{"id":88,"date":"2026-01-21T09:42:56","date_gmt":"2026-01-21T14:42:56","guid":{"rendered":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/?post_type=chapter&#038;p=88"},"modified":"2026-04-20T14:35:30","modified_gmt":"2026-04-20T18:35:30","slug":"chapter-2","status":"publish","type":"chapter","link":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/","title":{"raw":"Chapter 2: Where does TFGBV happen?","rendered":"Chapter 2: Where does TFGBV happen?"},"content":{"raw":"<p style=\"text-align: right\"><a id=\"quick-exit-btn\" href=\"https:\/\/google.ca\" title=\"Quick Exit\">EXIT SITE<\/a><\/p>\r\n\r\n<h1>Chapter 2: Where does TFGBV happen?<\/h1>\r\nTFGBV can occur across many digital spaces, and using various different technologies. In this chapter, we will <strong>overview common digital platforms and devices<\/strong> which can facilitate or become settings for TFGBV.\r\n<div>\r\n<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Learning Objectives<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul>\r\n \t<li style=\"font-weight: 400\">Know the different places and ways that TFGBV can happen.<\/li>\r\n \t<li>Be able to identify TFGBV as it presents in different forms.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\nSometimes, when we hear the terms \"online abuse\" or \"technology-facilitated violence\" we make assumptions about what they mean.\r\n\r\nFor example, many people may only think these terms apply to cyberbullying (such as strangers making mean comments on social media posts); or even non-consensual image sharing (like a bully sending out an embarrassing photo of you to the whole school through an email blast).\r\n<h1>Mobile Devices<\/h1>\r\n<strong>Mobile phones, laptops and PC computers, tablets, and wearable technology<\/strong> (like Apple watches) etc.) can be used to facilitate TFGBV.\r\n\r\nThis can happen through calls, texts, video chats, image sharing, and apps. TFGBV can also be facilitated by the forced restriction of access to these devices.\r\n\r\n[caption id=\"attachment_870\" align=\"aligncenter\" width=\"611\"]<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/immediate-safety-actions-digital-6\/\" rel=\"attachment wp-att-870\"><img src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-6.png\" alt=\"Different forms of digital mobile technology from left to right: laptop, mobile phone, tablet, and a smart watch.\" width=\"611\" height=\"344\" class=\"wp-image-870\" \/><\/a> Everyday mobile devices\u00a0 can become channels for harassment, isolation, coercion, or monitoring.[\/caption]\r\n\r\n<hr \/>\r\n\r\n<h1>Online and Social Media Platforms<\/h1>\r\nOnline and social media platforms allow people to <strong>create profiles, share content, and interact with others.<\/strong> TFGBV can occur through comments, messages, impersonation, or unwanted contact.\r\n\r\nTo help you think broadly, here are different types of online platforms where TFGBV can occur, with examples for each. But remember, this list is <em>not<\/em> exhaustive. As we have seen in the last 10 years, new platforms appear all the time!\r\n<div class=\"textbox textbox--key-takeaways\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\" style=\"text-align: center\">Reflect<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n\r\nThink of different platforms that \"online and social media platforms\" might refer to. How many can you list?\r\n\r\n<\/div>\r\n<\/div>\r\n<h2>Social Media Platforms<\/h2>\r\nSocial media platforms focus on personal networking, where users create profiles to connect with one another. <strong>Examples include:<\/strong> Instagram (Threads), Facebook (Facebook Messenger), YouTube, TikTok, Twitter\/X, WhatsApp, Snapchat, LinkedIn.\r\n\r\n<!--StartFragment -->\r\n\r\n<strong>How TFGBV shows up:<\/strong> Harassment in comments or DMs, impersonation, non\u2011consensual image sharing, monitoring through \u201clast seen\u201d or story views.\r\n<!--EndFragment -->\r\n\r\n<img src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-e1773181228232.png\" alt=\"\" width=\"325\" height=\"242\" class=\"wp-image-454 aligncenter\" \/><a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/a\/\" rel=\"attachment wp-att-454\"><\/a>\r\n<h2>Online Chatrooms and Forums<\/h2>\r\nOnline chatrooms and forums are digital spaces for real-time or asynchronous communication, ranging from specialized support groups and niche communities to random video chats. <strong>Examples include:<\/strong> Twitch, Omegle, Discord, reddit, 4chan.\r\n\r\n<strong>How TFGBV can show up:<\/strong> Targeted harassment, doxxing, grooming, coordinated attacks, pressure to share personal information.\r\n<h2>Dating Apps<\/h2>\r\nDating apps are mobile apps or websites where users can create profiles with the goal of creating sexual, romantic or even platonic relationships. <strong>Examples include:<\/strong> Tinder, Hinge, Facebook Dating, Grindr, Badoo, OKCupid, Bumble.\r\n\r\n<!--StartFragment -->\r\n\r\n<strong>How TFGBV can show up: <\/strong>Coercive messaging, catfishing, threats after rejection, pressure to share intimate images, location\u2011based stalking.\r\n\r\n<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/immediate-safety-actions-digital-4\/\" rel=\"attachment wp-att-868\"><img src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-4-e1773173617205.png\" alt=\"A variety of dating app logos.\" width=\"631\" height=\"207\" class=\"wp-image-868 aligncenter\" \/><\/a>\r\n\r\n<!--EndFragment -->\r\n<h2>Online Gaming<\/h2>\r\nOnline gaming is the use of console games, PC games, or mobile games which include online, interactive elements. <strong>Examples include:<\/strong>\r\n<ul>\r\n \t<li><strong>Multiplayer<\/strong> online games such as League of Legends, Call of Duty, <span>Fortnite, or Minecraft<\/span>.<\/li>\r\n \t<li><strong>Social and interactive worlds<\/strong> such as Club Penguin, Second Life.<\/li>\r\n \t<li>Online, <strong>user driven games<\/strong> such as Roblox.<\/li>\r\n<\/ul>\r\n<!--StartFragment -->\r\n\r\n<strong>How TFGBV can show up: <\/strong>Voice\u2011chat harassment, targeted attacks, grooming of younger players, coercion through in\u2011game relationships, monitoring through shared servers.\r\n\r\n[caption id=\"attachment_869\" align=\"aligncenter\" width=\"684\"]<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/immediate-safety-actions-digital-5\/\" rel=\"attachment wp-att-869\"><img src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-5.png\" alt=\"Two women playing online video games are pictured; on the left is a console gamer, on the right is a PC gamer.\" width=\"684\" height=\"385\" class=\"wp-image-869\" \/><\/a> Online gaming is a common place for TFGBV to occur, particularly against female gamers.[\/caption]\r\n\r\n<!--EndFragment -->\r\n\r\n<hr \/>\r\n\r\n<h1>Rideshare and Delivery Apps<\/h1>\r\nThese are mobile-based platforms that connect users with others for transportation (rideshare) or delivery services (food, groceries, packages). These platforms can be used by the user or the service providers to track and stalk locations, or carry out other harms. <strong>Examples of these can include<\/strong> Uber or UberEats, Bolt, KROOZ, and Mr D.\r\n\r\n<img src=\"https:\/\/archive-images.prod.global.a201836.reutersmedia.net\/2019\/12\/04\/LYNXMPEFB31NR-OZATP.JPG\" alt=\"A white Bolt rideshare car, with signage on the side with the &quot;Bolt&quot; logo.\" width=\"575\" height=\"384\" class=\"alignnone\" \/>\r\n<h1>Monitoring and Tracking Technologies<\/h1>\r\nTools designed for convenience or safety can be misused to<strong> track, monitor, or control<\/strong> someone\u2019s movements or activities.<strong> Examples include:<\/strong>\r\n<ul>\r\n \t<li><strong>Computers and mobile devices:<\/strong> Accessing accounts, browsing history, or installed apps.<\/li>\r\n \t<li><strong>GPS and trackers:<\/strong> Monitoring location through phones, vehicles, wearables, or standalone devices.<\/li>\r\n \t<li><strong>Home security cameras:<\/strong> Viewing footage from doorbell cameras, nanny cams, or hidden cameras.<\/li>\r\n \t<li><strong>Smart home systems:<\/strong> Controlling lights, locks, alarms, or appliances to intimidate or restrict movement.<\/li>\r\n<\/ul>\r\n[caption id=\"attachment_871\" align=\"aligncenter\" width=\"630\"]<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/immediate-safety-actions-digital-7\/\" rel=\"attachment wp-att-871\"><img src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-7.png\" alt=\"\" width=\"630\" height=\"295\" class=\"wp-image-871\" \/><\/a> While convenient, location-tracking and surveillance systems and tools can be used for TFGBV.[\/caption]\r\n\r\n<hr \/>\r\n\r\n<h1>Assistive Technology<\/h1>\r\nAssistive technologies are designed to support independence, communication, and access. When misused,<strong> they can become tools of surveillance, coercion, or control.<\/strong> This form of abuse is often invisible because the technology is assumed to be \u201chelpful\u201d and innocuous. <strong>Examples include:<\/strong>\r\n<ul>\r\n \t<li><strong>Screen\u2011readers: <\/strong>Monitoring what someone reads or accesses.<\/li>\r\n \t<li><strong>Vision\u2011support apps:<\/strong> Accessing camera feeds or location data.<\/li>\r\n \t<li><strong>Hearing aids with apps:<\/strong> Remotely adjusting or disabling devices, tracking usage.<\/li>\r\n \t<li><strong>Augmentative and Alternative Communication (AAC) devices:<\/strong> Restricting access, deleting vocabulary, or monitoring communication.<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/immediate-safety-actions-digital-9\/\" rel=\"attachment wp-att-876\"><\/a><\/li>\r\n<\/ul>\r\n[caption id=\"attachment_876\" align=\"aligncenter\" width=\"707\"]<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/immediate-safety-actions-digital-9\/\" rel=\"attachment wp-att-876\"><img src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-9.png\" alt=\"From left to right: a person using an adaptive computer mouse, a person wearing a hearing aid, an Augmented Alternative Communication mobile app on a digital tablet, and a braille display screen-reader connected to a laptop.\" width=\"707\" height=\"332\" class=\"wp-image-876\" \/><\/a> Examples of assistive technologies used by people with disabilities.[\/caption]\r\n\r\n<hr \/>\r\n\r\n<h1>Digital and Online Services<\/h1>\r\n<!--StartFragment -->\r\n\r\nEveryday <strong>digital services hold sensitive personal information<\/strong> and can be used to commit TFGBV. <span style=\"text-align: initial;font-size: 1em\">Many services are not designed with accessibility or digital safety for people with disabilities in mind, and put people with disabilities at a <strong>greater risk of experiencing TFGBV.<\/strong><\/span>\r\n<h2>Banking and Financial Services<\/h2>\r\nMobile and online banking platforms store financial data, transaction histories, and identity information. This is very private personal information.\r\n\r\n<!--StartFragment -->\r\n\r\n<strong>How TFGBV can show up: <\/strong>Unauthorized access, financial control, monitoring spending or travel, coercion to share login details.\r\n\r\n<img src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-6.png\" alt=\"\" width=\"558\" height=\"314\" class=\"aligncenter wp-image-555\" \/>\r\n<h2>Healthcare, eHealth, and Telehealth Platforms<\/h2>\r\nHealthcare is transitioning into online spaces, which is a great option for many people with disabilities who struggle to attend in-person appointments due to barriers in their physical environments. However, digital health systems contain sensitive information, which, if misused by the wrong people, can be dangerous.\r\n\r\n<strong>How TFGBV can show up: <\/strong>Accessing private health records, tracking appointments or medications, impersonating someone to cancel care or obtain information.<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/immediate-safety-actions-digital-8\/\" rel=\"attachment wp-att-872\"><img src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-8.png\" alt=\"Healthcare apps and platforms contain sensitive personal data.\" width=\"625\" height=\"293\" class=\"wp-image-872 aligncenter\" \/><\/a>\r\n<h2>AI Chatbots and Generative Tools<span style=\"text-decoration: underline\"><\/span><span style=\"text-decoration: underline\"><\/span><\/h2>\r\n<strong>Artificial intelligence (AI)<\/strong> is growing more powerful and prevalent in everyday life. <!--StartFragment -->\r\n\r\n<strong>How TFGBV can show up: <\/strong>Creating fake messages or images, generating manipulated sexual content, automating harassment through bots.\r\n\r\n<span style=\"text-decoration: underline\"><img src=\"https:\/\/img.freepik.com\/free-vector\/chatbot-with-smartphone_78370-9415.jpg?semt=ais_user_personalization&amp;w=740&amp;q=80\" alt=\"Artificial intelligence chatbot Vectors - Download Free High-Quality Vectors from Freepik | Freepik\" width=\"231\" height=\"231\" class=\"aligncenter\" \/><\/span>\r\n<h2>Email Services<\/h2>\r\n<strong>Email services<\/strong> such as <strong>Gmail, Yahoo!, Hotmail, Microsoft Outlook<\/strong> (et cetera), remain a very important central communication tool. <!--StartFragment -->\r\n\r\n<strong>How TFGBV can show up: <\/strong>Account takeover, monitoring other linked services, resetting passwords to gain control. <!--EndFragment -->\r\n\r\n<img src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-8-e1772999444749.png\" alt=\"\" width=\"464\" height=\"171\" class=\"wp-image-571 aligncenter\" \/>\r\n<h2>Video Conferencing Platforms<\/h2>\r\nThese apps or platforms are used for <strong>video conferencing<\/strong> or calls, to facilitate digital communication. <strong>Examples include:<\/strong> Zoom, Google Meets, Microsoft Teams, Slack.\r\n\r\n<strong>How TFGBV can show up:<\/strong> Joining calls without consent, recording or screenshotting meetings, harassing participants within calls, monitoring who someone speaks to.\r\n\r\n[caption id=\"attachment_350\" align=\"aligncenter\" width=\"617\"]<img src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Module-2A-12.png\" alt=\"A screenshot of a Zoom meeting with four participants talking amongst themselves.\" width=\"617\" height=\"347\" class=\"wp-image-350\" \/> Zoom and other web conferencing and video streaming platforms can be used to perpetrate TFGBV, or settings for TFGBV.[\/caption]\r\n\r\n<div class=\"textbox textbox--key-takeaways\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\" style=\"text-align: center\">Reflection<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n\r\nWhat other examples of TFGBV can you think of? Leave them in the comments below to educate us and others!\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"textbox textbox--exercises\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\" style=\"text-align: center\">Activity<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<p style=\"text-align: center\"><span>[h5p id=\"3\"]<\/span><\/p>\r\n\r\n<\/div>\r\n<\/div>","rendered":"<p style=\"text-align: right\"><a id=\"quick-exit-btn\" href=\"https:\/\/google.ca\" title=\"Quick Exit\">EXIT SITE<\/a><\/p>\n<h1>Chapter 2: Where does TFGBV happen?<\/h1>\n<p>TFGBV can occur across many digital spaces, and using various different technologies. In this chapter, we will <strong>overview common digital platforms and devices<\/strong> which can facilitate or become settings for TFGBV.<\/p>\n<div>\n<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li style=\"font-weight: 400\">Know the different places and ways that TFGBV can happen.<\/li>\n<li>Be able to identify TFGBV as it presents in different forms.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<p>Sometimes, when we hear the terms &#8220;online abuse&#8221; or &#8220;technology-facilitated violence&#8221; we make assumptions about what they mean.<\/p>\n<p>For example, many people may only think these terms apply to cyberbullying (such as strangers making mean comments on social media posts); or even non-consensual image sharing (like a bully sending out an embarrassing photo of you to the whole school through an email blast).<\/p>\n<h1>Mobile Devices<\/h1>\n<p><strong>Mobile phones, laptops and PC computers, tablets, and wearable technology<\/strong> (like Apple watches) etc.) can be used to facilitate TFGBV.<\/p>\n<p>This can happen through calls, texts, video chats, image sharing, and apps. TFGBV can also be facilitated by the forced restriction of access to these devices.<\/p>\n<figure id=\"attachment_870\" aria-describedby=\"caption-attachment-870\" style=\"width: 611px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/immediate-safety-actions-digital-6\/\" rel=\"attachment wp-att-870\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-6.png\" alt=\"Different forms of digital mobile technology from left to right: laptop, mobile phone, tablet, and a smart watch.\" width=\"611\" height=\"344\" class=\"wp-image-870\" \/><\/a><figcaption id=\"caption-attachment-870\" class=\"wp-caption-text\">Everyday mobile devices\u00a0 can become channels for harassment, isolation, coercion, or monitoring.<\/figcaption><\/figure>\n<hr \/>\n<h1>Online and Social Media Platforms<\/h1>\n<p>Online and social media platforms allow people to <strong>create profiles, share content, and interact with others.<\/strong> TFGBV can occur through comments, messages, impersonation, or unwanted contact.<\/p>\n<p>To help you think broadly, here are different types of online platforms where TFGBV can occur, with examples for each. But remember, this list is <em>not<\/em> exhaustive. As we have seen in the last 10 years, new platforms appear all the time!<\/p>\n<div class=\"textbox textbox--key-takeaways\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\" style=\"text-align: center\">Reflect<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p>Think of different platforms that &#8220;online and social media platforms&#8221; might refer to. How many can you list?<\/p>\n<\/div>\n<\/div>\n<h2>Social Media Platforms<\/h2>\n<p>Social media platforms focus on personal networking, where users create profiles to connect with one another. <strong>Examples include:<\/strong> Instagram (Threads), Facebook (Facebook Messenger), YouTube, TikTok, Twitter\/X, WhatsApp, Snapchat, LinkedIn.<\/p>\n<p><!--StartFragment --><\/p>\n<p><strong>How TFGBV shows up:<\/strong> Harassment in comments or DMs, impersonation, non\u2011consensual image sharing, monitoring through \u201clast seen\u201d or story views.<br \/>\n<!--EndFragment --><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-e1773181228232.png\" alt=\"\" width=\"325\" height=\"242\" class=\"wp-image-454 aligncenter\" srcset=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-e1773181228232.png 655w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-e1773181228232-300x223.png 300w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-e1773181228232-65x48.png 65w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-e1773181228232-225x167.png 225w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-e1773181228232-350x260.png 350w\" sizes=\"auto, (max-width: 325px) 100vw, 325px\" \/><a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/a\/\" rel=\"attachment wp-att-454\"><\/a><\/p>\n<h2>Online Chatrooms and Forums<\/h2>\n<p>Online chatrooms and forums are digital spaces for real-time or asynchronous communication, ranging from specialized support groups and niche communities to random video chats. <strong>Examples include:<\/strong> Twitch, Omegle, Discord, reddit, 4chan.<\/p>\n<p><strong>How TFGBV can show up:<\/strong> Targeted harassment, doxxing, grooming, coordinated attacks, pressure to share personal information.<\/p>\n<h2>Dating Apps<\/h2>\n<p>Dating apps are mobile apps or websites where users can create profiles with the goal of creating sexual, romantic or even platonic relationships. <strong>Examples include:<\/strong> Tinder, Hinge, Facebook Dating, Grindr, Badoo, OKCupid, Bumble.<\/p>\n<p><!--StartFragment --><\/p>\n<p><strong>How TFGBV can show up: <\/strong>Coercive messaging, catfishing, threats after rejection, pressure to share intimate images, location\u2011based stalking.<\/p>\n<p><a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/immediate-safety-actions-digital-4\/\" rel=\"attachment wp-att-868\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-4-e1773173617205.png\" alt=\"A variety of dating app logos.\" width=\"631\" height=\"207\" class=\"wp-image-868 aligncenter\" srcset=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-4-e1773173617205.png 1920w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-4-e1773173617205-300x98.png 300w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-4-e1773173617205-1024x336.png 1024w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-4-e1773173617205-768x252.png 768w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-4-e1773173617205-1536x504.png 1536w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-4-e1773173617205-65x21.png 65w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-4-e1773173617205-225x74.png 225w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-4-e1773173617205-350x115.png 350w\" sizes=\"auto, (max-width: 631px) 100vw, 631px\" \/><\/a><\/p>\n<p><!--EndFragment --><\/p>\n<h2>Online Gaming<\/h2>\n<p>Online gaming is the use of console games, PC games, or mobile games which include online, interactive elements. <strong>Examples include:<\/strong><\/p>\n<ul>\n<li><strong>Multiplayer<\/strong> online games such as League of Legends, Call of Duty, <span>Fortnite, or Minecraft<\/span>.<\/li>\n<li><strong>Social and interactive worlds<\/strong> such as Club Penguin, Second Life.<\/li>\n<li>Online, <strong>user driven games<\/strong> such as Roblox.<\/li>\n<\/ul>\n<p><!--StartFragment --><\/p>\n<p><strong>How TFGBV can show up: <\/strong>Voice\u2011chat harassment, targeted attacks, grooming of younger players, coercion through in\u2011game relationships, monitoring through shared servers.<\/p>\n<figure id=\"attachment_869\" aria-describedby=\"caption-attachment-869\" style=\"width: 684px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/immediate-safety-actions-digital-5\/\" rel=\"attachment wp-att-869\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-5.png\" alt=\"Two women playing online video games are pictured; on the left is a console gamer, on the right is a PC gamer.\" width=\"684\" height=\"385\" class=\"wp-image-869\" srcset=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-5.png 1920w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-5-300x169.png 300w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-5-1024x576.png 1024w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-5-768x432.png 768w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-5-1536x864.png 1536w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-5-65x37.png 65w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-5-225x127.png 225w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-5-350x197.png 350w\" sizes=\"auto, (max-width: 684px) 100vw, 684px\" \/><\/a><figcaption id=\"caption-attachment-869\" class=\"wp-caption-text\">Online gaming is a common place for TFGBV to occur, particularly against female gamers.<\/figcaption><\/figure>\n<p><!--EndFragment --><\/p>\n<hr \/>\n<h1>Rideshare and Delivery Apps<\/h1>\n<p>These are mobile-based platforms that connect users with others for transportation (rideshare) or delivery services (food, groceries, packages). These platforms can be used by the user or the service providers to track and stalk locations, or carry out other harms. <strong>Examples of these can include<\/strong> Uber or UberEats, Bolt, KROOZ, and Mr D.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/archive-images.prod.global.a201836.reutersmedia.net\/2019\/12\/04\/LYNXMPEFB31NR-OZATP.JPG\" alt=\"A white Bolt rideshare car, with signage on the side with the &quot;Bolt&quot; logo.\" width=\"575\" height=\"384\" class=\"alignnone\" \/><\/p>\n<h1>Monitoring and Tracking Technologies<\/h1>\n<p>Tools designed for convenience or safety can be misused to<strong> track, monitor, or control<\/strong> someone\u2019s movements or activities.<strong> Examples include:<\/strong><\/p>\n<ul>\n<li><strong>Computers and mobile devices:<\/strong> Accessing accounts, browsing history, or installed apps.<\/li>\n<li><strong>GPS and trackers:<\/strong> Monitoring location through phones, vehicles, wearables, or standalone devices.<\/li>\n<li><strong>Home security cameras:<\/strong> Viewing footage from doorbell cameras, nanny cams, or hidden cameras.<\/li>\n<li><strong>Smart home systems:<\/strong> Controlling lights, locks, alarms, or appliances to intimidate or restrict movement.<\/li>\n<\/ul>\n<figure id=\"attachment_871\" aria-describedby=\"caption-attachment-871\" style=\"width: 630px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/immediate-safety-actions-digital-7\/\" rel=\"attachment wp-att-871\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-7.png\" alt=\"\" width=\"630\" height=\"295\" class=\"wp-image-871\" srcset=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-7.png 1920w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-7-300x141.png 300w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-7-1024x480.png 1024w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-7-768x360.png 768w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-7-1536x720.png 1536w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-7-65x30.png 65w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-7-225x105.png 225w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-7-350x164.png 350w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/a><figcaption id=\"caption-attachment-871\" class=\"wp-caption-text\">While convenient, location-tracking and surveillance systems and tools can be used for TFGBV.<\/figcaption><\/figure>\n<hr \/>\n<h1>Assistive Technology<\/h1>\n<p>Assistive technologies are designed to support independence, communication, and access. When misused,<strong> they can become tools of surveillance, coercion, or control.<\/strong> This form of abuse is often invisible because the technology is assumed to be \u201chelpful\u201d and innocuous. <strong>Examples include:<\/strong><\/p>\n<ul>\n<li><strong>Screen\u2011readers: <\/strong>Monitoring what someone reads or accesses.<\/li>\n<li><strong>Vision\u2011support apps:<\/strong> Accessing camera feeds or location data.<\/li>\n<li><strong>Hearing aids with apps:<\/strong> Remotely adjusting or disabling devices, tracking usage.<\/li>\n<li><strong>Augmentative and Alternative Communication (AAC) devices:<\/strong> Restricting access, deleting vocabulary, or monitoring communication.<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/immediate-safety-actions-digital-9\/\" rel=\"attachment wp-att-876\"><\/a><\/li>\n<\/ul>\n<figure id=\"attachment_876\" aria-describedby=\"caption-attachment-876\" style=\"width: 707px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/immediate-safety-actions-digital-9\/\" rel=\"attachment wp-att-876\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-9.png\" alt=\"From left to right: a person using an adaptive computer mouse, a person wearing a hearing aid, an Augmented Alternative Communication mobile app on a digital tablet, and a braille display screen-reader connected to a laptop.\" width=\"707\" height=\"332\" class=\"wp-image-876\" srcset=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-9.png 1920w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-9-300x141.png 300w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-9-1024x480.png 1024w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-9-768x360.png 768w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-9-1536x720.png 1536w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-9-65x30.png 65w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-9-225x105.png 225w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-9-350x164.png 350w\" sizes=\"auto, (max-width: 707px) 100vw, 707px\" \/><\/a><figcaption id=\"caption-attachment-876\" class=\"wp-caption-text\">Examples of assistive technologies used by people with disabilities.<\/figcaption><\/figure>\n<hr \/>\n<h1>Digital and Online Services<\/h1>\n<p><!--StartFragment --><\/p>\n<p>Everyday <strong>digital services hold sensitive personal information<\/strong> and can be used to commit TFGBV. <span style=\"text-align: initial;font-size: 1em\">Many services are not designed with accessibility or digital safety for people with disabilities in mind, and put people with disabilities at a <strong>greater risk of experiencing TFGBV.<\/strong><\/span><\/p>\n<h2>Banking and Financial Services<\/h2>\n<p>Mobile and online banking platforms store financial data, transaction histories, and identity information. This is very private personal information.<\/p>\n<p><!--StartFragment --><\/p>\n<p><strong>How TFGBV can show up: <\/strong>Unauthorized access, financial control, monitoring spending or travel, coercion to share login details.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-6.png\" alt=\"\" width=\"558\" height=\"314\" class=\"aligncenter wp-image-555\" \/><\/p>\n<h2>Healthcare, eHealth, and Telehealth Platforms<\/h2>\n<p>Healthcare is transitioning into online spaces, which is a great option for many people with disabilities who struggle to attend in-person appointments due to barriers in their physical environments. However, digital health systems contain sensitive information, which, if misused by the wrong people, can be dangerous.<\/p>\n<p><strong>How TFGBV can show up: <\/strong>Accessing private health records, tracking appointments or medications, impersonating someone to cancel care or obtain information.<a href=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/chapter\/chapter-2\/immediate-safety-actions-digital-8\/\" rel=\"attachment wp-att-872\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-8.png\" alt=\"Healthcare apps and platforms contain sensitive personal data.\" width=\"625\" height=\"293\" class=\"wp-image-872 aligncenter\" srcset=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-8.png 1920w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-8-300x141.png 300w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-8-1024x480.png 1024w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-8-768x360.png 768w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-8-1536x720.png 1536w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-8-65x30.png 65w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-8-225x105.png 225w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/Immediate-safety-actions-digital-8-350x164.png 350w\" sizes=\"auto, (max-width: 625px) 100vw, 625px\" \/><\/a><\/p>\n<h2>AI Chatbots and Generative Tools<span style=\"text-decoration: underline\"><\/span><span style=\"text-decoration: underline\"><\/span><\/h2>\n<p><strong>Artificial intelligence (AI)<\/strong> is growing more powerful and prevalent in everyday life. <!--StartFragment --><\/p>\n<p><strong>How TFGBV can show up: <\/strong>Creating fake messages or images, generating manipulated sexual content, automating harassment through bots.<\/p>\n<p><span style=\"text-decoration: underline\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/img.freepik.com\/free-vector\/chatbot-with-smartphone_78370-9415.jpg?semt=ais_user_personalization&amp;w=740&amp;q=80\" alt=\"Artificial intelligence chatbot Vectors - Download Free High-Quality Vectors from Freepik | Freepik\" width=\"231\" height=\"231\" class=\"aligncenter\" \/><\/span><\/p>\n<h2>Email Services<\/h2>\n<p><strong>Email services<\/strong> such as <strong>Gmail, Yahoo!, Hotmail, Microsoft Outlook<\/strong> (et cetera), remain a very important central communication tool. <!--StartFragment --><\/p>\n<p><strong>How TFGBV can show up: <\/strong>Account takeover, monitoring other linked services, resetting passwords to gain control. <!--EndFragment --><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-8-e1772999444749.png\" alt=\"\" width=\"464\" height=\"171\" class=\"wp-image-571 aligncenter\" srcset=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-8-e1772999444749.png 1920w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-8-e1772999444749-300x110.png 300w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-8-e1772999444749-1024x377.png 1024w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-8-e1772999444749-768x283.png 768w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-8-e1772999444749-1536x566.png 1536w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-8-e1772999444749-65x24.png 65w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-8-e1772999444749-225x83.png 225w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/01\/a-8-e1772999444749-350x129.png 350w\" sizes=\"auto, (max-width: 464px) 100vw, 464px\" \/><\/p>\n<h2>Video Conferencing Platforms<\/h2>\n<p>These apps or platforms are used for <strong>video conferencing<\/strong> or calls, to facilitate digital communication. <strong>Examples include:<\/strong> Zoom, Google Meets, Microsoft Teams, Slack.<\/p>\n<p><strong>How TFGBV can show up:<\/strong> Joining calls without consent, recording or screenshotting meetings, harassing participants within calls, monitoring who someone speaks to.<\/p>\n<figure id=\"attachment_350\" aria-describedby=\"caption-attachment-350\" style=\"width: 617px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Module-2A-12.png\" alt=\"A screenshot of a Zoom meeting with four participants talking amongst themselves.\" width=\"617\" height=\"347\" class=\"wp-image-350\" srcset=\"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Module-2A-12.png 1920w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Module-2A-12-300x169.png 300w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Module-2A-12-1024x576.png 1024w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Module-2A-12-768x432.png 768w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Module-2A-12-1536x864.png 1536w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Module-2A-12-65x37.png 65w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Module-2A-12-225x127.png 225w, https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-content\/uploads\/sites\/450\/2026\/02\/Module-2A-12-350x197.png 350w\" sizes=\"auto, (max-width: 617px) 100vw, 617px\" \/><figcaption id=\"caption-attachment-350\" class=\"wp-caption-text\">Zoom and other web conferencing and video streaming platforms can be used to perpetrate TFGBV, or settings for TFGBV.<\/figcaption><\/figure>\n<div class=\"textbox textbox--key-takeaways\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\" style=\"text-align: center\">Reflection<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p>What other examples of TFGBV can you think of? Leave them in the comments below to educate us and others!<\/p>\n<\/div>\n<\/div>\n<div class=\"textbox textbox--exercises\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\" style=\"text-align: center\">Activity<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p style=\"text-align: center\"><span><\/p>\n<div id=\"h5p-3\">\n<div class=\"h5p-iframe-wrapper\"><iframe id=\"h5p-iframe-3\" class=\"h5p-iframe\" data-content-id=\"3\" style=\"height:1px\" src=\"about:blank\" frameBorder=\"0\" scrolling=\"no\" title=\"Section 2 Question 1a\"><\/iframe><\/div>\n<\/div>\n<p><\/span><\/p>\n<\/div>\n<\/div>\n","protected":false},"author":554,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"pb_show_title":"","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[48],"contributor":[],"license":[],"class_list":["post-88","chapter","type-chapter","status-publish","hentry","chapter-type-standard"],"part":33,"_links":{"self":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/88","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/users\/554"}],"replies":[{"embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/comments?post=88"}],"version-history":[{"count":75,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/88\/revisions"}],"predecessor-version":[{"id":1023,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/88\/revisions\/1023"}],"part":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/parts\/33"}],"metadata":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapters\/88\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/media?parent=88"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/pressbooks\/v2\/chapter-type?post=88"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/contributor?post=88"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.library.torontomu.ca\/tfgbvsafetytraining\/wp-json\/wp\/v2\/license?post=88"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}