Organizational technology Practices Survey for Canadian Violence

Transcription

Organizational technology Practices Survey for Canadian Violence
Safety Net Canada Summary Report
Organizational Technology Practices Survey
for Canadian Violence Against Women
Programs 2013
OVERVIEW
This is the second survey from Safety Net Canada, a national initiative being developed by the
British Columbia Society of Transition Houses (BCSTH) and the Canadian Internet Policy and
Public Interest Clinic (CIPPIC) at the University of Ottawa’s School of Law. This survey augments
findings from Safety Net Canada’s first Survey of Canadian Anti-violence Workers on Technology
Abuse in 2012. Both surveys were adapted from the U.S. National Network to End Domestic
Violence’s “Technology Survey.”
Safety Net Canada addresses how technology impacts and can enhance safety, privacy,
accessibility, autonomy, justice, and human rights for women, youth, and other survivors of
family and domestic violence, sexual and dating violence, stalking, harassment, and abuse. The
goal of our Organizational Technology Practices Survey is to better understand the types of
technology being used by programs that address Violence Against Women (VAW programs) and
the types of technology practices or policies used or needed by these Canadian VAW Programs.
In March 2013, this self-administered online questionnaire was disseminated electronically in
French and English to frontline anti-violence workers in programs across Canada (e.g. sexual
assault centres, women's shelters and transition houses). Safety Net Canada analyzed 85
responses 1 from 11 Canadian provinces and territories. Most respondents work in VAW
programs that support survivors of: (a) domestic/family violence, (b) sexual assault or/and
domestic/family violence, or that work with (c) children who have been exposed to violence.
Forty six per cent of these VAW programs were part of a larger multi-service agency. Our
highest response rates came from regions where VAW associations had the capacity to
repeatedly send the survey electronically to local membership.
This survey demonstrates a strong need for resources that specifically address the use of
technology by VAW programs and those they serve, across Canada. Canadian VAW programs
use many information and communication technologies. While most VAW programs have
policies or practices for faxes, email, land line, and cell/mobile phones, [Question#26] a
majority also face barriers (lack of funding, time, staff, knowledge, training) in keeping up with:
“how quickly technology changes and new technology appears” [Question#29].
1
For this summary report, our analysis excluded surveys that only filled out Section A: Background Information.
There is a 94% completion rate for the remaining 85 surveys.
Survey responses overwhelmingly indicate these VAW programs need more training,
knowledge, resources, and assistance on technology practices, technology, and privacy law.
They want more technology policies, practices, and tools to be developed specifically for VAW
programs that address and protect the ongoing safety, confidentiality, privacy, personal identity
and security of workers, women, and children. Their priority issues include: social
media/networks, 76%; electronic communications, 69%; technology safety, privacy and identity
protection planning, 60%; cell/mobile phones/devices, 58%; technology use in counseling and
service provision, 56%; data and databases, 55%; and, location tracking devices and services,
52% [Question#28].
For more information about Safety Net Canada and our resources, visit us at
http://bcsth.ca/safetynetcanada
2
SURVEY FINDINGS
SECTION A: Background Information About Your VAW Program
1. Canadian province/territory where you work:
2. Type of VAW program
3
OTHER RESPONSES
1.
Shelter
2.
Police-based victim services
3.
4.
5.
Sans abri (dépannage) {Short term services for homeless women (or perhaps emergency
and temporary services for homeless women)}
Toutes formes de violence et clientèle multiproblématique {All forms of violence and
women experiencing multiple social issues}
Femmes violentées vivant de multiples problématiques socials
{Abused women experiencing multiple social issues}
6.
Women's transition house
7.
Domestic violence
8.
Domestic violence
9.
Mothers without legal status
10.
Shelter for women and children fleeing abuse
11.
Women's emergency shelter
12.
Violence conjugale {domestic violence)
13.
Femmes et enfants en difficulté {Women and children experiencing multiple social issues}
14.
Femmes en difficulté {Women experiencing multiple social issues}
3. Is your VAW program part of a larger multi-service organization?
4
4. Is your VAW program a member of any of the following provincial, territorial, Aboriginal, or
national associations?
RESPONSE
PERCENTAGE
28%
BC Society of Transition Houses
Canadian Association of Sexual Assault Centres/Association Canadienne des
centres contre les agressions à caractère sexuel
4%
Canadian Network of Women Shelters and Transition Houses/Réseau canadien
des maisons d’hébergement pour femmes
14%
Ending Violence Association of BC
31%
Alberta Council of Women’s Shelters
4%
Family Violence Consortium of Manitoba
3%
Fédération de ressources d’hébergement pour femmes violentées et en
difficulté du Québec
23%
Fundy Region Transition House, New Brunswick
0%
Kaushee’s Place—Yukon Women’s Transition Home
0%
Manitoba Association of Women’s Shelters
4%
Native Women’s Association of Canada/L’Association des femmes autochtones
du Canada
1%
Ontario Association of Interval and Transition Houses
3%
Ontario Coalition of Rape Crisis Centres
3%
Ontario Native Women’s Association
0%
Provincial Association of Transition Houses and Services of Saskatchewan
1%
PEI Family Violence Prevention Services Inc.
0%
Regroupement des maisons pour femmes victimes de violence conjugale
(RMFVVC)
2%
Saskatchewan Association of Sexual Assault Services
0%
Transition House Association of Newfoundland and Labrador
1%
Transition House Association of Nova Scotia
9%
YWCA Yellowknife
1%
Other: please specify
13%
5
OTHER RESPONSES
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
Ministry of Justice BC
Fédération des ressources pour femmes violentées et en difficultés du Québec
RIOCM, RAPSIM, FOHM, RAFSSS, CRIVIFF
BC Non Profit Housing
YWCA Metro Vancouver
Manitoba Women's Resource Centre Network
National Aboriginal Circle Against Family Violence
Action ontarienne contre la violence faite aux femmes
Notre organisation est une association provinciale le RMFVVC
Mi'kmaq Family and Children's services
Women's Centres Connect! Nova Scotia
5. What best describes your role in your agency?
OTHER RESPONSES
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
Program Coordinator
Program Coordinator supporting women, men, and children
Women's Counsellor
DG Maison d'hébergement {Shelter Executive Director}
House Coordinator
Mental Health Clinician
Clinical Counsellor
Counsellor
Manager of Advocacy
Agente de promotion {Promotion Officer}
Provincial Coordinator
6
12. Program Supervisor
13. House Supervisor
14. Research and Evaluation Specialist
6. How many paid staff work in your VAW program/s?
Answers ranged from one paid staff, to 67 paid staff. Some VAW programs reported that some of their
paid staff were part-time or relief workers; those part-time staff were still counted as one staff person.
The (mean) average number of paid staff for VAW programs that responded to this survey, is 12.75.
If your VAW program/s is inside a larger multi-service agency, approximately how many paid
staff work in your entire agency?
7. If we have questions about your survey response, may we contact you via email? If yes,
please provide an email:
64 respondents provided their email address.
7
Section B: What Types of Technology Does Your VAW Program Use?
8. What Computer Operating Systems (OS) does your organization/VAW program use?
9. What types of equipment/devices does your VAW program use?
RESPONSE
Desktop computers
Multi-purpose copier and fax machine
Office phone system
Corded phones
USB sticks
Laptops (and netbooks)
Individual voicemail boxes
Security/Surveillance camera for outside buildings (entrances, parking, etc.)
Basic mobile/cell phones (phone plan has calls, texts, voicemail)
Video/Digital camera (take photos at events, create videos, etc.)
Cordless phones
Cell/mobile or smart phones like iPhone, Blackberry, Android, that can access the
Internet
Alert devices (accessibility and safety devices that vibrate and/or flash lights when
sounds go off like fire alarms, alarm clocks, door bells, etc.)
Memory cards (often used in digital cameras)
Computer server
Standalone fax machine
General voicemail box accessed by several people
Web camera (plug-in device, or built into a computer; cell/mobile phone or tablet)
Portable or desktop backup drives
Security/Surveillance camera for inside buildings
Cameras (to record evidence of abuse)
Mobile tablets (iPad, Android, etc.)
TTY/TDD (Teletypewriter or Telecommunications Device for the Deaf)
Pagers
Video phone (often used to communicate with sign language interpreters)
Other (Please specify)
8
PERCENTAGE
99%
88%
85%
85%
81%
79%
60%
60%
54%
51%
48%
45%
41%
41%
36%
35%
30%
29%
29%
24%
21%
15%
10%
5%
1%
9%
OTHER RESPONSES
Panic buttons for staff. Press the button, and the RCMP respond.
Panic button alarm systems.
Appareil pour personnes sourdes à venir.
{We will soon have a device for people who are deaf}
Lifeline for staff security.
Lifeline security pendants (x 3)
Système de sécurité pour l'immeuble.
{Security system for the building.}
Projecteur
{Projector}
10. Does your VAW program's work ever involve using equipment/devices that are personally
owned by staff, volunteers, or consultants?
9
11. If yes, which technology personally owned by staff, volunteers or consultants is used
onsite (in VAW program offices) and/or offsite (at the person's home and elsewhere) for
VAW program work?
10
12. How do you store the information that your VAW program collects (financial files,
participant records, etc.)?
Response
Chart
Percentage
Paper files in cabinets
95%
In-house server (Computer server located
inside your offices. Server stores some VAW
program files or applications and provides
access to them via your network.)
45%
Individual computers only (not a network
server)
38%
Third-party hosted server (a server located
offsite that you rent space on. Other people
own the server and maintain your network
security and access.)
15%
Cloud computing or other online data storage
19%
Other (please specify)
1.
2.
3.
4.
5.
6.
8%
OTHER RESPONSES
Thumb drive
Data sticks
Moving to a server this year.
Stats on flash drives
Considering networking, have a nonfunctioning network server, would like to have offsite
financial data storage.
Clé USB
{USB}
11
13. If you use cloud computing or other online data storage to edit or store files, what do you
use?
OTHER RESPONSES
ShareVision—SharePoint-originated database.
"Solution Back up en ligne."
Logiciel stats FRHFVDQ
Logiciel stats FRHFVDQ
VistaShare
Carbonite
Penelope for client files and Income Manager for fundraising...both Web-based programs
Nightingale
Carbonite
14. Does your VAW program (or broader organization) use databases to collect and store
information about clients? (By client information, we mean information about women,
youth, and children who request and/or are provided services and support.)
12
15. If yes, please describe the database/s your VAW program and/or organization use to hold
information about participant?
OTHER RESPONSES
1 Agency database that collects basic info for statistical purposes only.
2 Base de données fait par la Fédération des Maisons d'hébergement du Québec.
{Statistics Database by the Fédération de ressources d’hébergement pour femmes violentées
et en difficulté du Québec}
3 Base de données sur Excel.
{Excel database.}
4 Currently our organization submits non-identifying information about clients to our funder—
SK Ministry of Justice. We (a committee composed of government and shelter
representatives) are in the process of developing a new system that would allow for individual
shelters to save identifying info on a secure government server. Currently all identifying info is
on paper.
5 Document excel sur une clé usb.
{Excel document on a USB key.}
6 HIFIS
7 HIFIS
.
8 HIFIS, through the federal homelessness partnering strategy.
9 HIFIS—Homeless Individuals and Families Information System
.
1 Homeless Individuals and Families Information System
0
.
1 ICM—Integrated Case Management (Database used by Ministry for clients using employment
services).
1 Logiciel de statistiques de la Fédération de ressources d'hébergement pour femmes violentées
2 et en difficulté du Québec (FRHFVDQ).
. {Statistical Software of the Fédération de ressources d’hébergement pour femmes violentées
et en difficulté du Québec.}
1 Logiciel statistiques FRHFVDQ.{Fédération de ressources d’hébergement pour femmes
violentées et en difficulté du Québec’s statistical software}.
1 Logiciel statistiques FRHFVDQ.
{Fédération de ressources d’hébergement pour femmes violentées et en difficulté du
Québec’s statistical software}.
1 Non, mais nos membres utilisent un système très précis pour les statistiques des femmes et
enfants qui ont recours à leurs services.
{No, but our members are using a very precise system to gather statistics on women and
children who use their services.}
13
1 Outcome Tracker (VistaShare)
1 Outcome Tracker database
1 Penelope
1 ShareVision
2 WISH (Women In Safe Housing)
2 WISH—Women in Safe Housing
1
.
2 WISH—Women in Safe Housing
2 We do collect information for statistical purposes; we do not input or store the information at
our site, this information is forwarded to the Territorial Health and Social Services.
2 We use Outcome Tracker operated by VistaShare, utilized by almost all women's shelters in
Alberta.
2 We use VOICES.
2 Custom-built Microsoft Access and SQL database.
2 Holds very limited non identifiable information. Secure intranet server
2 List of client names.
2 Program developed by the Fédération de ressources d'hébergement pour femmes violentées
du Québec.
3 Still in progress—GRASP WISH database.
3 DSI Système de gestion de données statistiques, avec connexion sécurisée SSL et géré par une
14
compagnie externe (ProgiClix). Des copies de sauvegarde hors-site sont faites avec encryption
128 bits avec une clé générée sur le serveur (1 copie complète par jour, et une copie de
sauvegarde aux 3 heures).
{DSI statistical data management system with SSL security and managed by an external
company (ProgiClix). Backup copies are done offsite with a 128-bit encryption key, generated
on the server (one complete copy by day and a backup copy every three hours).}
3 Fichier statistique de la Fédération.
{Statistical Software by the Fédération de ressources d’hébergement pour femmes violentées
et en difficulté du Québec.}
3 HIFIS (Homeless Individuals and Families Information Service)
3 Sumac, based on Excel.
3 ShareVision database. Created using SharePoint. Only staff serving the client can access
information.
3 ShareVision
3
7
.
3
Statistique logiciel Fédération, dossier papier et ordinateur.
{Statistical Software of the Fédération de ressources d’hébergement pour femmes violentées
et en difficulté du Québec; paper and computer files.}
The database program used to keep records of clients is called CAM.
3 WISH
4 Excel and Windows files.
15
16. How do staff access the Internet?
OTHER RESPONSES
Rocket Stick used by me, when on business and in need of Internet.
17. How do participants or visitors to your VAW program access the Internet?
Response
Chart
Percentage
We do not provide any Internet access to participants
or visitors
32%
We run a women’s shelter or transition/interval
house, and only provide wireless Internet access for
shelter/house residents
31%
We provide Internet access to people who visit or
receive VAW program services
23%
We provide participants/residents/visitors with access
to an Internet network that is separate from our
staff/employee network
17%
Other
10%
OTHER RESPONSES
Finding information for them on the computer.
Usage outside the residence.
Nous tenons une maison d’hébergement pour femmes ou une maison de transition/2e étape
et ne fournissons l’accès Internet qu’aux résidentes de la maison.
16
{We are a women's shelter or a transition house/second-stage shelter, and only provide
Internet access to women who reside in the shelter.}
WiFi in waiting room.
Nous n'offrons aucun service direct aux femmes violentées et/ou leurs enfants dans nos
bureaux. Toutefois, nous recevons parfois des consultants, ou des stagiaires, à qui nous
donnons un accès Internet (sans fil, avec mot de passe général).
{We do not offer direct service to abused women and/or children in our offices. However, we
sometimes get consultants or trainees, to whom we give Internet access (wireless, with master
password).}
Par contre les hébergées de la seconde étape font leur propre abonnement internet dans leur
appartement(installation déja en place).
{However women residing in the second-stage shelter must get their own Internet subscription
in their apartment (installation already in place).}
May have network set up in future.
We provide access to the Internet for the purpose of housing or job search only. This is
monitored by staff.
18. Does your VAW program own or rent technology that you let participants use onsite or
offsite?
OTHER RESPONSES
SK shelters have partnered with SaskTel to have cell/mobile phones donated to clients
17
19. Which online and social media platforms does your VAW program use?
Response
Chart
Percentage
Website
Facebook
Twitter
Google+
YouTube or other video
sharing site
Blog or vlog (video online
blog)
Online discussion forum or
chat room
Pinterest
Online games or virtual worlds
MySpace
Flickr or other photo sharing
site
Tumblr
Reddit
None
Other, please specify
73%
44%
21%
13%
13%
9%
3%
3%
3%
1%
1%
0%
0%
21%
4%
OTHER RESPONSES
Professional listserv
Intranet
DOODLE
20. Why does your VAW program use social media?
Response
Chart
Percentage
Education/Awareness
91%
Outreach to women
64%
Fundraising
52%
Connect with other advocates,
agencies, and allies
52%
Not sure
5%
Other, please specify
7%
18
OTHER RESPONSES
Get picture of male partner from Facebook.
We have not as of yet used, only our website.
We don't.
Connect with community members.
21. How does your VAW program staff your social media presence?
Response
Chart
Percentage
Have one or more staff who share the job of
updating our social media presence
41%
Have a dedicated person to manage our social
media presence
26%
Have a communications person whose job
includes managing our social media
26%
Other, please specify
20%
OTHER RESPONSES
1.
Pay honorarium, no one here has time.
2.
Have hired someone to create a website.
3.
Outside resource.
4.
Website is old, was put up years ago, not sure who maintains it but it's not all that in-depth
or useful.
5.
Responsibility of ED (Executive Director).
6.
Self.
7.
One staff, as a side job.
8.
Usually me, although I have farmed out to term staff a few times.
9.
Volunteer.
19
22. Are any of these technologies used in office or offsite to communicate with or about
women/youth/children who are the VAW program’s service recipients?
Corded phones
92%
6%
DON'T
KNOW
3%
Fax machines
92%
6%
2%
Email
87%
13%
0%
Cell/Mobile phones
81%
16%
3%
Caller ID (to screen, identify or sometimes block callers)
69%
31%
0%
Text messages
57%
40%
3%
Cordless phones
51%
43%
6%
Electronic faxes (faxes received via email)
48%
46%
7%
Relay services (Third party operator relays communications
between the technology used by your worker, and the offsite
person who is deaf, hard of hearing, or has speech disabilities)
23%
67%
9%
Internet-based phones (VoIP [Voice-over Internet Protocol]
services like Skype, Vonage, Google Voice, use the Internet
rather than a traditional phone line)
17%
78%
5%
Video Communication Software (such as iLink, GoToMeeting,
Skype, so survivors/service recipients can communicate with
attorneys, friends, family, etc.)
10%
81%
10%
Pagers
2%
95%
2%
Instant Messaging (online chats such as AIM, Google Chat)
5%
92%
3%
Video Remote Interpreter Services (uses a webcam or video
phone to connect the survivor/client and worker to an offsite
sign language translator)
2%
93%
5%
TECHNOLOGY
YES
20
NO
Section 3: Policies and Practices
23. What technology security and maintenance practices do you have to manage your VAW
program’s technologies?
Anti-virus/anti-spyware protection installed on your individual
office computers
97%
0%
DON'T
KNOW
3%
If your office has wireless Internet, is it protected with a
password?
86%
5%
8%
Anti-virus/anti-spyware protection installed on your VAW
program/agency server
67%
25%
8%
Does your agency provide a unique user name and password to
each person who must access your agency’s computers or
networked server?
63%
33%
6%
A dedicated Information Technology (IT) staff person or IT
company/consultant who manages your VAW program’s IT
needs
55%
37%
8%
If your office has wireless Internet, have you taken other
security steps such as enabling strong encryption or limiting
access to known computers/devices (by MAC address)?
27%
35%
38%
SECURITY PRACTICES
YES
NO
24. If you have databases that store confidential, private, and identifying information about
people, does your organization do any of the following practices?
Response
Chart
Percentage
Password-protect the database
86%
Provide a unique user name and password
to each VAW program worker who has
access to use the database
76%
Limit access to databases based on job roles.
This may include limiting access to certain
fields and client records.
73%
Ensure that third party IT consultants do not
view the records in the database when fixing
problems, doing routine maintenance or
upgrades
59%
Other
10%
21
25. Does your VAW program/organization have policies and practices that address safety,
privacy, confidentiality, and security for the following technologies?
BEING
DON'T
DEVELOPED KNOW
53%
26%
21%
POLICIES / PRACTICES ON
YES
Providing Internet access for participants
Participant's use of technology the VAW program owns and
makes available: desktop computers, cell/mobile phones,
video games, etc.
47%
25%
27%
Recording or retaining photo or video images (whether for
evidence collection or security/surveillance)
43%
35%
22%
Participant's use of personally owned technology devices and
services (laptops, cell/mobile phones, tablets, cameras,
location sharing or mapping) onsite
42%
27%
31%
Social media: Regarding work-related social media use
40%
40%
20%
Social media: Regarding personal (non-work-related) social
media use
39%
39%
22%
Staff/worker use of personally owned technology onsite or
offsite for the VAW program’s work
37%
32%
31%
Using Virtual Private Networks (VPN) to access files remotely
25%
39%
36%
Use of location mapping, tracking, sharing, or tagging devices
and services in all aspects of your work
23%
44%
33%
26. Does your VAW program have policies and practices that address safety, privacy,
confidentiality, and security for using technology when communicating with or about the
women, youth, and children, and others who contact you or receive services and support?
Fax machines and e-faxes
70%
14%
BEING
DEVELOPED
8%
Land line corded and cordless phones
66%
12%
13%
10%
Email
63%
18%
12%
8%
Cell/Mobile phones
63%
14%
14%
8%
Text messages
31%
46%
13%
11%
Social media
31%
38%
18%
15%
POLICIES / PRACTICES ON
YES
22
N/A
DON'T
KNOW
8%
Technology personally owned by staff
14%
19%
9%
5%
Webcams or video phones
18%
59%
11%
14%
Online counselling or service provision
12%
41%
6%
6%
Location mapping, tracking, sharing, or
tagging tools
17%
52%
17%
17%
"Pay As You Go" phones
14%
71%
5%
10%
Instant Messaging
13%
58%
13%
18%
Relay services
9%
69%
9%
15%
Pagers
7%
77%
5%
12%
Remote video interpreter services
4%
79%
8%
11%
27. If your organization is a provincial, territorial, Aboriginal, or national association that has
a primary purpose of representing and supporting local community-based VAW programs, are
you working with your membership to develop policy and practice standards for VAW
programs?
23
28. Which organizational technology policy and practice standards would your VAW program
most like to see developed to address and protect safety, confidentiality, privacy, personal
identity, and security of workers, women, and children?
Response
Chart
Percentage
Social media and networking
76%
Electronic communication (email, instant
messages, texts, phones, VoIP [Voice over
Internet Protocol], webcams, video
conferencing, Skype, etc.)
69%
Technology safety and privacy planning
60%
Cell/mobile phones and other devices
58%
Technology use in counseling and service
provision (email, real time instant
messaging, live video, group chat rooms,
video conferencing, Internet-based phone
calls, etc.)
56%
Data and databases
55%
Location tracking, mapping, sharing, and
tagging devices and services
52%
Identity protection planning
50%
Evidence collection
37%
Other, please specify
8%
OTHER RESPONSES
This is ongoing as technology changes.
Very uncertain what is needed.
Education programs for clients, so they are aware of technology use [that] can put them at
risk.
24
29. What barriers does your VAW program face in developing technology policies and
practices that address safety, confidentiality, privacy, personal identity, and security issues?
Response
Chart
Percentage
Lack of funding
68%
Lack of time
66%
Lack of knowledge or training on technology,
or on security steps
62%
Need more examples, samples, or adaptable
templates of technology policies and
practices for VAW programs
59%
How quickly technology changes and new
technology appears
58%
Lack of staff
49%
Lack of knowledge or training on privacy and
confidentiality laws and regulations
46%
How often technology companies (like
Google, Facebook, Twitter) change their
privacy policies
30%
30. Do you have technology practices or policies you are using that you really like? (If so, let
us know if you are willing to share examples for other VAW programs.)
25
31. Is there anything else you would like to share with us in this survey?
RESPONSES
1.
We often support clients in high risk situations who are using social media networks such as
Facebook. They are being hacked into by the ex-partners who have often abused them, who
infiltrate their personal information and post and send compromising photos from our client's
Facebook. Text messaging and emails are also often used to harass women.
2.
Some of these questions do not apply to us simply because we use technology, but not to a
great extent. We have a web site and think about using social media, but...at times the risks
outweigh the outcomes. We would like to develop standards for using technology to protect
confidentiality and privacy.
3.
Nous sommes très heureuses d'avoir pu compléter ce sondage en français. Ainsi, nous
souhaiterions également que la documentation qui sera produite en lien avec les enjeux
rapportés dans ce sondage soit également disponible en français, de même que le rapport qui
sera rédigé suite à la compilation et à l'agrégation des résultats du sondage, et aussi pour les
séminaires et les formations qui seront éventuellement organisés et donnés. Merci! Cela dit,
nous comprenons que souvent, les ressources pour la traduction sont limitées. C'est pourquoi
nous souhaitons tout de même recevoir toutes les ressources documentaires et les
informations sur la tenue de séminaires Web en anglais, lorsque ces dernières ne sont pas
disponibles en français.
{We are very happy to have been able to complete this survey in French. Thus, we would also
like the documentation to be produced in connection with the issues reported in this survey to
be also available in French, as well as the report that will be written after the compilation and
aggregation of the survey results; and also the seminars and training that will eventually be
organized and delivered. Thank you! That being said, we understand that often, translation
resources are limited. That is why we would still like to receive all information resources and
information on holding webinars in English, when these are not available in French.}
4.
There were a couple of spots that I wish I had the option to answer N/A. I am 50+, covering a
maternity leave for someone 30 years old. She’d have been a much better person to complete
this survey, as she uses more technology when working her job than I do.
5.
Now I am worried about how much we don't know, and aren't doing!
6.
We would really be interested in having access to templates of technology policies and
practices in order to develop some for our organization.
7.
Learning curve is so great, and [there are] time constraints. Current policies (e.g. using an
administrative log while accessing personal email) not being followed by on-duty staff.
Frustration, as I don't want to eliminate Internet access, hoping the [clients] would be reading
and researching.
26
32. Would you like more information in the future when we have webinars and resource
materials available?
If yes, please provide the email address/es you want us to send announcements about future
trainings and resources:
There were 54 email addresses entered.
We thank you in advance and acknowledge NNEDV Safety Net for letting us adapt their
survey. Your answers will help inform the work of Safety Net Canada.
27