To protect civil society organizations (CSOs) from the application of the legal barriers the following principles seek to articulate what governs and protects CSOs from repressive intrusions by government.
37 results found
Amnesty International developed Panic Button with the aim of turning an activist’s mobile phone into a secret alarm that can help them to get help fast in an emergency. The app encourages peer-to-peer security planning and response.
This guide was created by the Social Media Group within the Convio Services Team. It was designed specifically for nonprofit professionals as a means to discover and deploy successful social media programs that further your mission.
Through this toolkit VNC hopes that campaigners will acquire the following skills: An understanding of why and how information and communication technologies (ICTs) can be appropriated by women’s rights and human rights groups in their advocacy skills through their use of online tools, including networking and mobile tools for advocacy and campaigning; The ability to develop an advocacy / communication strategy; Knowing what social networking is and the various spaces and tools they could use in their online activism; An understanding of online privacy and security issues relevant to building their online activism.
This kit contains short guides for human rights defenders who find themselves in emergencies related to communication and digital security. While the kit does not provide exhaustive guidelines on how to respond to specific situations, it does suggest concrete steps, further resources and references to support groups to whom activists can turn to for further assistance.
Security in-a-box is a collaborative effort of the Tactical Technology Collective and Front Line. It was created to meet the digital security and privacy needs of advocates and human rights defenders. Security in-a-box includes a How-to Booklet, which addresses a number of important digital security issues. It also provides a collection of Hands-on Guides, each of which includes a particular freeware or open source software tool, as well as instructions on how you can use that tool to secure your computer, protect your information or maintain the privacy of your Internet communication.
This book, published by the Center for Victims of Torture – New Tactics in Human Rights Project, is a collection of 80 stories of successful tactics used for human rights work. The stories come from all over the world and range from prevention tactics to intervention tactics, restorative tactics to those that building human rights cultures and institutions.