Contents related to "Equipment"
Event | February 23, 2018
In a context where Data Protection is a major and increasingly important issue, this training will help you to identify and mitigate your potential vulnerabilities.
Library Document | September 15, 2017
This guide provides an in-depth investigation of the use of drones in humanitarian crises.
Library Document | April 7, 2017
Research from the cyber security company Synack detailing a method used by hackers to access any virtual call made via Skype.
Library Document | March 23, 2017
This guide provides a simple, easy-to-use guide for non-security experts to quickly set up basic safety, security and risk management systems in new contexts or rapid onset emergency response situations.
Library Document | September 2, 2016
The Holistic Security manual adopts an explicitly 'holistic' approach to security and protection strategies for human rights defenders by integrating and highlighting the interrelatedness of digital security, psycho-social well-being and organisational security processes.
Library Document | April 18, 2016
This booklet is a simple and practical guide for transitional settlement and reconstruction practitioners. It aims to provide basic background information on asbestos and its associated health risks. It provides key recommendations for minimising the risks of dealing with asbestos in post-disaster transitional settlement and reconstruction operations and suggests further reading sources for more in-depth technical information.
Library Document | February 4, 2016
This Access Brief explores several technological options organized in three broad areas integral to securing and sustaining humanitarian access: access to information; physical access; and enhancing quality and monitoring resource use.
Library Document | December 22, 2015
This guide provides a comprehensive look at potential uses for satphones in repressive regimes.
News Item | November 23, 2015
At least sixteen hospitals were bombed in Syria, Afghanistan and Yemen over the past few weeks. Powerful nations carried out the aerial bombing campaigns that damaged infrastructure and killed humanitarian staff and civilians. However, the circumstances are usually disputed. Perhaps it is time the humanitarian community installed black boxes to record such events? This article presents a device that records forensic evidence of what happened where, when and who did it. It is a call to the humanitarian community to take part in generating the evidence that will force states to take their responsibilities in protecting humanitarian work seriously.
Library Document | October 20, 2015
Working with independent comms consultants Champollion and experienced comms experts, Charity Comms has produced a practical guide to creating and implementing a crisis comms plan.