BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//www.nyscadv.org//NONSGML kigkonsult.se iCalcreator 2.30.10//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:0a5b42e7-be0b-407c-af12-3c433b81ffac
X-WR-CALDESC:For most of us\, information technology is a central part of n
 ot only our day-to-day professional affairs\, but our personal lives as we
 ll. An unfortunate side effect is that perpetrators of physical\, emotiona
 l\, and sexual abuse have turned to technology as yet another vehicle to p
 rey on victims. But technology can also serve as a valuable resource for v
 ictims to maintain their contacts and seek help. Advocates who serve victi
 ms directly can empower them by providing accurate\, user-friendly informa
 tion about how they can use technology to protect themselves. In addition\
 , technology can make it easier for advocates to secure the identity and p
 rivacy of victims with whom they come into contact. NYSCADV has developed 
 this training to reach a broad audience. Regardless of their technological
  proficiency\, participants in this training will come away with an increa
 sed understanding of trauma-informed\, survivor-centered services in the d
 igital world.\n\nWe will cover:\n\nHow victims can use technology to stay 
 safe\;\nHow abusers misuse technology to stalk\, harass\, and threaten vic
 tims\;\nStrategies to safety plan with victims and preserve evidence for p
 otential investigations\;\nThe development and implementation of agency-le
 vel policies and practices that foster a confidential\, safe space for sur
 vivors.\n Who Should Attend:\n\nRegistration is limited to staff of NYSCAD
 V Program and Allied Membership Organizations Only.\n \nContent warning\nT
 his workshop will refer to popular social-media platforms by name and disc
 uss hypothetical examples of technological abuse based on real-world exper
 iences. Discretion is advised for anyone who has suffered a traumatic expe
 rience involving technology or knows such a victim.
X-WR-RELCALID:54e5c3ae95c3e8dcef47aeba625ea958
X-WR-TIMEZONE:America/New_York
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:STANDARD
TZNAME:EST
DTSTART:20181104T020000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RDATE:20191103T020000
RDATE:20201101T020000
END:STANDARD
BEGIN:DAYLIGHT
TZNAME:EDT
DTSTART:20190310T020000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RDATE:20200308T020000
RDATE:20210314T020000
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:e6a42a17-a9a5-40c2-ac81-ac526264bdc6
DTSTAMP:20260406T231406Z
DESCRIPTION:For most of us\, information technology is a central part of no
 t only our day-to-day professional affairs\, but our personal lives as wel
 l. An unfortunate side effect is that perpetrators of physical\, emotional
 \, and sexual abuse have turned to technology as yet another vehicle to pr
 ey on victims. But technology can also serve as a valuable resource for vi
 ctims to maintain their contacts and seek help. Advocates who serve victim
 s directly can empower them by providing accurate\, user-friendly informat
 ion about how they can use technology to protect themselves. In addition\,
  technology can make it easier for advocates to secure the identity and pr
 ivacy of victims with whom they come into contact. NYSCADV has developed t
 his training to reach a broad audience. Regardless of their technological 
 proficiency\, participants in this training will come away with an increas
 ed understanding of trauma-informed\, survivor-centered services in the di
 gital world.\n\nWe will cover:\n\nHow victims can use technology to stay s
 afe\;\nHow abusers misuse technology to stalk\, harass\, and threaten vict
 ims\;\nStrategies to safety plan with victims and preserve evidence for po
 tential investigations\;\nThe development and implementation of agency-lev
 el policies and practices that foster a confidential\, safe space for surv
 ivors.\n Who Should Attend:\n\nRegistration is limited to staff of NYSCADV
  Program and Allied Membership Organizations Only.\n \nContent warning\nTh
 is workshop will refer to popular social-media platforms by name and discu
 ss hypothetical examples of technological abuse based on real-world experi
 ences. Discretion is advised for anyone who has suffered a traumatic exper
 ience involving technology or knows such a victim.
DTSTART;TZID=America/New_York:20191003T110000
DTEND;TZID=America/New_York:20191003T120000
LOCATION:
SUMMARY:Technology Safety: Best Practices for Serving Survivors of Technolo
 gical Abuse Webinar
END:VEVENT
END:VCALENDAR
