Skip to content
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Managing Risks: Safety and Security in Human Rights Work
    • Human Rights Monitoring
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library
  • Русский
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Managing Risks: Safety and Security in Human Rights Work
    • Human Rights Monitoring
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library
  • Русский

Introduction: The Holistic Approach to Security

Breadcrumb Abstract Shape
Breadcrumb Abstract Shape
Breadcrumb Abstract Shape

Introduction: The Holistic Approach to Security

  • February 19, 2025
  • Com 0
Managing Risks: Safety and Security in Human Rights Work Introduction: The Holistic Approach to Security

“In my view, the approach to security must be systematic and ingrained to the point of becoming automatic. Just as we wake up in the morning and brush our teeth, adhering to digital hygiene rules should be equally automatic. Human rights organizations must act responsibly — for their own sake and for the sake of those they help.”
Tetyana Pechonchyk
ZMINA, Ukraine
  • Before starting the course, take some time to reflect on what risk management process means to you and why you would need it in your work. Think also of possible obstacles you may face when setting up the process.
Main takeaways:
  • Physical, digital, and psychological security are interconnected and should be managed collectively rather than in isolation, especially in the context of risk management.
  • Security requires continuous assessment, prioritization, and adaptation to evolving threats, ensuring effective mitigation strategies tailored to your specific context.

Remember to explore the additional materials and test your knowledge in the Introduction quiz.

Mandatory Resources:

Handout: Holistic security
Handout Thumbnail
Handout: Key concepts
Handout Thumbnail

Recommended Resources:

📄Holistic Security: A Strategy Manual for Human Rights Defenders, Tactical Technology Collective
📄Platform: The Security and Protection of Human Rights Defenders at Risk
📄Research report: “Who in their right mind wants to put up with this?” Resilience Strategies for a Sustainable Human Rights Movement, The World Organisation Against Torture (OMCT)
📄Booklet: The Psychosocial approach applied to the Protection of HRDs, Protection International
📄Handbook: The Holistic Security Protocol for Human Rights Defenders, Open Briefing

For additional resources on security and safety, feel free to also explore our Repository of Tools.

Please note that the recommended external resources listed are not managed by FreedomLab. Please exercise caution when reviewing them.

 

 

Lesson Content
Introduction Quiz: The Holistic Approach to Security
Back to Course
Next Lesson
15_1

FreedomLab is supported by the
OSCE Office for Democratic Institutions and Human Rights.

  • About us
  • Training Center
  • Tool Library
  • Starlight Stadium
  • Contact Us
  • Privacy Policy
Icon-facebook Icon-linkedin2 X-twitter
Copyright 2025 FreedomLab. All Rights Reserved.
FreedomLab logo
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
FreedomLab logoFreedomLab
Login
Accessing this course requires a login. Please enter your credentials below!

Lost Your Password?
Register
Don't have an account? Register one!
Register an Account