Skip to content
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Human Rights Monitoring
    • Safety & Security in Human Rights Work
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library
  • Русский
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Human Rights Monitoring
    • Safety & Security in Human Rights Work
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library
  • Русский

The implementation process

Breadcrumb Abstract Shape
Breadcrumb Abstract Shape
Breadcrumb Abstract Shape

The implementation process

  • March 26, 2025
  • Com 0
Managing Risks: Safety and Security in Human Rights Work Module 2: Implementing Safety and Security Measures The implementation process

In this video, you will:

  • Get familiar with the third stage of the risk management process, which focuses on implementing decisions
  • Be able to develop security measures applicable to your own context
  • Learn how to develop an effective implementation plan
  • Understand what it means to develop realistic measures that can be put into practice
Main Takeaways:
  • The third stage of the risk management process focuses on the implementation of safety and security measures. It is best to approach this stage in three steps.
  • First, develop security measures. It is crucial to apply the problem-solution approach and clearly indicate the risk together with corresponding measures or solutions. A risk may have many possible measures, which can all be considered depending on the context.
  • Then, develop an implementation plan. Precise tasks are needed for each security measure, answering the questions on WHO does WHAT, WHEN, and WITH WHAT RESOURCES. If the answers are not clarified, it is likely that the task will not be done.
  • Finally, put the measures into practice. Implementing the measures means making sure that the decisions we have made are actually implemented. To put them into practice, it is crucial that the measures developed are realistic, practical, and that the allocated roles and responsibility are appropriate. 

In this video, you will:

  • Identify possible physical, digital and psychological risks, and explore effective strategies to mitigate them
  • Recognise the interconnected nature of risks and apply a holistic approach to security
  • Analyse an example of an implementation plan to understand how security measures can be put into practice
  • Differentiate between organizational and individual responsibilities in developing and implementing measures
Main takeaways:
  • The organization plays a critical role in providing and fostering a safe and secure environment for their team members. Therefore, you should always aim to balance the measures from the angle of the organization’s responsibility and not rely solely on individuals’ own protective measures.
  • Always take a holistic approach to security. Stress affects psychological well-being but may also impact behaviour and attention, potentially compromising your physical and digital security. For example, it may reduce our ability to focus, making tasks like managing online security measures more challenging.
  • The stressful nature of the work of human rights defenders may contribute to the development of unhealthy habits, such as excessive alcohol, drug consumption, or eating disorders. If you are concerned about these behaviors, you should immediately seek professional help from a doctor or psychologist. Have a look at the additional materials to learn more about stress management and well-being.
  • When drafting an implementation plan with safety and security measures, think of:
    - Person(s) responsible for each task;
    - Timeline for the implementation, making sure it matches your resources and capacities;
    - Several action points, which will allow you to tackle a risk in depth and make it easier to follow-up on.

Before moving on to the next lecture, make sure to have a look at the resources under the “Materials” tab above. There, you will find additional resources related to digital security and stress management, which will help you when taking the quiz.

Mandatory Resources:

Video Animation: Your Data and the Internet: Security Behind the Screens Video Thumbnail
Factsheet: Your Data and the Internet: Security Behind the Screens Factsheet Thumbnail
Factsheet: Well-being and Stress Management Factsheet Thumbnail
Exercise Template: The Risk Management Process Exercise Thumbnail

Recommended Resources:

📄 Security in a Toolbox, Front Line Defenders
📄 Guide: Surveillance Self-Defense, Electronic Frontier Foundation
📄 Security Planner, Consumer Reports
📄 Workbook: Overcoming Compassion Fatigue: A Practical Resilience Workbook by Martha Teater and John Ludgate
📄 Guidebook: Compassion Fatigue, Burnout and Vicarious Trauma by A Queensland Program of Assistance to Survivors of Torture and Trauma (QPASTT)
📄 Guidebook on Vicarious Trauma: Recommended Solutions for Anti-Violence Workers, by Jan I. Richardson of the Centre for Research on Violence Against Women and Children in London, Ontario for the Family Violence Prevention Unit, Health Canada
📄 Online Training (Module 4): Understanding & Addressing Vicarious Trauma by Dr. Laurie Anne Pearlman & Lisa McKay
📄 Guide to Safer Travel, Access Now

For additional resources on security and safety, feel free to also explore our Repository of Tools.

Please note that the recommended external resources listed are not managed by FreedomLab. Please exercise caution when reviewing them.

Previous Lesson
Back to Lesson
Next Topic
15_1

FreedomLab is supported by the
OSCE Office for Democratic Institutions and Human Rights.

  • About us
  • Training Center
  • Tool Library
  • Starlight Stadium
  • Contact Us
  • Privacy Policy
Icon-facebook Icon-linkedin2 X-twitter
Copyright 2025 FreedomLab. All Rights Reserved.
FreedomLab logo
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
FreedomLab logoFreedomLab
Login
Accessing this course requires a login. Please enter your credentials below!

Lost Your Password?
Register
Don't have an account? Register one!
Register an Account