Program Outline 2017-10-24T13:03:08+00:00

Program

Important to know

The program will take place over two full days, starting at 9 AM on Thursday 26 October with registration starting at 8:30 AM. The summit will close at 5 PM on Friday 27 October. We’ll have a mix of plenaries and concurrent workshops, so you’ll have plenty to choose from. A light lunch and morning and afternoon teas will be provided.

Keynote speakers

We’re very excited to have great keynote speakers, including:

  • Mr. Andrew Scott, Telstra’s Head of Technology
  • Ms. Cindy Southworth, Safety Net Founder
  • Ms. Julie Inman Grant, eSafety Commissioner
  • Ms. Julie Oberin, Chair of WESNET
  • Ms. Karen Bentley, Director of Safety Net Australia
  • Ms. Noelle Martin, Survivor and advocate
  • Ms. Celeste Liddle, Blogger/Activist

Day 1 – Thursday 26 October 2017

Please note – the program may be subject to some minor changes in timing and sessions.  The final program will be provided to participants at registration.

8:30 – 9.00AM

Registration

9.00 – 10:15AM

Welcome and acknowledgement of country | Julie Oberin, National Chairperson, WESNET


Keynote | Andrew Scott, Head of Technology, Telstra


Keynote | Cindy Southworth, Founder of Safety Net and Executive Vice President, National Network to End Domestic Violence

10:15 – 10:45AM

Framing the Summit | Karen Bentley, National Director of Safety Net Australia, WESNET

Technology-facilitated abuse can be a very broad issue. Taking an overview of the purpose and goals of the Technology Safety Summit, this session will set out the context and framework for the rest of the programme.

10:45 – 11:00AM

Morning tea

11:00 – 12:30PM

Technology facilitated abuse: the fundamentals

Learn fundamental technology safety concepts, and the technologies that are most often misused in the context of domestic violence and sexual assault.  Choose from three workshop options:


Phones and location | Erica Olsen

Discover the different ways a phone can track a survivor’s location, how a survivor’s location information gets shared, and explore strategies for increasing location privacy.


Online spaces and abuse | Heidi Guldbaek

Learn how abusers misuse online spaces; identify privacy and safety risks associated with online data; and review strategies survivors can use to protect their online privacy.


Networks and surveillance | Kaofeng Lee

Learn how different devices, such as computers, cameras, and wi-fi routers can be used to spy on survivors; discuss how to identify devices that are being used to surveil; and learn strategies and solutions that are useful for survivors.

12:30 – 1:30PM

Lunch

1:30 – 3:00PM

(Repeated from above) Technology facilitated abuse: the fundamentals

Learn fundamental technology safety concepts, and the technologies that are most often misused in the context of domestic violence and sexual assault.  Choose from three workshop options:


Phones and location | Erica Olsen


Online spaces and abuse | Heidi Guldbaek


Networks and surveillance | Kaofeng Lee

3:00 – 3:15PM

Afternoon tea

3:15 – 3:45PM

Keynote | Noelle Martin

3:50 – 4:50PM

Working together: a cross-sector dialogue

Addressing technology facilitated abuse in domestic violence and sexual assault cases is more than the work of just one sector. It requires a strong systems response to holistically address the needs of survivors, and to hold offenders accountable. This panel will explore approaches, lessons learned, and challenges of working together to address technology facilitated domestic violence and sexual abuse in our communities. This panel will offer perspectives from a range of different sectors including front-line NGO services, US and Australian law enforcement, legal services, and government.

4:50 – 5:00PM

Close | Julie Oberin

Day 2 – Friday 27 October 2017

9:00 – 10:15AM

Technology safety for women with disabilities | Bonnie Millen and Erica Olsen

For some survivors of abuse, the importance of safe access to technology is heightened due to disability. Explore what technology safety means for women with disabilities in the context of domestic violence, including those reliant on assistive technologies.


Investigating technology facilitated abuse: American & Australian perspective | Marc Hogan and Bryan Franke

When perpetrators use technology to stalk, harass and intimidate victims, law enforcement often faces additional challenges in investigating and prosecuting these crimes. Investigating these crimes can be time-intensive because of the increased amount of information that needs to be analysed; resource-intensive because in some cases new investigative tools need to be used; and difficult to prosecute because current laws may be too restrictive. Presented by two law enforcement experts, this session will explore how they manage these realities, while investigating and holding offenders accountable.


Internet of things: living in a digitally connected world | Kaofeng Lee and Mohammed Ayyoob Ahamed Hamza

As smart technologies become a common part of daily life, many are worried about the security and privacy of these devices. Particularly for survivors of domestic violence and sexual abuse, smart technologies may be used by perpetrators to threaten their privacy and safety. This workshop will discuss issues and concerns for survivors of domestic violence and sexual assault when perpetrators misuse smart technologies in survivors’ homes. The workshop includes an overview of privacy and security issues as well as practical tips on the internet of things.

10:15 – 10:30AM

Morning tea

10:30 – 11:00AM

Keynote | Julie Inman Grant, eSafety Commission

11:05 – 12:20PM

Image-based abuse | Nicola Henry and Karen Bentley

‘Revenge porn’ is a media-generated term that is used to refer to the non-consensual sharing of intimate images by jilted ex-lovers on social media or via mobile phones. While this term has been instrumental in raising attention to new forms of technology-facilitated abuse, many reject the term as being overly narrow and misleading. Increasingly the preferred alternative term is image-based abuse or image-based sexual abuse. This presentation explores the terminology challenges, as well as the scope, nature, prevalence, causes and impacts of image-based sexual abuse. Responses to this issue are also explored, including civil and criminal justice responses, primary prevention campaigns, and other mechanisms that aim to provide some relief to victims.


What’s hAPPening in the world of apps | Kaofeng Lee

Panelists: Amanda Karpeles (Safe Tag), Emily Maguire (SmartSafe+), Rina Garner (Daisy)

This workshop will examine three popular smartphone apps that can be useful for survivors of domestic violence and sexual assault. Developers of these apps will discuss their apps’ purpose, how they work, and take questions from the audience.

Attendees are welcome to download the app before they attend the session:


Legal responses to technology-facilitated domestic violence | Helen Campbell and Leanne Sinclair

It can be tricky trying to figure out what legal options your clients have when they are victims of technology-facilitated abuse. This session will cover the legal implications and remedies relating to technology-facilitated abuse in Commonwealth, Victorian and New South Wales jurisdictions, including harassment via technology, non-consensual sharing of images, and stalking/surveillance.


Uber Listening Session | Cindy Southworth and Uber

Cindy Southworth, with the U.S National Network to End Domestic Violence and a member of the Uber Safety Advisory Board, will join Uber to co-facilitate an optional listening session. We invite you to join us and share your questions, ideas, and concerns about Uber and the role technology plays in on-demand transportation. Uber is a technology application that connects riders and drivers — providing mobility options for riders and flexible economic opportunities for drivers. Women are not just riders in the backseat, but also earning money as drivers behind the wheel.

12:20 – 1:10PM

Lunch

1:10 – 2:10PM

Q&A with technology companies | Cindy Southworth

What are technology companies doing to address violence against women and technology facilitated abuse? Hear from Facebook, Google and Telstra, in a conversation facilitated by Cindy Southworth.

2:10 – 2:15PM

Break

2:15 – 3:30PM

Facebook: Practical safety tips workshop and audience feedback | Mia Garlick

Dive into specific security and privacy settings that survivors and practitioners can use to increase their safety on Facebook. Even if you think you are on top of your Facebook settings, this workshop will cover some of the lesser known tools and offer practical guidance and tips. Presented by Facebook staff, you will have a chance to ask questions and provide feedback to Facebook.


Securing your home network | Bryan Franke

The last home revolution was indoor plumbing and electricity. Today’s home revolution is the home wireless network. It connects more than just laptops and smartphones; a home wireless network connects gaming consoles, television, digital assistants, and even smart devices. This workshop will discuss ways to secure your home wireless network and other security considerations when using wi-fi.


Tech abuse in diverse communities 

Explore the nuances of technology safety, digital inclusion and technology-facilitated abuse, as they relate specifically to women from culturally and linguistically diverse communities. This session is an opportunity to identify service, program and knowledge gaps, barriers to tech safety and digital inclusion for these groups, and opportunities for collaboration.

3:30 – 3:45PM

Afternoon tea

3:45 – 4:15PM

Keynote Celeste Liddle

4:15 – 4:50PM

What’s next: emerging technology and innovative tools | Julie Oberin

Join technology safety experts from Australia and the US in this panel session as they talk tech, including emerging issues and topics around technology-facilitated abuse. You will be given a glimpse into various technologies that they are seeing in the field or currently emerging, such as spyware, internet of things, and virtual reality. We’ll also dip into how tech can be used for good through counter speech, empowerment, and evidence.

4:50 – 5:00PM

Close