Are you smart enough to live in a smart world?

We live in a world where everything is at our fingertips. Literally. From our smart phones and smart watches, we have the ability to control our entire lives - from knowing how much milk you have in your fridge to unlocking your front door while you're at work. Smart technology is turning everyday objects, [...]

By |2018-07-12T11:24:04+00:00July 12th, 2018|Categories: Tech Safety Resources|Tags: , , , , , , |

Updated: Image-Based Abuse handout

We just updated our handout on image-based abuse. This update includes more information about the Office of the eSafety Commissioner’s Image-Based Abuse Online Portal. In Australia, image-based abuse is the sharing of (or threat to share) intimate images without the consent of the person in that image. Many states in Australia have legislation that makes [...]

By |2018-02-23T15:54:59+00:00February 27th, 2018|Categories: Tech Safety Resources, Uncategorized|Tags: , , , , |

New Resource: Privacy & Safety on Facebook

WESNET and Facebook Australia teamed up to release an Australian version of Privacy & Safety on Facebook: A Guide for Survivors of Abuse. Launched at WESNET’s 2nd Annual Technology Safety Summit, this guide includes information about Facebook’s settings and features, as well as privacy tips for survivors using Facebook. The guide also includes Australian-specific resources [...]

New Uber Safety Guide Launched

WESNET is pleased to collaborate with Uber on a new Australian version of the Uber Safety Guide. The guide was launched by Uber's Head of Safety Communications, Asia Pacific, Jasmeet Kaur at WESNET's 2nd Annual Technology Safety Summit that was held in Melbourne on 26-27 October 2017 in Melbourne. The Uber Safety Guide provides information [...]

By |2017-11-24T17:14:01+00:00October 30th, 2017|Categories: Tech Safety Resources|Tags: , , , |

You’ve got mail: privacy & safety tips

Many workers use email to communicate information to and about survivors. However, email is not a secure form of communication. In addition to the fact that email is not secure, it’s easy for emails to be forwarded, accidentally sent to the wrong person, or be downloaded onto many devices. There are many ways someone [...]

By |2017-07-14T09:32:15+00:00July 14th, 2017|Categories: Agency's Use of Tech|Tags: , , , |