Skip to content
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Managing Risks: Safety and Security in Human Rights Work
    • Human Rights Monitoring
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library
  • Русский
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Managing Risks: Safety and Security in Human Rights Work
    • Human Rights Monitoring
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library
  • Русский

Module 2: Implementing Safety and Security Measures

Breadcrumb Abstract Shape
Breadcrumb Abstract Shape
Breadcrumb Abstract Shape

Module 2: Implementing Safety and Security Measures

  • February 19, 2025
  • Com 0
Managing Risks: Safety and Security in Human Rights Work Module 2: Implementing Safety and Security Measures

“Ideally, every organization should have a comprehensive security plan – including digital security – but for smaller organizations, this is often unrealistic due to limited resources. … Our security measures have often focused on immediate, operational risk assessment rather than a comprehensive, long-term strategy. Much of this has depended on securing a donor willing to cover the associated costs—an opportunity many NGOs may not have.”
Anonymous
LGBT+ organization, Ukraine
  • Are you ever struggling with implementing measures due to financial restrictions? Think about the possible ways of tailoring the necessary security and safety measures to your capabilities.
Risk management cycle

Module 2 covers the third stage of the risk management process: the implementation of safety and security measures. Through three video lectures, you will learn how to tailor safety and security measures to fit your unique context, considering factors such as available resources, staff capacities, and organizational needs. This module blends theory with practical examples, guiding you in developing and implementing effective measures suited to your specific context. Additionally, you will gain tips on how to collaborate with external consultants to support you throughout the risk management process.

Remember to explore both topics of this module and the mandatory additional materials. After completion, you will be encouraged to apply your knowledge in an exercise and the Module 2 quiz.

Mandatory Resources:

Video Animation: Your Data and the Internet: Security Behind the Screens Video Thumbnail
Factsheet: Your Data and the Internet: Security Behind the Screens Factsheet Thumbnail
Factsheet: Well-being and Stress Management Factsheet Thumbnail
Exercise Template: The Risk Management Process Exercise Thumbnail

Recommended Resources:

📄 Security in a Toolbox, Front Line Defenders
📄 Guide: Surveillance Self-Defense, Electronic Frontier Foundation
📄 Security Planner, Consumer Reports
📄 Workbook: Overcoming Compassion Fatigue: A Practical Resilience Workbook by Martha Teater and John Ludgate
📄 Guidebook: Compassion Fatigue, Burnout and Vicarious Trauma by A Queensland Program of Assistance to Survivors of Torture and Trauma (QPASTT)
📄 Guidebook on Vicarious Trauma: Recommended Solutions for Anti-Violence Workers, by Jan I. Richardson of the Centre for Research on Violence Against Women and Children in London, Ontario for the Family Violence Prevention Unit, Health Canada
📄 Online Training (Module 4): Understanding & Addressing Vicarious Trauma by Dr. Laurie Anne Pearlman & Lisa McKay
📄 Guide to Safer Travel, Access Now

For additional resources on security and safety, feel free to also explore our Repository of Tools.

Please note that the recommended external resources listed are not managed by FreedomLab. Please exercise caution when reviewing them.

Lesson Content
0% Complete 0/2 Steps
The implementation process
Tips for working with consultants
Module 2 Quiz: Implementing Safety and Security Measures
Previous Lesson
Back to Course
Next Lesson
15_1

FreedomLab is supported by the
OSCE Office for Democratic Institutions and Human Rights.

  • About us
  • Training Center
  • Tool Library
  • Starlight Stadium
  • Contact Us
  • Privacy Policy
Icon-facebook Icon-linkedin2 X-twitter
Copyright 2025 FreedomLab. All Rights Reserved.
FreedomLab logo
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
FreedomLab logoFreedomLab
Login
Accessing this course requires a login. Please enter your credentials below!

Lost Your Password?
Register
Don't have an account? Register one!
Register an Account