Location: Ginn Parlour, 1233 Preservation Park Way, Oakland, CA 94612
Date: Monday, March 9, 9:00 - 5:00 pm
Trainings
Please find below a list of many of the trainings that the Progressive Technology Project has conducted over the years. Each training contains links to materials used in the trainings.
Materials
Materials will not be printed for you at the training. If you want a paper copy, please download and print before you come.
For all days, please review the Starter Ground Rules
Materials
Materials will not be printed for you at the training. If you want a paper copy, please download and print before you come.
For all days, please review the Starter Ground Rules
Logistics
- Date and time: Wednesday, March 20, 10 - 6:00 pm
- Location: Robin Hood Foundation, 826 Broadway, 9th floor.
Agenda
Morning
- 10:00 - 10:30 - Logistics, welcome, introductions, ice breaker
- 10:30 - 11:15 - Powerbase/Organizing Components exercise: It's not about you, it's about what you do
- 11:15 - 12:15 - Demonstration of Powerbase capabilities
Materials
Materials will not be printed for you at the training. If you want a paper copy, please download and print before you come.
Materials
Materials will not be printed for you at the training. If you want a paper copy, please download and print before you come.
See below for 40 practice CSV contact import spread sheets. Please choose the sheet based on the number in your training user name.








































Agenda
- Intros & Go Around:
- What other questions or concerns do you have related to Digital Security?
- Is there anything else missing from your digital security plan?
- Discuss questions
- Wrap Up & Evaluation
Resources:
Agenda
Welcome & Overview
- Introductions
- Goals of Today's Training
- Discuss Proposed PowerBase Workflow for Tenant Organizing for Right to Counsel Campaign's Outputs & Outcomes
- Logging in to PowerBase
Entering Tenant Buildings & Tenant Contacts
Agenda
Welcome & Overview
- What tools are you using for sharing files and storing files?
Criteria
- CIA: Confidentiality, Integrity, Accessibility
- Risk assessment: Who are you protecting your data from?
- Subpoena risks?
- Organizational culture
Options - common tools used for sharing files
What is good about these methods? What is bad about these methods?