SlideShare a Scribd company logo
1 of 1
1. Exercise prudence
Limit the collection of personal information;
include only information that is necessary.
2. Protect and secure information
from/about migrants
Pay attention to mitigating risks from both
technological and human factors.
3. Provide training
Ensure that volunteers and staff are aware and trained
regarding privacy- and security-related protocols.
Empower migrants to be more privacy aware.
4. Share-alike
Work with collaborators and partners to improve privacy and
security practices, based on on-going evaluation and
refinement.
5. Non-discrimination
Provide humanitarian services to everybody, including those
who prefer not to share their personal information.
Results
1) HIA-related risks involve both technology and
people:
• University of Nepantla: Low-tech method for students to
avoid cameras at highly photographed events
• La Resaca: No budget. Third-party services often
manage and store their databases to guarantee the data
is secured.
2) Need for clear guidelines for HIA:
• University of Nepantla: Only higher-ranking staff
members receive training on FERPA and in privacy and
security.
• La Resaca: normally no concrete sets of privacy
standards or do not provide privacy-related training to
employees and volunteers. Learning on-the-go, external,
or if required by funders.
3) Privacy self-management is not enough:
• University of Nepantla: leave it up to the students to
disclose their status, except for matters of tuition and
financial aid. Help them set their privacy settings on
Facebook. They do not feel they have the right to tell
students what they should and should not do.
• La Resaca: Staff members dedicate time to their clients
to make sure they understand what they are agreeing to.
They have concerns because their clients may not have
access to the tools, knowledge, and resources needed to
make appropriate privacy decisions.
Privacy and Security Guidelines
for Humanitarian Work with
Undocumented Migrants
Sara Vannini, Ricardo Gomez, Bryce Newell
GUIDELINES for HO Privacy and Security-related Protocols
Humanitarian Information Activities
HIA = All “activities and programs which may include the
collection, storage, processing, analysis, further use,
transmission, and public release of data and other forms
of information by humanitarian actors and/or affected
communities” (Greenwood et al., 2017 )
Related Work
1) HIA-related risks involve both technology and
people:
• leaks, hacks
• negligently handling information
2) Need for clear guidelines for HIA:
• gaps in HIA law standards
• data protection rights insufficient on informed
consent
• lack of a single accepted definition of
accountability
3) Privacy self-management is not enough:
• might resonate with the idea of empowering
people
• vulnerable populations have higher risk of
making ill-informed or non-careful decisions
• vulnerable people might not have the ability to
opt-out
Methodology
• Interviews with 9 staff members. Different roles:
executive directors, coordinators, legal advisors,
and IT directors.
• 4 different advocacy groups
• 2 higher education institutions
• US West Coast
[UNHCR, 2016]

More Related Content

Similar to Privacy and Security guidelines for Humanitarian Work with Undocumented Migrants

Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataTecnoIncentive
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExEADTU
 
Security Awareness and Training
Security Awareness and TrainingSecurity Awareness and Training
Security Awareness and TrainingPriyank Hada
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
Data Ethics and Privacy.pdf
Data Ethics and Privacy.pdfData Ethics and Privacy.pdf
Data Ethics and Privacy.pdfAmirKhan811717
 
“Access denied”? Barriers for staff accessing, using and sharing published in...
“Access denied”? Barriers for staff accessing, using and sharing published in...“Access denied”? Barriers for staff accessing, using and sharing published in...
“Access denied”? Barriers for staff accessing, using and sharing published in...Catherine Ebenezer
 
DWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxDWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxcaniceconsulting
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...Damir Delija
 
Groningen Declaration: Digitizing Data to Empower Students, Improve Integrity...
Groningen Declaration: Digitizing Data to Empower Students, Improve Integrity...Groningen Declaration: Digitizing Data to Empower Students, Improve Integrity...
Groningen Declaration: Digitizing Data to Empower Students, Improve Integrity...Cheryl DarrupBoychuck
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 versionJohan Koren
 
Responsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdfResponsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdfStefaan Verhulst
 
Transformation of Continuity Through Technology
Transformation of Continuity Through TechnologyTransformation of Continuity Through Technology
Transformation of Continuity Through TechnologyHeather Blanchard
 
Access denied? Managing access to the Web within the NHS in England: technolo...
Access denied? Managing access to the Web within the NHS in England: technolo...Access denied? Managing access to the Web within the NHS in England: technolo...
Access denied? Managing access to the Web within the NHS in England: technolo...Catherine Ebenezer
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014emilyensign
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKTrilateral Research
 
Balancing cost, quality and access with care in online education: the role of...
Balancing cost, quality and access with care in online education: the role of...Balancing cost, quality and access with care in online education: the role of...
Balancing cost, quality and access with care in online education: the role of...University of South Africa (Unisa)
 
Week1discussioncapstone
Week1discussioncapstoneWeek1discussioncapstone
Week1discussioncapstonebradbury234
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 

Similar to Privacy and Security guidelines for Humanitarian Work with Undocumented Migrants (20)

Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded data
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
 
Security Awareness and Training
Security Awareness and TrainingSecurity Awareness and Training
Security Awareness and Training
 
1200 clare sanderon hse ireland
1200 clare sanderon hse ireland1200 clare sanderon hse ireland
1200 clare sanderon hse ireland
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
Data Ethics and Privacy.pdf
Data Ethics and Privacy.pdfData Ethics and Privacy.pdf
Data Ethics and Privacy.pdf
 
“Access denied”? Barriers for staff accessing, using and sharing published in...
“Access denied”? Barriers for staff accessing, using and sharing published in...“Access denied”? Barriers for staff accessing, using and sharing published in...
“Access denied”? Barriers for staff accessing, using and sharing published in...
 
DWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxDWEL - Module 5 final.pptx
DWEL - Module 5 final.pptx
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...
 
Groningen Declaration: Digitizing Data to Empower Students, Improve Integrity...
Groningen Declaration: Digitizing Data to Empower Students, Improve Integrity...Groningen Declaration: Digitizing Data to Empower Students, Improve Integrity...
Groningen Declaration: Digitizing Data to Empower Students, Improve Integrity...
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
 
Responsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdfResponsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdf
 
Transformation of Continuity Through Technology
Transformation of Continuity Through TechnologyTransformation of Continuity Through Technology
Transformation of Continuity Through Technology
 
Access denied? Managing access to the Web within the NHS in England: technolo...
Access denied? Managing access to the Web within the NHS in England: technolo...Access denied? Managing access to the Web within the NHS in England: technolo...
Access denied? Managing access to the Web within the NHS in England: technolo...
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACK
 
Balancing cost, quality and access with care in online education: the role of...
Balancing cost, quality and access with care in online education: the role of...Balancing cost, quality and access with care in online education: the role of...
Balancing cost, quality and access with care in online education: the role of...
 
Week1discussioncapstone
Week1discussioncapstoneWeek1discussioncapstone
Week1discussioncapstone
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Public deck
Public deckPublic deck
Public deck
 

More from Sara Vannini

Visual Methodologies in Participatory ICT4D
Visual Methodologies in Participatory ICT4DVisual Methodologies in Participatory ICT4D
Visual Methodologies in Participatory ICT4DSara Vannini
 
Unmasking ICT through visual methodologies in participatory ICT4D
Unmasking ICT through visual methodologies in participatory ICT4DUnmasking ICT through visual methodologies in participatory ICT4D
Unmasking ICT through visual methodologies in participatory ICT4DSara Vannini
 
towards a conceptualization of digital sanctuary
towards a conceptualization of digital sanctuarytowards a conceptualization of digital sanctuary
towards a conceptualization of digital sanctuarySara Vannini
 
Mobile phones and other information practices among undocumented migrants at ...
Mobile phones and other information practices among undocumented migrants at ...Mobile phones and other information practices among undocumented migrants at ...
Mobile phones and other information practices among undocumented migrants at ...Sara Vannini
 
Fotohistorias - Security and Activism: using participatory photography to eli...
Fotohistorias - Security and Activism: using participatory photography to eli...Fotohistorias - Security and Activism: using participatory photography to eli...
Fotohistorias - Security and Activism: using participatory photography to eli...Sara Vannini
 
Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...
Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...
Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...Sara Vannini
 
FOTOHISTORIAS: vidas en la frontera, en EEUU y en el territorio.
FOTOHISTORIAS:  vidas en la frontera, en EEUU y en el territorio.FOTOHISTORIAS:  vidas en la frontera, en EEUU y en el territorio.
FOTOHISTORIAS: vidas en la frontera, en EEUU y en el territorio.Sara Vannini
 
Dissertation Defense - Social Representations of CMCs in Mozambique
Dissertation Defense - Social Representations of CMCs in MozambiqueDissertation Defense - Social Representations of CMCs in Mozambique
Dissertation Defense - Social Representations of CMCs in MozambiqueSara Vannini
 
RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...
RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...
RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...Sara Vannini
 
Participatory re-action: reflecting on a Design-Based Research approach in ICT4D
Participatory re-action: reflecting on a Design-Based Research approach in ICT4DParticipatory re-action: reflecting on a Design-Based Research approach in ICT4D
Participatory re-action: reflecting on a Design-Based Research approach in ICT4DSara Vannini
 
Reasons for non-use: a study on Mozambican telecentres,
 Reasons for non-use: a study on Mozambican telecentres, Reasons for non-use: a study on Mozambican telecentres,
Reasons for non-use: a study on Mozambican telecentres,Sara Vannini
 
Photo-Elicitation @ CIRN 2013
Photo-Elicitation @ CIRN 2013Photo-Elicitation @ CIRN 2013
Photo-Elicitation @ CIRN 2013Sara Vannini
 
Formal & Informal Learning practices in Community Multimedia Centres in Mozam...
Formal & Informal Learning practices in Community Multimedia Centres in Mozam...Formal & Informal Learning practices in Community Multimedia Centres in Mozam...
Formal & Informal Learning practices in Community Multimedia Centres in Mozam...Sara Vannini
 
PhD progresses @ 4th Cross-Field Residential Seminar
PhD progresses @ 4th Cross-Field Residential SeminarPhD progresses @ 4th Cross-Field Residential Seminar
PhD progresses @ 4th Cross-Field Residential SeminarSara Vannini
 
IFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation study
IFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation studyIFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation study
IFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation studySara Vannini
 
RE-ACT @ Crossfield
RE-ACT @ CrossfieldRE-ACT @ Crossfield
RE-ACT @ CrossfieldSara Vannini
 
Inbound and Outbound Information and Communication Flows
Inbound and Outbound Information and Communication FlowsInbound and Outbound Information and Communication Flows
Inbound and Outbound Information and Communication FlowsSara Vannini
 
Intro ai Telecentri e ai CMC in Mozambico
Intro ai Telecentri e ai CMC in MozambicoIntro ai Telecentri e ai CMC in Mozambico
Intro ai Telecentri e ai CMC in MozambicoSara Vannini
 
Intro to ICT4D, digital divide, and telecentres
Intro to ICT4D, digital divide, and telecentresIntro to ICT4D, digital divide, and telecentres
Intro to ICT4D, digital divide, and telecentresSara Vannini
 
Social Representations of CMCs in Mozambique: work in progress @ TASCHA
Social Representations of CMCs in Mozambique: work in progress @ TASCHASocial Representations of CMCs in Mozambique: work in progress @ TASCHA
Social Representations of CMCs in Mozambique: work in progress @ TASCHASara Vannini
 

More from Sara Vannini (20)

Visual Methodologies in Participatory ICT4D
Visual Methodologies in Participatory ICT4DVisual Methodologies in Participatory ICT4D
Visual Methodologies in Participatory ICT4D
 
Unmasking ICT through visual methodologies in participatory ICT4D
Unmasking ICT through visual methodologies in participatory ICT4DUnmasking ICT through visual methodologies in participatory ICT4D
Unmasking ICT through visual methodologies in participatory ICT4D
 
towards a conceptualization of digital sanctuary
towards a conceptualization of digital sanctuarytowards a conceptualization of digital sanctuary
towards a conceptualization of digital sanctuary
 
Mobile phones and other information practices among undocumented migrants at ...
Mobile phones and other information practices among undocumented migrants at ...Mobile phones and other information practices among undocumented migrants at ...
Mobile phones and other information practices among undocumented migrants at ...
 
Fotohistorias - Security and Activism: using participatory photography to eli...
Fotohistorias - Security and Activism: using participatory photography to eli...Fotohistorias - Security and Activism: using participatory photography to eli...
Fotohistorias - Security and Activism: using participatory photography to eli...
 
Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...
Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...
Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...
 
FOTOHISTORIAS: vidas en la frontera, en EEUU y en el territorio.
FOTOHISTORIAS:  vidas en la frontera, en EEUU y en el territorio.FOTOHISTORIAS:  vidas en la frontera, en EEUU y en el territorio.
FOTOHISTORIAS: vidas en la frontera, en EEUU y en el territorio.
 
Dissertation Defense - Social Representations of CMCs in Mozambique
Dissertation Defense - Social Representations of CMCs in MozambiqueDissertation Defense - Social Representations of CMCs in Mozambique
Dissertation Defense - Social Representations of CMCs in Mozambique
 
RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...
RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...
RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...
 
Participatory re-action: reflecting on a Design-Based Research approach in ICT4D
Participatory re-action: reflecting on a Design-Based Research approach in ICT4DParticipatory re-action: reflecting on a Design-Based Research approach in ICT4D
Participatory re-action: reflecting on a Design-Based Research approach in ICT4D
 
Reasons for non-use: a study on Mozambican telecentres,
 Reasons for non-use: a study on Mozambican telecentres, Reasons for non-use: a study on Mozambican telecentres,
Reasons for non-use: a study on Mozambican telecentres,
 
Photo-Elicitation @ CIRN 2013
Photo-Elicitation @ CIRN 2013Photo-Elicitation @ CIRN 2013
Photo-Elicitation @ CIRN 2013
 
Formal & Informal Learning practices in Community Multimedia Centres in Mozam...
Formal & Informal Learning practices in Community Multimedia Centres in Mozam...Formal & Informal Learning practices in Community Multimedia Centres in Mozam...
Formal & Informal Learning practices in Community Multimedia Centres in Mozam...
 
PhD progresses @ 4th Cross-Field Residential Seminar
PhD progresses @ 4th Cross-Field Residential SeminarPhD progresses @ 4th Cross-Field Residential Seminar
PhD progresses @ 4th Cross-Field Residential Seminar
 
IFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation study
IFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation studyIFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation study
IFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation study
 
RE-ACT @ Crossfield
RE-ACT @ CrossfieldRE-ACT @ Crossfield
RE-ACT @ Crossfield
 
Inbound and Outbound Information and Communication Flows
Inbound and Outbound Information and Communication FlowsInbound and Outbound Information and Communication Flows
Inbound and Outbound Information and Communication Flows
 
Intro ai Telecentri e ai CMC in Mozambico
Intro ai Telecentri e ai CMC in MozambicoIntro ai Telecentri e ai CMC in Mozambico
Intro ai Telecentri e ai CMC in Mozambico
 
Intro to ICT4D, digital divide, and telecentres
Intro to ICT4D, digital divide, and telecentresIntro to ICT4D, digital divide, and telecentres
Intro to ICT4D, digital divide, and telecentres
 
Social Representations of CMCs in Mozambique: work in progress @ TASCHA
Social Representations of CMCs in Mozambique: work in progress @ TASCHASocial Representations of CMCs in Mozambique: work in progress @ TASCHA
Social Representations of CMCs in Mozambique: work in progress @ TASCHA
 

Recently uploaded

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 

Recently uploaded (20)

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 

Privacy and Security guidelines for Humanitarian Work with Undocumented Migrants

  • 1. 1. Exercise prudence Limit the collection of personal information; include only information that is necessary. 2. Protect and secure information from/about migrants Pay attention to mitigating risks from both technological and human factors. 3. Provide training Ensure that volunteers and staff are aware and trained regarding privacy- and security-related protocols. Empower migrants to be more privacy aware. 4. Share-alike Work with collaborators and partners to improve privacy and security practices, based on on-going evaluation and refinement. 5. Non-discrimination Provide humanitarian services to everybody, including those who prefer not to share their personal information. Results 1) HIA-related risks involve both technology and people: • University of Nepantla: Low-tech method for students to avoid cameras at highly photographed events • La Resaca: No budget. Third-party services often manage and store their databases to guarantee the data is secured. 2) Need for clear guidelines for HIA: • University of Nepantla: Only higher-ranking staff members receive training on FERPA and in privacy and security. • La Resaca: normally no concrete sets of privacy standards or do not provide privacy-related training to employees and volunteers. Learning on-the-go, external, or if required by funders. 3) Privacy self-management is not enough: • University of Nepantla: leave it up to the students to disclose their status, except for matters of tuition and financial aid. Help them set their privacy settings on Facebook. They do not feel they have the right to tell students what they should and should not do. • La Resaca: Staff members dedicate time to their clients to make sure they understand what they are agreeing to. They have concerns because their clients may not have access to the tools, knowledge, and resources needed to make appropriate privacy decisions. Privacy and Security Guidelines for Humanitarian Work with Undocumented Migrants Sara Vannini, Ricardo Gomez, Bryce Newell GUIDELINES for HO Privacy and Security-related Protocols Humanitarian Information Activities HIA = All “activities and programs which may include the collection, storage, processing, analysis, further use, transmission, and public release of data and other forms of information by humanitarian actors and/or affected communities” (Greenwood et al., 2017 ) Related Work 1) HIA-related risks involve both technology and people: • leaks, hacks • negligently handling information 2) Need for clear guidelines for HIA: • gaps in HIA law standards • data protection rights insufficient on informed consent • lack of a single accepted definition of accountability 3) Privacy self-management is not enough: • might resonate with the idea of empowering people • vulnerable populations have higher risk of making ill-informed or non-careful decisions • vulnerable people might not have the ability to opt-out Methodology • Interviews with 9 staff members. Different roles: executive directors, coordinators, legal advisors, and IT directors. • 4 different advocacy groups • 2 higher education institutions • US West Coast [UNHCR, 2016]