Organizational technology Practices Survey for Canadian Violence
Transcription
Organizational technology Practices Survey for Canadian Violence
Safety Net Canada Summary Report Organizational Technology Practices Survey for Canadian Violence Against Women Programs 2013 OVERVIEW This is the second survey from Safety Net Canada, a national initiative being developed by the British Columbia Society of Transition Houses (BCSTH) and the Canadian Internet Policy and Public Interest Clinic (CIPPIC) at the University of Ottawa’s School of Law. This survey augments findings from Safety Net Canada’s first Survey of Canadian Anti-violence Workers on Technology Abuse in 2012. Both surveys were adapted from the U.S. National Network to End Domestic Violence’s “Technology Survey.” Safety Net Canada addresses how technology impacts and can enhance safety, privacy, accessibility, autonomy, justice, and human rights for women, youth, and other survivors of family and domestic violence, sexual and dating violence, stalking, harassment, and abuse. The goal of our Organizational Technology Practices Survey is to better understand the types of technology being used by programs that address Violence Against Women (VAW programs) and the types of technology practices or policies used or needed by these Canadian VAW Programs. In March 2013, this self-administered online questionnaire was disseminated electronically in French and English to frontline anti-violence workers in programs across Canada (e.g. sexual assault centres, women's shelters and transition houses). Safety Net Canada analyzed 85 responses 1 from 11 Canadian provinces and territories. Most respondents work in VAW programs that support survivors of: (a) domestic/family violence, (b) sexual assault or/and domestic/family violence, or that work with (c) children who have been exposed to violence. Forty six per cent of these VAW programs were part of a larger multi-service agency. Our highest response rates came from regions where VAW associations had the capacity to repeatedly send the survey electronically to local membership. This survey demonstrates a strong need for resources that specifically address the use of technology by VAW programs and those they serve, across Canada. Canadian VAW programs use many information and communication technologies. While most VAW programs have policies or practices for faxes, email, land line, and cell/mobile phones, [Question#26] a majority also face barriers (lack of funding, time, staff, knowledge, training) in keeping up with: “how quickly technology changes and new technology appears” [Question#29]. 1 For this summary report, our analysis excluded surveys that only filled out Section A: Background Information. There is a 94% completion rate for the remaining 85 surveys. Survey responses overwhelmingly indicate these VAW programs need more training, knowledge, resources, and assistance on technology practices, technology, and privacy law. They want more technology policies, practices, and tools to be developed specifically for VAW programs that address and protect the ongoing safety, confidentiality, privacy, personal identity and security of workers, women, and children. Their priority issues include: social media/networks, 76%; electronic communications, 69%; technology safety, privacy and identity protection planning, 60%; cell/mobile phones/devices, 58%; technology use in counseling and service provision, 56%; data and databases, 55%; and, location tracking devices and services, 52% [Question#28]. For more information about Safety Net Canada and our resources, visit us at http://bcsth.ca/safetynetcanada 2 SURVEY FINDINGS SECTION A: Background Information About Your VAW Program 1. Canadian province/territory where you work: 2. Type of VAW program 3 OTHER RESPONSES 1. Shelter 2. Police-based victim services 3. 4. 5. Sans abri (dépannage) {Short term services for homeless women (or perhaps emergency and temporary services for homeless women)} Toutes formes de violence et clientèle multiproblématique {All forms of violence and women experiencing multiple social issues} Femmes violentées vivant de multiples problématiques socials {Abused women experiencing multiple social issues} 6. Women's transition house 7. Domestic violence 8. Domestic violence 9. Mothers without legal status 10. Shelter for women and children fleeing abuse 11. Women's emergency shelter 12. Violence conjugale {domestic violence) 13. Femmes et enfants en difficulté {Women and children experiencing multiple social issues} 14. Femmes en difficulté {Women experiencing multiple social issues} 3. Is your VAW program part of a larger multi-service organization? 4 4. Is your VAW program a member of any of the following provincial, territorial, Aboriginal, or national associations? RESPONSE PERCENTAGE 28% BC Society of Transition Houses Canadian Association of Sexual Assault Centres/Association Canadienne des centres contre les agressions à caractère sexuel 4% Canadian Network of Women Shelters and Transition Houses/Réseau canadien des maisons d’hébergement pour femmes 14% Ending Violence Association of BC 31% Alberta Council of Women’s Shelters 4% Family Violence Consortium of Manitoba 3% Fédération de ressources d’hébergement pour femmes violentées et en difficulté du Québec 23% Fundy Region Transition House, New Brunswick 0% Kaushee’s Place—Yukon Women’s Transition Home 0% Manitoba Association of Women’s Shelters 4% Native Women’s Association of Canada/L’Association des femmes autochtones du Canada 1% Ontario Association of Interval and Transition Houses 3% Ontario Coalition of Rape Crisis Centres 3% Ontario Native Women’s Association 0% Provincial Association of Transition Houses and Services of Saskatchewan 1% PEI Family Violence Prevention Services Inc. 0% Regroupement des maisons pour femmes victimes de violence conjugale (RMFVVC) 2% Saskatchewan Association of Sexual Assault Services 0% Transition House Association of Newfoundland and Labrador 1% Transition House Association of Nova Scotia 9% YWCA Yellowknife 1% Other: please specify 13% 5 OTHER RESPONSES 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. Ministry of Justice BC Fédération des ressources pour femmes violentées et en difficultés du Québec RIOCM, RAPSIM, FOHM, RAFSSS, CRIVIFF BC Non Profit Housing YWCA Metro Vancouver Manitoba Women's Resource Centre Network National Aboriginal Circle Against Family Violence Action ontarienne contre la violence faite aux femmes Notre organisation est une association provinciale le RMFVVC Mi'kmaq Family and Children's services Women's Centres Connect! Nova Scotia 5. What best describes your role in your agency? OTHER RESPONSES 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. Program Coordinator Program Coordinator supporting women, men, and children Women's Counsellor DG Maison d'hébergement {Shelter Executive Director} House Coordinator Mental Health Clinician Clinical Counsellor Counsellor Manager of Advocacy Agente de promotion {Promotion Officer} Provincial Coordinator 6 12. Program Supervisor 13. House Supervisor 14. Research and Evaluation Specialist 6. How many paid staff work in your VAW program/s? Answers ranged from one paid staff, to 67 paid staff. Some VAW programs reported that some of their paid staff were part-time or relief workers; those part-time staff were still counted as one staff person. The (mean) average number of paid staff for VAW programs that responded to this survey, is 12.75. If your VAW program/s is inside a larger multi-service agency, approximately how many paid staff work in your entire agency? 7. If we have questions about your survey response, may we contact you via email? If yes, please provide an email: 64 respondents provided their email address. 7 Section B: What Types of Technology Does Your VAW Program Use? 8. What Computer Operating Systems (OS) does your organization/VAW program use? 9. What types of equipment/devices does your VAW program use? RESPONSE Desktop computers Multi-purpose copier and fax machine Office phone system Corded phones USB sticks Laptops (and netbooks) Individual voicemail boxes Security/Surveillance camera for outside buildings (entrances, parking, etc.) Basic mobile/cell phones (phone plan has calls, texts, voicemail) Video/Digital camera (take photos at events, create videos, etc.) Cordless phones Cell/mobile or smart phones like iPhone, Blackberry, Android, that can access the Internet Alert devices (accessibility and safety devices that vibrate and/or flash lights when sounds go off like fire alarms, alarm clocks, door bells, etc.) Memory cards (often used in digital cameras) Computer server Standalone fax machine General voicemail box accessed by several people Web camera (plug-in device, or built into a computer; cell/mobile phone or tablet) Portable or desktop backup drives Security/Surveillance camera for inside buildings Cameras (to record evidence of abuse) Mobile tablets (iPad, Android, etc.) TTY/TDD (Teletypewriter or Telecommunications Device for the Deaf) Pagers Video phone (often used to communicate with sign language interpreters) Other (Please specify) 8 PERCENTAGE 99% 88% 85% 85% 81% 79% 60% 60% 54% 51% 48% 45% 41% 41% 36% 35% 30% 29% 29% 24% 21% 15% 10% 5% 1% 9% OTHER RESPONSES Panic buttons for staff. Press the button, and the RCMP respond. Panic button alarm systems. Appareil pour personnes sourdes à venir. {We will soon have a device for people who are deaf} Lifeline for staff security. Lifeline security pendants (x 3) Système de sécurité pour l'immeuble. {Security system for the building.} Projecteur {Projector} 10. Does your VAW program's work ever involve using equipment/devices that are personally owned by staff, volunteers, or consultants? 9 11. If yes, which technology personally owned by staff, volunteers or consultants is used onsite (in VAW program offices) and/or offsite (at the person's home and elsewhere) for VAW program work? 10 12. How do you store the information that your VAW program collects (financial files, participant records, etc.)? Response Chart Percentage Paper files in cabinets 95% In-house server (Computer server located inside your offices. Server stores some VAW program files or applications and provides access to them via your network.) 45% Individual computers only (not a network server) 38% Third-party hosted server (a server located offsite that you rent space on. Other people own the server and maintain your network security and access.) 15% Cloud computing or other online data storage 19% Other (please specify) 1. 2. 3. 4. 5. 6. 8% OTHER RESPONSES Thumb drive Data sticks Moving to a server this year. Stats on flash drives Considering networking, have a nonfunctioning network server, would like to have offsite financial data storage. Clé USB {USB} 11 13. If you use cloud computing or other online data storage to edit or store files, what do you use? OTHER RESPONSES ShareVision—SharePoint-originated database. "Solution Back up en ligne." Logiciel stats FRHFVDQ Logiciel stats FRHFVDQ VistaShare Carbonite Penelope for client files and Income Manager for fundraising...both Web-based programs Nightingale Carbonite 14. Does your VAW program (or broader organization) use databases to collect and store information about clients? (By client information, we mean information about women, youth, and children who request and/or are provided services and support.) 12 15. If yes, please describe the database/s your VAW program and/or organization use to hold information about participant? OTHER RESPONSES 1 Agency database that collects basic info for statistical purposes only. 2 Base de données fait par la Fédération des Maisons d'hébergement du Québec. {Statistics Database by the Fédération de ressources d’hébergement pour femmes violentées et en difficulté du Québec} 3 Base de données sur Excel. {Excel database.} 4 Currently our organization submits non-identifying information about clients to our funder— SK Ministry of Justice. We (a committee composed of government and shelter representatives) are in the process of developing a new system that would allow for individual shelters to save identifying info on a secure government server. Currently all identifying info is on paper. 5 Document excel sur une clé usb. {Excel document on a USB key.} 6 HIFIS 7 HIFIS . 8 HIFIS, through the federal homelessness partnering strategy. 9 HIFIS—Homeless Individuals and Families Information System . 1 Homeless Individuals and Families Information System 0 . 1 ICM—Integrated Case Management (Database used by Ministry for clients using employment services). 1 Logiciel de statistiques de la Fédération de ressources d'hébergement pour femmes violentées 2 et en difficulté du Québec (FRHFVDQ). . {Statistical Software of the Fédération de ressources d’hébergement pour femmes violentées et en difficulté du Québec.} 1 Logiciel statistiques FRHFVDQ.{Fédération de ressources d’hébergement pour femmes violentées et en difficulté du Québec’s statistical software}. 1 Logiciel statistiques FRHFVDQ. {Fédération de ressources d’hébergement pour femmes violentées et en difficulté du Québec’s statistical software}. 1 Non, mais nos membres utilisent un système très précis pour les statistiques des femmes et enfants qui ont recours à leurs services. {No, but our members are using a very precise system to gather statistics on women and children who use their services.} 13 1 Outcome Tracker (VistaShare) 1 Outcome Tracker database 1 Penelope 1 ShareVision 2 WISH (Women In Safe Housing) 2 WISH—Women in Safe Housing 1 . 2 WISH—Women in Safe Housing 2 We do collect information for statistical purposes; we do not input or store the information at our site, this information is forwarded to the Territorial Health and Social Services. 2 We use Outcome Tracker operated by VistaShare, utilized by almost all women's shelters in Alberta. 2 We use VOICES. 2 Custom-built Microsoft Access and SQL database. 2 Holds very limited non identifiable information. Secure intranet server 2 List of client names. 2 Program developed by the Fédération de ressources d'hébergement pour femmes violentées du Québec. 3 Still in progress—GRASP WISH database. 3 DSI Système de gestion de données statistiques, avec connexion sécurisée SSL et géré par une 14 compagnie externe (ProgiClix). Des copies de sauvegarde hors-site sont faites avec encryption 128 bits avec une clé générée sur le serveur (1 copie complète par jour, et une copie de sauvegarde aux 3 heures). {DSI statistical data management system with SSL security and managed by an external company (ProgiClix). Backup copies are done offsite with a 128-bit encryption key, generated on the server (one complete copy by day and a backup copy every three hours).} 3 Fichier statistique de la Fédération. {Statistical Software by the Fédération de ressources d’hébergement pour femmes violentées et en difficulté du Québec.} 3 HIFIS (Homeless Individuals and Families Information Service) 3 Sumac, based on Excel. 3 ShareVision database. Created using SharePoint. Only staff serving the client can access information. 3 ShareVision 3 7 . 3 Statistique logiciel Fédération, dossier papier et ordinateur. {Statistical Software of the Fédération de ressources d’hébergement pour femmes violentées et en difficulté du Québec; paper and computer files.} The database program used to keep records of clients is called CAM. 3 WISH 4 Excel and Windows files. 15 16. How do staff access the Internet? OTHER RESPONSES Rocket Stick used by me, when on business and in need of Internet. 17. How do participants or visitors to your VAW program access the Internet? Response Chart Percentage We do not provide any Internet access to participants or visitors 32% We run a women’s shelter or transition/interval house, and only provide wireless Internet access for shelter/house residents 31% We provide Internet access to people who visit or receive VAW program services 23% We provide participants/residents/visitors with access to an Internet network that is separate from our staff/employee network 17% Other 10% OTHER RESPONSES Finding information for them on the computer. Usage outside the residence. Nous tenons une maison d’hébergement pour femmes ou une maison de transition/2e étape et ne fournissons l’accès Internet qu’aux résidentes de la maison. 16 {We are a women's shelter or a transition house/second-stage shelter, and only provide Internet access to women who reside in the shelter.} WiFi in waiting room. Nous n'offrons aucun service direct aux femmes violentées et/ou leurs enfants dans nos bureaux. Toutefois, nous recevons parfois des consultants, ou des stagiaires, à qui nous donnons un accès Internet (sans fil, avec mot de passe général). {We do not offer direct service to abused women and/or children in our offices. However, we sometimes get consultants or trainees, to whom we give Internet access (wireless, with master password).} Par contre les hébergées de la seconde étape font leur propre abonnement internet dans leur appartement(installation déja en place). {However women residing in the second-stage shelter must get their own Internet subscription in their apartment (installation already in place).} May have network set up in future. We provide access to the Internet for the purpose of housing or job search only. This is monitored by staff. 18. Does your VAW program own or rent technology that you let participants use onsite or offsite? OTHER RESPONSES SK shelters have partnered with SaskTel to have cell/mobile phones donated to clients 17 19. Which online and social media platforms does your VAW program use? Response Chart Percentage Website Facebook Twitter Google+ YouTube or other video sharing site Blog or vlog (video online blog) Online discussion forum or chat room Pinterest Online games or virtual worlds MySpace Flickr or other photo sharing site Tumblr Reddit None Other, please specify 73% 44% 21% 13% 13% 9% 3% 3% 3% 1% 1% 0% 0% 21% 4% OTHER RESPONSES Professional listserv Intranet DOODLE 20. Why does your VAW program use social media? Response Chart Percentage Education/Awareness 91% Outreach to women 64% Fundraising 52% Connect with other advocates, agencies, and allies 52% Not sure 5% Other, please specify 7% 18 OTHER RESPONSES Get picture of male partner from Facebook. We have not as of yet used, only our website. We don't. Connect with community members. 21. How does your VAW program staff your social media presence? Response Chart Percentage Have one or more staff who share the job of updating our social media presence 41% Have a dedicated person to manage our social media presence 26% Have a communications person whose job includes managing our social media 26% Other, please specify 20% OTHER RESPONSES 1. Pay honorarium, no one here has time. 2. Have hired someone to create a website. 3. Outside resource. 4. Website is old, was put up years ago, not sure who maintains it but it's not all that in-depth or useful. 5. Responsibility of ED (Executive Director). 6. Self. 7. One staff, as a side job. 8. Usually me, although I have farmed out to term staff a few times. 9. Volunteer. 19 22. Are any of these technologies used in office or offsite to communicate with or about women/youth/children who are the VAW program’s service recipients? Corded phones 92% 6% DON'T KNOW 3% Fax machines 92% 6% 2% Email 87% 13% 0% Cell/Mobile phones 81% 16% 3% Caller ID (to screen, identify or sometimes block callers) 69% 31% 0% Text messages 57% 40% 3% Cordless phones 51% 43% 6% Electronic faxes (faxes received via email) 48% 46% 7% Relay services (Third party operator relays communications between the technology used by your worker, and the offsite person who is deaf, hard of hearing, or has speech disabilities) 23% 67% 9% Internet-based phones (VoIP [Voice-over Internet Protocol] services like Skype, Vonage, Google Voice, use the Internet rather than a traditional phone line) 17% 78% 5% Video Communication Software (such as iLink, GoToMeeting, Skype, so survivors/service recipients can communicate with attorneys, friends, family, etc.) 10% 81% 10% Pagers 2% 95% 2% Instant Messaging (online chats such as AIM, Google Chat) 5% 92% 3% Video Remote Interpreter Services (uses a webcam or video phone to connect the survivor/client and worker to an offsite sign language translator) 2% 93% 5% TECHNOLOGY YES 20 NO Section 3: Policies and Practices 23. What technology security and maintenance practices do you have to manage your VAW program’s technologies? Anti-virus/anti-spyware protection installed on your individual office computers 97% 0% DON'T KNOW 3% If your office has wireless Internet, is it protected with a password? 86% 5% 8% Anti-virus/anti-spyware protection installed on your VAW program/agency server 67% 25% 8% Does your agency provide a unique user name and password to each person who must access your agency’s computers or networked server? 63% 33% 6% A dedicated Information Technology (IT) staff person or IT company/consultant who manages your VAW program’s IT needs 55% 37% 8% If your office has wireless Internet, have you taken other security steps such as enabling strong encryption or limiting access to known computers/devices (by MAC address)? 27% 35% 38% SECURITY PRACTICES YES NO 24. If you have databases that store confidential, private, and identifying information about people, does your organization do any of the following practices? Response Chart Percentage Password-protect the database 86% Provide a unique user name and password to each VAW program worker who has access to use the database 76% Limit access to databases based on job roles. This may include limiting access to certain fields and client records. 73% Ensure that third party IT consultants do not view the records in the database when fixing problems, doing routine maintenance or upgrades 59% Other 10% 21 25. Does your VAW program/organization have policies and practices that address safety, privacy, confidentiality, and security for the following technologies? BEING DON'T DEVELOPED KNOW 53% 26% 21% POLICIES / PRACTICES ON YES Providing Internet access for participants Participant's use of technology the VAW program owns and makes available: desktop computers, cell/mobile phones, video games, etc. 47% 25% 27% Recording or retaining photo or video images (whether for evidence collection or security/surveillance) 43% 35% 22% Participant's use of personally owned technology devices and services (laptops, cell/mobile phones, tablets, cameras, location sharing or mapping) onsite 42% 27% 31% Social media: Regarding work-related social media use 40% 40% 20% Social media: Regarding personal (non-work-related) social media use 39% 39% 22% Staff/worker use of personally owned technology onsite or offsite for the VAW program’s work 37% 32% 31% Using Virtual Private Networks (VPN) to access files remotely 25% 39% 36% Use of location mapping, tracking, sharing, or tagging devices and services in all aspects of your work 23% 44% 33% 26. Does your VAW program have policies and practices that address safety, privacy, confidentiality, and security for using technology when communicating with or about the women, youth, and children, and others who contact you or receive services and support? Fax machines and e-faxes 70% 14% BEING DEVELOPED 8% Land line corded and cordless phones 66% 12% 13% 10% Email 63% 18% 12% 8% Cell/Mobile phones 63% 14% 14% 8% Text messages 31% 46% 13% 11% Social media 31% 38% 18% 15% POLICIES / PRACTICES ON YES 22 N/A DON'T KNOW 8% Technology personally owned by staff 14% 19% 9% 5% Webcams or video phones 18% 59% 11% 14% Online counselling or service provision 12% 41% 6% 6% Location mapping, tracking, sharing, or tagging tools 17% 52% 17% 17% "Pay As You Go" phones 14% 71% 5% 10% Instant Messaging 13% 58% 13% 18% Relay services 9% 69% 9% 15% Pagers 7% 77% 5% 12% Remote video interpreter services 4% 79% 8% 11% 27. If your organization is a provincial, territorial, Aboriginal, or national association that has a primary purpose of representing and supporting local community-based VAW programs, are you working with your membership to develop policy and practice standards for VAW programs? 23 28. Which organizational technology policy and practice standards would your VAW program most like to see developed to address and protect safety, confidentiality, privacy, personal identity, and security of workers, women, and children? Response Chart Percentage Social media and networking 76% Electronic communication (email, instant messages, texts, phones, VoIP [Voice over Internet Protocol], webcams, video conferencing, Skype, etc.) 69% Technology safety and privacy planning 60% Cell/mobile phones and other devices 58% Technology use in counseling and service provision (email, real time instant messaging, live video, group chat rooms, video conferencing, Internet-based phone calls, etc.) 56% Data and databases 55% Location tracking, mapping, sharing, and tagging devices and services 52% Identity protection planning 50% Evidence collection 37% Other, please specify 8% OTHER RESPONSES This is ongoing as technology changes. Very uncertain what is needed. Education programs for clients, so they are aware of technology use [that] can put them at risk. 24 29. What barriers does your VAW program face in developing technology policies and practices that address safety, confidentiality, privacy, personal identity, and security issues? Response Chart Percentage Lack of funding 68% Lack of time 66% Lack of knowledge or training on technology, or on security steps 62% Need more examples, samples, or adaptable templates of technology policies and practices for VAW programs 59% How quickly technology changes and new technology appears 58% Lack of staff 49% Lack of knowledge or training on privacy and confidentiality laws and regulations 46% How often technology companies (like Google, Facebook, Twitter) change their privacy policies 30% 30. Do you have technology practices or policies you are using that you really like? (If so, let us know if you are willing to share examples for other VAW programs.) 25 31. Is there anything else you would like to share with us in this survey? RESPONSES 1. We often support clients in high risk situations who are using social media networks such as Facebook. They are being hacked into by the ex-partners who have often abused them, who infiltrate their personal information and post and send compromising photos from our client's Facebook. Text messaging and emails are also often used to harass women. 2. Some of these questions do not apply to us simply because we use technology, but not to a great extent. We have a web site and think about using social media, but...at times the risks outweigh the outcomes. We would like to develop standards for using technology to protect confidentiality and privacy. 3. Nous sommes très heureuses d'avoir pu compléter ce sondage en français. Ainsi, nous souhaiterions également que la documentation qui sera produite en lien avec les enjeux rapportés dans ce sondage soit également disponible en français, de même que le rapport qui sera rédigé suite à la compilation et à l'agrégation des résultats du sondage, et aussi pour les séminaires et les formations qui seront éventuellement organisés et donnés. Merci! Cela dit, nous comprenons que souvent, les ressources pour la traduction sont limitées. C'est pourquoi nous souhaitons tout de même recevoir toutes les ressources documentaires et les informations sur la tenue de séminaires Web en anglais, lorsque ces dernières ne sont pas disponibles en français. {We are very happy to have been able to complete this survey in French. Thus, we would also like the documentation to be produced in connection with the issues reported in this survey to be also available in French, as well as the report that will be written after the compilation and aggregation of the survey results; and also the seminars and training that will eventually be organized and delivered. Thank you! That being said, we understand that often, translation resources are limited. That is why we would still like to receive all information resources and information on holding webinars in English, when these are not available in French.} 4. There were a couple of spots that I wish I had the option to answer N/A. I am 50+, covering a maternity leave for someone 30 years old. She’d have been a much better person to complete this survey, as she uses more technology when working her job than I do. 5. Now I am worried about how much we don't know, and aren't doing! 6. We would really be interested in having access to templates of technology policies and practices in order to develop some for our organization. 7. Learning curve is so great, and [there are] time constraints. Current policies (e.g. using an administrative log while accessing personal email) not being followed by on-duty staff. Frustration, as I don't want to eliminate Internet access, hoping the [clients] would be reading and researching. 26 32. Would you like more information in the future when we have webinars and resource materials available? If yes, please provide the email address/es you want us to send announcements about future trainings and resources: There were 54 email addresses entered. We thank you in advance and acknowledge NNEDV Safety Net for letting us adapt their survey. Your answers will help inform the work of Safety Net Canada. 27