Skip to content
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Managing Risks: Safety and Security in Human Rights Work
    • Human Rights Monitoring
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library
  • Русский
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Managing Risks: Safety and Security in Human Rights Work
    • Human Rights Monitoring
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library
  • Русский

Tips for working with consultants

Breadcrumb Abstract Shape
Breadcrumb Abstract Shape
Breadcrumb Abstract Shape

Tips for working with consultants

  • March 26, 2025
  • Com 0
Managing Risks: Safety and Security in Human Rights Work Module 2: Implementing Safety and Security Measures Tips for working with consultants

Please note that while this video presents fictional examples of working with a digital security expert, the tips shared can be applied when working with consultants on any risk management topic.

In this video, you will:

  • Recognize when external support is necessary for effective risk management
  • Gain practical tips on working effectively with experts and consultants
Main takeaways:
  • Risk management is a collective effort; seeking external expertise can help address complex security needs holistically.
  • Proper preparation ahead of engaging and clear communication ensures productive relationship with consultants and maximises use of available resources.
  • Experts and consultants need to understand the organisations’ unique context to suggest relevant, and customized solutions rather than offering generic advice. Risk management should be seen as an ongoing process, not a quick fix. Short-term solutions often fail to address underlying risks.
  • Ask experts for clear communication and active listening. Clarify any jargon they use, and do not hesitate to ask questions.
  • Consultants and experts should be aware of their limits and acknowledge them. While they can offer advice, the decision-making power always rests with you. Build trust with experts and, based on their advice, make decisions that are best suited to your context.
Exercise
Tailor the risk management process to your context

 As we progress through the risk management cycle, take a moment to reflect again and continue filling out the risk management process exercise.

Building on the findings from your previous exercise, try to:

  • Decide how to address the risks you identified (Step 2)
  • Develop appropriate security measures for the risks, and outline specific tasks for each measure/solution (Step 3)

To go further, consider whether external assistance might be needed and what kind of support could help. If you feel confident in your understanding and can organize the risk management process without external help, that is perfectly fine!

Click here to start the exercise

Before moving on to the quiz, we recommend you to review the main takeaways of this module, and to check the additional resources provided under the “Materials” tab above.

Mandatory Resources:

Video Animation: Your Data and the Internet: Security Behind the Screens Video Thumbnail
Factsheet: Your Data and the Internet: Security Behind the Screens Factsheet Thumbnail
Factsheet: Well-being and Stress Management Factsheet Thumbnail
Exercise Template: The Risk Management Process Exercise Thumbnail

Recommended Resources:

📄 Security in a Toolbox, Front Line Defenders
📄 Guide: Surveillance Self-Defense, Electronic Frontier Foundation
📄 Security Planner, Consumer Reports
📄 Workbook: Overcoming Compassion Fatigue: A Practical Resilience Workbook by Martha Teater and John Ludgate
📄 Guidebook: Compassion Fatigue, Burnout and Vicarious Trauma by A Queensland Program of Assistance to Survivors of Torture and Trauma (QPASTT)
📄 Guidebook on Vicarious Trauma: Recommended Solutions for Anti-Violence Workers, by Jan I. Richardson of the Centre for Research on Violence Against Women and Children in London, Ontario for the Family Violence Prevention Unit, Health Canada
📄 Online Training (Module 4): Understanding & Addressing Vicarious Trauma by Dr. Laurie Anne Pearlman & Lisa McKay
📄 Guide to Safer Travel, Access Now

For additional resources on security and safety, feel free to also explore our Repository of Tools.

Please note that the recommended external resources listed are not managed by FreedomLab. Please exercise caution when reviewing them.

Quizzes
Module 2 Quiz: Implementing Safety and Security Measures
Previous Topic
Back to Lesson
Next Lesson
15_1

FreedomLab is supported by the
OSCE Office for Democratic Institutions and Human Rights.

  • About us
  • Training Center
  • Tool Library
  • Starlight Stadium
  • Contact Us
  • Privacy Policy
Icon-facebook Icon-linkedin2 X-twitter
Copyright 2025 FreedomLab. All Rights Reserved.
FreedomLab logo
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
FreedomLab logoFreedomLab
Login
Accessing this course requires a login. Please enter your credentials below!

Lost Your Password?
Register
Don't have an account? Register one!
Register an Account