Skip to content
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Managing Risks: Safety and Security in Human Rights Work
    • Human Rights Monitoring
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Managing Risks: Safety and Security in Human Rights Work
    • Human Rights Monitoring
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library

Safety and Security in Human Rights Work Training

Breadcrumb Abstract Shape
Breadcrumb Abstract Shape
Breadcrumb Abstract Shape

Safety and Security in Human Rights Work Training

  • March 9, 2025
  • Com 0

Congratulations!

You have completed all the online modules of the e-learning Safety and Security training. Now it’s time to test what you have learnt so far and get your certificate from OSCE ODIHR!

Please carefully read the following text, and reply to the questions based on the collected information. Feel free to use all the resources available to you including the ones published on FreedomLab.

(1) Olga Alekseevna is a human rights defender travelling to attend a conference abroad. She is going to present a report on the situation of human rights in her country to one of the major intergovernmental organizations.

(2) She is travelling with some equipment including her mobile phone, laptop computer and USB flash drive, which contains some drafts of her report and her speech. Prior to going to the airport, Olga decides to finish her report at the local café. She connects her laptop to the public Wi-Fi and works on the report for about two hours. After finalizing her report, she decides to send it to her colleagues from the café while using her Gmail account. After doing so, she saves the report on the USB flash drive and deletes it from her computer.

(3) Olga is travelling alone, and when she goes to the airport and arrives at customs, officials who do not identify themselves approach her. They ask her directly whether she has any ‘digital devices’ with her. She is surprised and nervous and since she does not understand what ‘digital devices’ means, she answers “No”. The officials then ask her to put her bag through an x-ray scanner, and discover the USB flash drive in her bag. She is then asked to take the flash drive from her bag and hand it over to them. Olga thinks about challenging them and telling them they have no right to take her device, however she is not sure in this case what her rights are, and she is also afraid that if she argues with them, she may miss her flight and not have the chance to present her report. They ask her to wait, and they disappear into an office for fifteen minutes with her flash drive. When the officials return, they hand back her the flash drive, and wish her a pleasant flight. She is nervous throughout the flight, worrying about what has happened to her flash drive and the data that was on it. When she arrives at her destination, she wants to check if all the information saved on her USB flash drive is safe.


Time limit: 0

Quiz Summary

0 of 11 Questions completed

Questions:

Information

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading…

You must sign in or sign up to start the quiz.

You must first complete the following:

Results

Quiz complete. Results are being recorded.

Results

0 of 11 Questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 point(s), (0)

Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  1. Current
  2. Review
  3. Answered
  4. Correct
  5. Incorrect
  1. Question 1 of 11
    1. Question

    Which of the following actions of Olga Alekseevna may pose serious digital security risks? (Choose all that apply)

  2. Question 2 of 11
    2. Question

    After sending her report to the colleague from the local cafe, Olga Alekseevna receives two emails from her colleague, attaching some links for her review. Two of these emails seem to be similar but they contain two different types of information, which of them should Olga Alekseevna click on?

  3. Question 3 of 11
    3. Question
    After receiving the email from her colleague, Olga Alekseevna receives several other emails. Which of the following emails should she treat as suspicious and as a potential threat to her cyber security?

  4. Question 4 of 11
    4. Question
    How could Olga Alekseevna secure her communication with her colleagues and how she should have sent her report to them? (Choose all that apply)

  5. Question 5 of 11
    5. Question
    Is the following statement true or false? When Olga Alekseevna deleted the report and all the files with sensitive information about victims of human rights violations from her computer, the files were automatically removed from her computer.

  6. Question 6 of 11
    6. Question

    Which of the following password solutions would be the best for Olga Alekseevna?

  7. Question 7 of 11
    7. Question

    What should Olga do about her USB Stick? (Choose all that apply)

  8. Question 8 of 11
    8. Question
    After arriving in the destination country, Olga Alekseevna notices that she is being followed by an unidentified man and a woman. After arriving at her hotel, she needs to immediately head to the location of the event to present her report. Which measures should Olga Alekseevna do to mitigate the risk? (Choose all that apply)

  9. Question 9 of 11
    9. Question
    Which of the following assumptions are true? (Choose all that apply)

  10. Question 10 of 11
    10. Question

    Which one of the following shows respect for the confidentiality of information by Olga Alekseevna?

  11. Question 11 of 11
    11. Question

    Olga Alekseevna is under a lot of stress lately. What can she do to cope with that? (Choose all that apply)

15_1

FreedomLab is supported by the
OSCE Office for Democratic Institutions and Human Rights.

  • About us
  • Training Center
  • Tool Library
  • Starlight Stadium
  • Contact Us
  • Privacy Policy
Icon-facebook Icon-linkedin2 X-twitter
Copyright 2025 FreedomLab. All Rights Reserved.
FreedomLab logo
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
FreedomLab logoFreedomLab
Login
Accessing this course requires a login. Please enter your credentials below!

Lost Your Password?
Register
Don't have an account? Register one!
Register an Account