p><!--StartFragment --><\/p>\n<hr \/>\n<h1>Foundational Principles for Safe Responses<\/h1>\n<p>In your approaches to client disclosures of TFGBV there are several general considerations that you need to make regarding how to proceed in ways which are empowering to the survivor.<\/p>\n<p>In general, following <strong>Gender-Based Violence (GBV) guiding principles<\/strong> (keeping standards of safety, confidentiality, respect, and non-discrimination) and a <strong>survivor-centered approach<\/strong> (ensuring that survivors&#8217; experiences and wishes are central and essential to guiding decisions and actions) are vital to best practices.<\/p>\n<h3><strong>Gender-Based Violence (GBV) guiding principles are as follows:<\/strong><\/h3>\n<ul>\n<li><strong>Safety-based approach. <\/strong>Attending to both immediate, short-term, and long-term physical, emotional, mental, and digital risks.<\/li>\n<li><strong>Confidentiality. <\/strong>Give the survivor control over what is shared and when. Women with disabilities are frequently stripped of autonomy due to societal and structural barriers, and it is essential that service providers do not continue to do this. However, there are some limits to confidentiality, and service providers should inform survivors of this.<\/li>\n<li><strong>Respect.<\/strong> Respect the choices and dignity of all people who you serve, by including them, respecting their identity and experiences, and approaching with openness.<\/li>\n<li><strong>Non-discrimination. <\/strong>All actions should be informed with approaches that acknowledge the many parts of a person and survivor. Gender, race, disability, sexual orientation, religious affiliation and any other identifiers should be respected and approached without bias.<\/li>\n<\/ul>\n<p>To <strong>learn more about GBV Principles<\/strong>, you can go to the resource from the UNFPA, which is <strong><a href=\"https:\/\/gbvaor.net\/sites\/default\/files\/2019-11\/19-200%20Minimun%20Standards%20Report%20ENGLISH-Nov%201.FINAL_.pdf\">linked here.<\/a><\/strong><\/p>\n<h3>Core parts of a survivor-centered approach to GBV also include:<\/h3>\n<ul>\n<li><strong>Trustworthiness. <\/strong>Be transparent about limits of confidentiality and next steps. Disability and gender-based stigma experienced in many societal spheres can create atmospheres of distrust and fear.<\/li>\n<li><strong style=\"text-align: initial;font-size: 1em\">Collaboration<\/strong><span style=\"text-align: initial;font-size: 1em\">. Aim to co\u2011create safety plans and referrals with your clients. Nothing should occur without survivors&#8217; consultation and involvement, except in extreme circumstances.<\/span><\/li>\n<li><strong>Empowerment<\/strong>. Support digital autonomy and reduce shame around experiences. You can do this by providing resources around digital literacy and digital safety that are accessible, and facilitating teaching digital safety in ways that support self-sufficiency.<\/li>\n<\/ul>\n<div class=\"textbox textbox--key-takeaways\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\" style=\"text-align: center\">Reflect<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ol>\n<li><strong>What barriers in your context<\/strong> (healthcare, GBV support, advocacy, disability rights, et cetera) can you foresee in applying these principles?<\/li>\n<li>How might you plan to overcome or circumvent these barriers?<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<hr \/>\n<h1>Using an Ask\u2013Validate\u2013Document\u2013Refer framework<\/h1>\n<p>This framework provides a simple, structured way to respond to TFGBV disclosures.<\/p>\n<h4><span style=\"background-color: #ccffff\"><strong>Ask (permission first):<\/strong><\/span> Ask about TFGBV.<\/h4>\n<p>Ask permission to discuss, and then about the TFGBV. Ask about frequency, content, sender identity, platforms used, whether images were shared, and whether the perpetrator has offline access to locations or contacts.<\/p>\n<ul>\n<li><strong>Try phrases like:<\/strong> \u201cMay I ask some questions about what happened and how it\u2019s affecting you? You can stop at any time.\u201d<\/li>\n<\/ul>\n<h4><span style=\"background-color: #ccffcc\"><strong>Validate:<\/strong><\/span> Validate the experience.<\/h4>\n<ul>\n<li>Avoid blame or minimising language; do not pressure immediate reporting unless there is an emergency situation.<\/li>\n<li><strong>Try phrases like:<\/strong> \u201cThat sounds frightening\u201d; or, \u201cYou did the right thing telling me.\u201d<\/li>\n<\/ul>\n<h4><span style=\"background-color: #ffff99\"><strong>Document (with consent):<\/strong><\/span> Record evidence.<\/h4>\n<ul>\n<li>Record <strong>verbatim<\/strong> statements, dates, times, platforms, and witnesses. Note whether the client consents to evidence collection and sharing. Use the documentation template below.<\/li>\n<\/ul>\n<h4><span style=\"background-color: #ffcc99\"><strong>Refer:<\/strong><\/span> Refer to services.<\/h4>\n<ul>\n<li>Offer options that you are able to directly refer them to, such as legal advice, digital forensics, police follow\u2011up, psychosocial counselling, medical appointments, shelter services, and peer support. Let the survivor choose which referrals to accept and when.<\/li>\n<\/ul>\n<p>The AVDR framework ensures that responses remain structured, supportive, and aligned with the survivor\u2019s needs.<\/p>\n<p>Developing an AVDR framework requires an organisation or institution has a base of <strong>knowledge around locally available facilities and services<\/strong>. If this is not yet in place, we deeply encourage a review of your internal policies and services. For reference, we have compiled a list of resources and services in South Africa, which may be useful to you, which is <a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/front-matter\/support-and-resources-page\/\">linked on our Support and Resources Page<\/a>.<\/p>\n<h2>Communication with Clients Around TFGBV<\/h2>\n<p>Clear, respectful language supports safety and trust during difficult conversations. Example of possible scripts to use through the service delivery and reporting or response process include:<\/p>\n<ul>\n<li>\u201cI\u2019d like to write down what you\u2019ve shared so we can support you appropriately. Is that okay?\u201d<\/li>\n<li>\u201cIf there is an immediate risk to your safety, I may need to involve others. I will tell you before I do that.\u201d<\/li>\n<li>\u201cI can connect you with legal support, a forensic specialist, or a counsellor. What would you prefer at this stage?\u201d<\/li>\n<\/ul>\n<hr \/>\n<h1>Incident Report Flow Charts<\/h1>\n<p><!--StartFragment --><\/p>\n<p>An incident\u2011report flow chart helps frontline workers know exactly what to do when TFGBV is suspected or disclosed, and to progress through the AVDR stages. Because digital abuse can escalate quickly and survivors may share information gradually or under pressure, staff need a clear sequence of steps that guides their actions from first concern to final follow\u2011up.<\/p>\n<p>The flow chart provides this structure by outlining who to notify, what safety checks to complete, how to document the incident, and when emergency procedures must be activated.<\/p>\n<p>These types of incidence reporting flow structures are common for many organizations, but they do not always follow survivor-led or GBV principles<\/p>\n<p>Each organisation should adapt the details to its own staffing and legal requirements to support a safe, coordinated, and trauma\u2011informed response to TFGBV.<\/p>\n<p>We have provided a sample incident report flow chart, which should be updated to include roles, responsibilities, and organisation-specific practices to accompany each step.<\/p>\n<p>The typical <span style=\"text-decoration: underline\"><strong>sample incident report flow chart<\/strong><\/span> is as follows:<\/p>\n<p><!--EndFragment --><\/p>\n<figure id=\"attachment_862\" aria-describedby=\"caption-attachment-862\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/module-3b-responding-to-tfgbv-nasha-evie\/immediate-safety-actions-digital-3\/\" rel=\"attachment wp-att-862\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Immediate-safety-actions-digital-3-e1773165104852.png\" alt=\"\" width=\"700\" height=\"480\" class=\"wp-image-862\" srcset=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Immediate-safety-actions-digital-3-e1773165104852.png 1920w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Immediate-safety-actions-digital-3-e1773165104852-300x205.png 300w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Immediate-safety-actions-digital-3-e1773165104852-1024x701.png 1024w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Immediate-safety-actions-digital-3-e1773165104852-768x526.png 768w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Immediate-safety-actions-digital-3-e1773165104852-1536x1052.png 1536w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Immediate-safety-actions-digital-3-e1773165104852-65x45.png 65w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Immediate-safety-actions-digital-3-e1773165104852-225x154.png 225w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Immediate-safety-actions-digital-3-e1773165104852-350x240.png 350w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><figcaption id=\"caption-attachment-862\" class=\"wp-caption-text\">This is a typical flow diagram of incident responses to GBV. In this case, we can see that a lot occurs outside of the control of the survivor. Decisions are predetermined based on a care provider&#8217;s perception of a situation, without discussing them with the survivor.<\/figcaption><\/figure>\n<h3 style=\"text-align: center\">What should we do instead?<\/h3>\n<p>To help guide the development of your own responses, we have added survivor-centered processes to the sample flowchart. You can view these changes in the diagram below:<\/p>\n<div id=\"h5p-30\">\n<div class=\"h5p-iframe-wrapper\"><iframe id=\"h5p-iframe-30\" class=\"h5p-iframe\" data-content-id=\"30\" style=\"height:1px\" src=\"about:blank\" frameBorder=\"0\" scrolling=\"no\" title=\"Sample Survivor-Centered Incident Response Flow Diagram\"><\/iframe><\/div>\n<\/div>\n<hr \/>\n<h2>Practical risk assessment and intake checklists<\/h2>\n<p>After initial disclosure, providers must assess risk across both clinical and digital domains. This assessment guides immediate safety actions and determines which referrals are most urgent.<\/p>\n<ul>\n<li><strong>Clinical risks<\/strong> may include threats of physical harm, suicidal ideation, lack of safe housing, or limited social support.<\/li>\n<li><strong>Digital risks<\/strong> may include device or account access by the perpetrator, spyware, image\u2011based abuse, doxxing, location tracking, online harassment, or other forms of TFGBV.<\/li>\n<\/ul>\n<p>According to your service or institutional scope, you may also want to develop a combined intake checklist that flags:<\/p>\n<p><!--StartFragment --><\/p>\n<ul>\n<li><a href=\"#Immediate danger\">Immediate danger<\/a> (requires emergency services)<\/li>\n<li>High digital risk (requires digital\u2011forensics referral)<\/li>\n<li>Psychosocial needs (requires counselling or support services)<\/li>\n<\/ul>\n<p><strong><a><\/a>Immediate danger<\/strong> that require calls for emergency or immediate reporting can include the following&#8230;<\/p>\n<p><!--StartFragment --><\/p>\n<ul>\n<li><strong>Threats of physical or sexual violence<\/strong> delivered through digital means, especially when they include location details, stalking patterns, or timelines.<\/li>\n<li><strong>Real\u2011time stalking or tracking<\/strong>, such as live GPS monitoring, forced location sharing, or evidence that someone is on their way to the victim&#8217;s physical location.<\/li>\n<li><strong>Compromised safety-critical accounts<\/strong>, like access to home security systems, medical devices, financial accounts, or communication channels the person relies on for safety.<\/li>\n<li><strong>Non\u2011consensual intimate image release<\/strong> that is happening now or is being used to coerce immediate compliance.<\/li>\n<li><strong>Escalating harassment<\/strong> that shows clear intent to harm or that coincides with in\u2011person threats or breaches of physical boundaries.<\/li>\n<li><strong>Digital abuse <\/strong>that prevents someone from calling for help, accessing medication, contacting support, or finding a safe shelter.<\/li>\n<\/ul>\n<p>As a service provider, you must be transparent about your role&#8217;s mandatory reporting obligations and any limits to confidentiality at the beginning of conversations.<\/p>\n<p><!--EndFragment --><\/p>\n<h2><strong>Immediate Digital Safety Strategies <\/strong><\/h2>\n<p><!--EndFragment --><\/p>\n<p>Once risks are identified, providers may support immediate digital safety steps. These actions must be taken carefully, especially when device monitoring is suspected. <span style=\"text-decoration: underline\"><strong>Immediate safety strategies<\/strong><\/span> (with informed consent) include:<\/p>\n<ul>\n<li>Change passwords from a trusted device not accessible to the perpetrator.<\/li>\n<li>Enable two\u2011factor authentication on critical accounts.<\/li>\n<li>Turn off location sharing and make social accounts private.<\/li>\n<li>Preserve evidence (screenshots, message headers, timestamps).<\/li>\n<li>Use a temporary \u201csafe device\u201d if monitoring is suspected.<\/li>\n<li>Avoid deleting messages until a forensic specialist advises.<\/li>\n<\/ul>\n<div class=\"textbox 1\">\n<h2><em><strong><span style=\"background-color: #ffff00\">Safety Note:<\/span> <\/strong><\/em><\/h2>\n<p>Changing any typical digital behaviour (changing passwords, logging out of or deleting accounts, turning off location, uninstalling apps) may alert an abuser. Ensure that the survivor has a safe shelter before making changes, and opt to use different devices and accounts other than the accounts which are accessible to the abuser.<\/p>\n<\/div>\n<div class=\"textbox textbox--key-takeaways\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\" style=\"text-align: center\">Reflect<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p>Consider the risks of altering device settings when a client\u2019s device may be monitored, and <strong>identify strategies<\/strong> to reduce those risks.<\/p>\n<\/div>\n<\/div>\n<hr \/>\n<h1>Documentation Standards<\/h1>\n<p><!--StartFragment --><\/p>\n<p>Accurate, secure documentation is essential for safety planning, continuity of care, organisational accountability, and potential legal supports. <span style=\"text-decoration: underline\"><strong>Documentation should include:<\/strong><\/span><\/p>\n<ul>\n<li>Date, time, and setting of the disclosure<\/li>\n<li>all individuals present<\/li>\n<li>Client\u2019s statements (verbatim)<\/li>\n<li>Observed behaviour and communication needs<\/li>\n<li>Evidence collected and consent status<\/li>\n<li>Referrals made and agreed next steps<\/li>\n<\/ul>\n<p>Records must be stored securely with restricted access and clear data retention and deletion policies.<\/p>\n<p><!--EndFragment --><\/p>\n<hr \/>\n<h1>Accessibility and power dynamics<\/h1>\n<p>When TFGBV intersects with disability, its experience and safe response may be impacted by factors such as caregiving relationships, and communication barriers. Providers must ensure that their approach does not reinforce existing power imbalances. <span style=\"text-decoration: underline\"><strong>Service p<\/strong><strong>roviders should:<\/strong><\/span><\/p>\n<ul>\n<li>Use the client\u2019s preferred communication mode (sign language, text, pictorial aids, assistive tech).<\/li>\n<li>Recognise that caregivers or staff may monitor devices; plan private, safe ways to communicate.<\/li>\n<li>Adapt phrasing and pacing for cognitive or sensory needs.<\/li>\n<\/ul>\n<hr \/>\n<h1>Legal, ethical, and data\u2011protection considerations<\/h1>\n<p>Legal and ethical obligations shape how information is collected, stored, and shared. Providers should:<\/p>\n<ul>\n<li>Explain confidentiality limits and mandatory reporting obligations clearly.<\/li>\n<li>Obtain informed consent before sharing evidence; use plain\u2011language consent forms.<\/li>\n<li>Store sensitive records securely and follow relevant data\u2011protection laws and organisational policies.<\/li>\n<\/ul>\n<div class=\"textbox textbox--key-takeaways\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\" style=\"text-align: center\">Reflect<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p>How might your documentation practices need to change to better protect TFGBV\u2011related data?<\/p>\n<\/div>\n<\/div>\n<hr \/>\n<h1>Ongoing safety planning<\/h1>\n<p><!--StartFragment --><\/p>\n<p>Safety planning is not a one\u2011time event; it is an evolving process that adapts to the survivor\u2019s changing circumstances.<\/p>\n<ul>\n<li><strong>Develop a physical safety <\/strong><strong>plan.<\/strong> Identify important safe contacts, emergency numbers, safe locations.<\/li>\n<li><strong>Develop a digital safety plan. <\/strong>Consider safe devices, password rotation, trusted backups, and a plan for social media privacy.<\/li>\n<li><strong>Follow\u2011up.<\/strong> Schedule check\u2011ins, update risk assessment, and revise the plan as needed.<\/li>\n<\/ul>\n<p>A well\u2011structured safety plan supports both immediate protection and long\u2011term sustainability.<\/p>\n<p><!--EndFragment --><\/p>\n<hr \/>\n<h1>Building partnerships and referral networks<\/h1>\n<p><!--StartFragment --><\/p>\n<p>No single service can address all aspects of TFGBV. Effective response depends on strong partnerships across sectors. Organisations and service staff should:<\/p>\n<ul>\n<li>Map local forensic, legal, psychosocial, and shelter services. You can see some examples of organisations in this textbook in on the following pages:\n<ul>\n<li><a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/front-matter\/global-support-and-resources-page\/\">South African Support and Resources Page<\/a><\/li>\n<li><a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/front-matter\/global-support-and-resources-page\/\">Global Support and Resources Page<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Establish referral agreements and rapid\u2011response pathways with local resources to create an accessible network of support for survivors.<\/li>\n<li>Train staff in digital\u2011evidence preservation and trauma\u2011informed, survivor-directed care.<\/li>\n<\/ul>\n<p>Partnerships can strengthen the organisation\u2019s capacity to respond comprehensively and consistently.<\/p>\n<div class=\"textbox textbox--key-takeaways\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\" style=\"text-align: center\">Reflect<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p>Which local partners could strengthen your organisation\u2019s TFGBV response?<\/p>\n<\/div>\n<\/div>\n<p>Responding to TFGBV requires a structured, trauma\u2011informed, and disability\u2011inclusive approach. By applying the AVDR framework, conducting thorough risk assessments, documenting safely, and maintaining strong referral networks, frontline providers can offer survivors meaningful protection and support.<\/p>\n<p>When these practices are consistently applied, organisations strengthen their overall readiness and ensure that survivors receive responses that are safe, respectful, and empowering.<\/p>\n<hr \/>\n<h2>Resources<\/h2>\n<div class=\"csl-bib-body\">\n<ul>\n<li class=\"csl-entry\">UNFPA. (2019). <i>The Inter-Agency Minimum Standards for Gender-Based Violence in Emergencies Programming<\/i>. United Nations Population Fund. <a href=\"https:\/\/gbvaor.net\/sites\/default\/files\/2019-11\/19-200%20Minimun%20Standards%20Report%20ENGLISH-Nov%201.FINAL_.pdf\">https:\/\/gbvaor.net\/sites\/default\/files\/2019-11\/19-200%20Minimun%20Standards%20Report%20ENGLISH-Nov%201.FINAL_.pdf<\/a><\/li>\n<\/ul>\n<div class=\"csl-bib-body\">\n<ul>\n<li class=\"csl-entry\">Women\u2019s Shelters Canada. (2026). <i>Toolkits<\/i>. Women and Gender Equality (WAGE) Canada. Tech Safety Canada. <a href=\"https:\/\/techsafety.ca\/resources\/toolkits\">https:\/\/techsafety.ca\/resources\/toolkits<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"author":554,"menu_order":2,"comment_status":"open","ping_status":"closed","template":"","meta":{"pb_show_title":"","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[48],"contributor":[],"license":[],"class_list":["post-325","chapter","type-chapter","status-publish","hentry","chapter-type-standard"],"part":26,"_links":{"self":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/users\/554"}],"replies":[{"embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/comments?post=325"}],"version-history":[{"count":23,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/325\/revisions"}],"predecessor-version":[{"id":1040,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/325\/revisions\/1040"}],"part":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/parts\/26"}],"metadata":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/325\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/media?parent=325"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapter-type?post=325"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/contributor?post=325"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/license?post=325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}