- The Modules
- Introduction to the Workshop
- Steps to Establish MRM
- Introduction to Child Rights
- Impact of Armed Conflict on Children
- The Basis of MRM:
- Processes and Political Aspects of MRM
- MRM Guiding Principles
- Child Participation
- The Basics of Information Management
- Security and Safety
- Engaging with Parties to the Conflict
- MRM Phasing Out
- Roles and Responsibilities
- Caring for Staff
- Follow-up Training
- Sample Agendas
- Reference Materials
- Evaluation of Training
Security and Safety
- For participants to gain awareness of the measures they need to take to prevent harm to victims/survivors, witnesses, sources, staff and other persons cooperating with MRM, and also to organisations.
- Participants will discuss the basics and be aware of some measures that can be taken to realistically reduce risks.
Task Force Members
|Session||Participatory presentation and plenary discussion|
|Time required||60 minutes|
|Venue requirements||Main training room|
|Equipment||Laptop, LCD projector|
|Resource person(s)||1 person with knowledge of the topic, able to enrich the presentation by providing concrete examples and lessons based on own experienc|
|Training materials||- PPT presentation on Security & Safety of victims/survivors, & witnesses|
|Documents for participants||- Handout of PPT presentation (3 slides per page with notes)|
- Checklist of things to consider when contacting a victim/survivor, witness or source of information [PDF]
|Access to materials||All the training material are included in Folder Module 10: Security and Safety|
- Introduction (15 minutes)
Commence with short examples from two or three participants or facilitators, of specific security challenges and how this was or is managed.
It is suggested that at this stage you do not get into a deep discussion on the technical points as this will be covered in the remainder of the session and time is allowed for discussion therein - and again at the end of the presentation with more examples from participants.
Tip: It is suggested that at this stage you do not get into a deep discussion on the technical points as this will be covered in the remainder of the session and time is allowed for discussion therein.
- Interactive presentation (45 minutes)
Refer to the PPT presentation and related speakers' notes on each slide. Below are a couple of suggestions on how to introduce some of the slides, to avoid presenting the entire session with the "telling mode".
Slide 2: Who requires security?
Brainstorming: Prior to showing the list ask participants whom they think requires protection
Slide 3: Show the slide of the PowerPoint presentation on the MRM Sequence.
Brainstorming: Ask participants to tell you where in the sequence does the protection of witnesses, victims/survivors and sources fit. After you get a few suggestions, answer: "throughout the sequence" and click on the slide so that a red frame will appear around the entire cycle.
Protection of witnesses and sources does not only refer to victims/survivors and witnesses of human rights violations who provide testimony, but to all persons who provide us with information and with whom we have contact in the monitoring process, and in some cases their family or associates.
Slide 4: At the title, ask participants who has the responsibility to provide security. See detailed notes on the ppt.
Slide 5: Discuss the importance of assessing security every time you go on a field trip. Detailed notes on the slide can be used as required.
Slide 6: You do not need to go through every bullet point but emphasise the need for flexibility - ask participants to share an experience when they had to change plans during a field visit.
Slide 7: Whilst we do tend to regularly review and discuss our security we are notoriously bad at how we protect information. You do not need to go through all the slides but more details are on the slide if required.
Ask participants (show of hands) how many of them:
- Lock all hard copies in a filing cabinet?
- Shred all hard copies once information is stored on a computer?
- Password all documents pertaining to individuals or incidents?
- Encrypt or at minimum password the database?
- Include individual names or other personal details in e-mails?
- Select encryption option during email transfers?
Emphasise this is an important area that most of us can improve on.
Slide 8: At the title slide ask participants if we can provide assurances.
- We can provide no guarantees but the things we do can mitigate the risks.
- Our presence can make a difference.
- Planning, assessing risks, providing confidentiality and securing information can all aid to mitigate the risks to individuals and organisations
In order to make the presentation more interesting, you should complement it by sharing concrete examples and lessons based on your own experience to illustrate some of the concepts addressed in the presentation.
- Discussion with participants (15 minutes)
Leave the last 15 minutes for discussions with participants and encourage them to share their own experiences and situations where they were confronted with protection concerns or instances where they faced threats or risk of harm and how they dealt with it.
Tip: If within your target audience there are national staff, orient the discussion towards particular security concerns faced by national staff working in the field of protection and particularly MRM and enquire about available mechanisms for their protection provided by the UN or their own organisations.