You can quickly leave this website by clicking the "Exit" button or by pressing the Escape key twice.
If you have safety concerns, remember to clear your browser history after visiting this site.
Quick Exit

Gathering Technology Abuse Evidence in Protection Order Cases

Gathering Technology Abuse Evidence in Protection Order Cases Recorded Webinar

Communication software, social media, and location services are increasingly used to stalk, harass, and terrorize. This interactive webinar will examine the technologies most commonly misused in domestic violence cases and outline the process for gathering and admitting evidence of tech abuse.

This project was supported by Grant No. 2016-TA-AX-K052 awarded by the Office on Violence Against Women, U.S. Department of Justice. The opinions, findings, conclusions, and recommendations expressed in this presentation are those of the authors and do not necessarily reflect the views of the Department of Justice, Office on Violence Against Women.

Ready to add this to your training library?
Register Now
Course Requirements
Complete the activities within each module. It is recommended to complete them in order. When prompted within modules, return to this course page to add to the discussion board. Then complete any final assignments within the module.

Course Outline & Materials

Course Q&A
Course Q&A
Module 1
Webinar and Course Evaluation
Watch the recorded webinar here and then complete the course evaluation. To generate a certificate of completion, you must select "Finish Course" after you complete the course evaluation.
Gathering Technology Abuse Evidence in Protection Order Cases Pre-Recorded Webinar
Course Evaluation
Gathering Technology Abuse Evidence in Protection Order Cases Gathering Technology Abuse Evidence in Protection Order Cases Recorded Webinar
1 Module
1h 30m
Webinar Replay
0.00 CEUs
Presented by
Ready to add this to your training library?
Register Now