Skip to content
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Managing Risks: Safety and Security in Human Rights Work
    • Human Rights Monitoring
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library
  • Русский
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Managing Risks: Safety and Security in Human Rights Work
    • Human Rights Monitoring
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library
  • Русский

Monitoring, evaluation and improvement

Breadcrumb Abstract Shape
Breadcrumb Abstract Shape
Breadcrumb Abstract Shape

Monitoring, evaluation and improvement

  • February 19, 2025
  • Com 0
Managing Risks: Safety and Security in Human Rights Work Module 3: Risk Management is not a One-off Activity Monitoring, evaluation and improvement

In this video, you will:

  • Get familiar with monitoring and evaluation process of the security measures
  • Understand the cyclical nature of the risk management process and be able to identify the appropriate time for monitoring and evaluation
  • Learn who to involve in the evaluation process and why self-checks do not work in the field of security
  • Understand that risk management is a never-ending process and that monitoring and evaluation lead to improvement
Main takeaways:
  • In the monitoring and evaluation process, it is essential to have a structured plan that clearly outlines who is responsible for what, when each step will occur, and what it entails.
  • The evaluation process should involve an independent person (either internal or external) who is not directly responsible for implementing tasks, as self-checks in security are ineffective.
  • The timeline of the process depends on the nature of the tasks, their complexity, and the organization's context. Different timelines may be set for various tasks based on their deadlines or specific needs. Alternatively, the organization may choose to conduct regular check-ins – weekly, monthly, or bi-monthly – for all tasks.
  • The designated evaluator needs to collect information about which tasks have been implemented by the responsible staff, which ones were not (and why), which ones are currently in progress, what are the problems, and what is needed to accomplish the tasks. This information is then shared with the management.
  • Understanding why some security measures are not implemented is as important as tracking completed tasks, allowing management to adjust strategies accordingly. The clearer, more actionable, time-bound and realistic the assigned tasks are, higher is the chance of successful implementation.
  • Since risks, threats, and organizational contexts evolve, risk management should never be a one-time effort. It is essential to approach the process cyclically. This leads to the fifth and final stage: repeating the process. The key is to complete one cycle, capture lessons learned from each stage, and apply them to the next cycle.

Mandatory Resources:

Personal toolbox: wellbeing and stress-management
Toolbox Thumbnail
Exercise template: The risk management process
Exercise Thumbnail

Recommended Resources:

📄 Security audit framework: Safetag Project
📄 Guide: Strengthening the Inclusion, Protection and Wellbeing of Human Rights Defenders with Disabilities, Protection International
📄 Protection Manual for LGBTI Defenders, Protection International
📄 Guide: Our Rights, Our Safety: Resources for Women Human Rights Defenders, Just Associates 

For additional resources on security and safety, feel free to also explore our Repository of Tools.

Please note that the recommended external resources listed are not managed by FreedomLab. Please exercise caution when reviewing them.

Previous Lesson
Back to Lesson
Next Topic
15_1

FreedomLab is supported by the
OSCE Office for Democratic Institutions and Human Rights.

  • About us
  • Training Center
  • Tool Library
  • Starlight Stadium
  • Contact Us
  • Privacy Policy
Icon-facebook Icon-linkedin2 X-twitter
Copyright 2025 FreedomLab. All Rights Reserved.
FreedomLab logo
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
FreedomLab logoFreedomLab
Login
Accessing this course requires a login. Please enter your credentials below!

Lost Your Password?
Register
Don't have an account? Register one!
Register an Account