Skip to content
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Human Rights Monitoring
    • Safety & Security in Human Rights Work
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Human Rights Monitoring
    • Safety & Security in Human Rights Work
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library

Module 6: Planning a Monitoring Mission

Breadcrumb Abstract Shape
Breadcrumb Abstract Shape
Breadcrumb Abstract Shape

Module 6: Planning a Monitoring Mission

  • February 27, 2024
  • Com 0
Independent Monitoring of Freedom of Peaceful Assembly Module 6: Planning a Monitoring Mission

Adequate planning and preparation is essential before embarking on any assembly monitoring activity. In this module, we will guide you through the practical steps that every assembly monitor should follow ahead of a monitoring exercise, including gathering background information, contacting relevant law enforcement authorities and assembly organizers, conducting a security risk assessment, developing a deployment plan, organizing a pre-deployment briefing and preparing a grab bag for monitors.

In Module 6, you will:

  • Learn about the practical steps you should follow in preparation for an assembly monitoring activity
  • Understand how to gather background information prior to an assembly monitoring activity
  • Understand the importance of contacting assembly organizers and law enforcement authorities and informing them about your assembly monitoring plans
  • Understand the importance of doing a security risk assessment, developing a deployment plan and organizing a pre-deployment briefing before any assembly monitoring exercise
  • Identify what items you should carry with you when monitoring an assembly

Meet the trainer:

Picture of a trainer with the text "Orce Bonev has 15 years of experience in enhancing the protection and promotion of human rights, including in conflict and post-conflict areas and in emergency situations. His extensive experience includes human rights monitoring, reporting, capacity building, advocacy and policy development with ODIHR, three OSCE field Missions (Ukraine, Kosovo and North Macedonia), the European Parliament, national institutions and civil society."
Main takeaways:

 In preparation for an assembly monitoring activity, assembly monitoring coordinators should undertake a number of practical steps. The scale of preparation highly depends on the type of assembly monitored, the level of risk, the attitudes of the authorities towards the assembly, and the size and experience of the team of monitors deployed.

Monitors should conduct research and gather background information, including general information about the assembly, the domestic legal and institutional framework, and any previous policing challenges experienced in similar assemblies.

Monitors should contact relevant law enforcement authorities and assembly organizers and inform them about the monitoring objectives and methodology before the event. This allows monitors to gather additional information and increase awareness about the monitoring activity.

Monitors should develop a security risk assessment, identifying the threats they might be facing, any associated security risks, and the measures to mitigate them. The security risk assessment should include information regarding the assembly crowd, the assembly location and route as well as the police tactics and equipment used.

Based on the information collected through background research, meetings and the security risk assessment, monitors should prepare a deployment plan, composed of a monitoring plan and a security plan.

Monitors should organize a pre-deployment briefing to discuss monitoring plans, review the risk assessment, establish teams and delegate responsibilities.

It is a good practice for monitors to prepare a grab bag with items they might need during a monitoring exercise.

Before moving on to the quiz, we recommend you to review the main takeaways of this module, and to check the additional resources provided under the “Materials” tab above.

Recommended resources:

● OSCE/ODIHR Handbook on Monitoring Freedom of Peaceful Assembly, Second Edition, “III. Preparing to monitor”.

● OSCE/ODIHR and Council of Europe Venice Commission, Guidelines on Freedom of Peaceful Assembly, Second Edition. Section B, Explanatory Notes: “8. Monitoring Freedom of Peaceful Assembly”.

Handout:

● Grab bag list

 

 

 

 

 

 

 

 

 

 

 

 

● Preparing to monitor

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Lesson Content
Module 6 Quiz: Planning a Monitoring Mission
Previous Lesson
Back to Course
Next Lesson
15_1

FreedomLab is supported by the
OSCE Office for Democratic Institutions and Human Rights.

  • About us
  • Training Center
  • Tool Library
  • Starlight Stadium
  • Contact Us
  • Privacy Policy
Icon-facebook Icon-linkedin2 X-twitter
Copyright 2025 FreedomLab. All Rights Reserved.
FreedomLab logo
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
FreedomLab logoFreedomLab
Login
Accessing this course requires a login. Please enter your credentials below!

Lost Your Password?
Register
Don't have an account? Register one!
Register an Account