SlideShare a Scribd company logo
Holistic security strategies
to address non-consensual
intimate images (NCII)
11:00 GMT Breakout Session
Lead discussants
Peace Olive Amuge, Program Manager, Information Sharing and Networking,
WOUGNET (Women of Uganda Network)
Sandra Aceng, Program Officer, Gender and ICT Policy Advocacy, WOUGNET
Patricia Nyasuna, Program Officer, Gender and ICT Program, WOUGNET
Session Facilitator
Rohini Lakshané, Director (Emerging Research), The Bachchao Project
Section 1
NCII: Context and
background
Non-consensual intimate images (NCII) are defined as
the distribution of sexually explicit images or videos
that were initially shared with the expectation that they
would remain private. 
“Revenge porn” is a misnomer.
Holistic security is an attempt to integrate these
concepts [digital, physical and legal security,
psychosocial wellbeing, and organisational security]
and highlight their inter-relatedness so that we can
approach these processes in a more connected and
meaningful way. (Source: HURIDOCS
https://bit.ly/35ku0hg)
Section 1: NCII: Context and background
Changes in the law, policy, and social norms are
necessary, but they will take time to come into effect.
Additionally, new threats such as stalkerware and
spouseware have been emerging.
The only immediate recourse currently available for
most sub-Saharan girls, women, queer and non-binary
persons is to practice good digital security in order to
recognize and prevent potential incidents of NCII.
Section 1: NCII: Context and background
Section 2
Holistic security
strategies and
measures
● Physical
● Digital
● Psychosocial
Section 2: Holistic security strategies and measures
Section 3
Discussion
Section 4
Useful resources
and recommended
reading
| Section 4: Useful resources and recommended reading
● How to find a hidden camera in an Airbnb
https://www.youtube.com/watch?v=N88G1Pp8Qvs
● Airbnb has a hidden camera problem
https://www.theatlantic.com/technology/archive/2019/03/what-happens-when-you-
find-cameras-your-airbnb/585007
● Security Planner https://www.securityplanner.org
● The Motherboard Guide to Sexting Securely
https://vice.com/en_us/article/mb3nd4/how-to-sext-securely-safely-what-apps-to-u
se-sexting
● Safer Nudes https://codingrights.org/4
● All About Sexting [For teenagers]
https://www.plannedparenthood.org/learn/teens/bullying-safety-privacy/all-about-s
exting
● Hey Friend! https://www.takebackthetech.net/know-more/heyfriend
| Section 4: Useful resources and recommended reading
● “Revenge Porn”: The Understanding and Impact of Non-Consensual Intimate
Images (NCII) Violence https://impakter.com/author/sandra-aceng
● Decolonising emotional well-being and mental health in development: African
feminist innovations
https://policy-practice.oxfam.org.uk/publications/decolonising-emotional-well-bein
g-and-mental-health-in-development-african-femi-620960
● Self and Collective Care
http://preventgbvafrica.org/wp-content/uploads/2019/01/Self-and-Collective-Care.pdf
● How to Provide Psychological First Aid emergencies
https://soundcloud.com/user-425988972/how-to-provide-psychological-first-aid-in-
emergencies

More Related Content

Similar to Holistic security strategies to address non-consensual intimate imagery

Crime prevention
Crime preventionCrime prevention
Crime prevention
Ronie Ausa
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Nzeih Chukwuemeka
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
cfeutlinske
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
Kunihiro Maeda
 
Breach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good GovernmentsBreach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good Governments
Paul W. Taylor
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
Chinatu Uzuegbu
 
ASM
ASMASM
Public safety interoperability: an international perspective
Public safety interoperability: an international perspectivePublic safety interoperability: an international perspective
Public safety interoperability: an international perspective
Comms Connect
 
Electronic Surveillance
Electronic SurveillanceElectronic Surveillance
Electronic Surveillance
ijtsrd
 
8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable
Center for Innovative Public Health Research
 
CS Org Ldrshp Poster
CS Org Ldrshp PosterCS Org Ldrshp Poster
CS Org Ldrshp Poster
Turner Sparks
 
Cyber Security of Nepal - Press Release
Cyber Security of Nepal - Press ReleaseCyber Security of Nepal - Press Release
Cyber Security of Nepal - Press Release
Dr. Ramhari Subedi
 
Security Awareness Training Summary
Security Awareness Training SummarySecurity Awareness Training Summary
Security Awareness Training Summary
SNP Technologies, Inc.
 
Introduction to Online Sexual Exploitation Curriculum
Introduction to Online Sexual Exploitation CurriculumIntroduction to Online Sexual Exploitation Curriculum
Introduction to Online Sexual Exploitation Curriculum
Videoguy
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
Jacqueline Fick
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
Zsolt Nemeth
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
Aimee Shuck
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
Shiva Bissessar
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
Ayodeji Rotibi
 
youth safety on a living internet
youth safety on a living internetyouth safety on a living internet
youth safety on a living internet
Boni
 

Similar to Holistic security strategies to address non-consensual intimate imagery (20)

Crime prevention
Crime preventionCrime prevention
Crime prevention
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
Breach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good GovernmentsBreach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good Governments
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
 
ASM
ASMASM
ASM
 
Public safety interoperability: an international perspective
Public safety interoperability: an international perspectivePublic safety interoperability: an international perspective
Public safety interoperability: an international perspective
 
Electronic Surveillance
Electronic SurveillanceElectronic Surveillance
Electronic Surveillance
 
8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable
 
CS Org Ldrshp Poster
CS Org Ldrshp PosterCS Org Ldrshp Poster
CS Org Ldrshp Poster
 
Cyber Security of Nepal - Press Release
Cyber Security of Nepal - Press ReleaseCyber Security of Nepal - Press Release
Cyber Security of Nepal - Press Release
 
Security Awareness Training Summary
Security Awareness Training SummarySecurity Awareness Training Summary
Security Awareness Training Summary
 
Introduction to Online Sexual Exploitation Curriculum
Introduction to Online Sexual Exploitation CurriculumIntroduction to Online Sexual Exploitation Curriculum
Introduction to Online Sexual Exploitation Curriculum
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
youth safety on a living internet
youth safety on a living internetyouth safety on a living internet
youth safety on a living internet
 

More from Rohini Lakshané

Digital surveillance for covid 19 and its implications for security and privacy
Digital surveillance for covid 19 and its implications for security and privacyDigital surveillance for covid 19 and its implications for security and privacy
Digital surveillance for covid 19 and its implications for security and privacy
Rohini Lakshané
 
Of Sieges and Shutdowns
Of Sieges and ShutdownsOf Sieges and Shutdowns
Of Sieges and Shutdowns
Rohini Lakshané
 
Lessons from creating a diversity toolkit
Lessons from creating a diversity toolkitLessons from creating a diversity toolkit
Lessons from creating a diversity toolkit
Rohini Lakshané
 
Non-consensual intimate imagery in India
Non-consensual intimate imagery in IndiaNon-consensual intimate imagery in India
Non-consensual intimate imagery in India
Rohini Lakshané
 
Making crowdmaps effectual for mapping violence against women
Making crowdmaps effectual for mapping violence against womenMaking crowdmaps effectual for mapping violence against women
Making crowdmaps effectual for mapping violence against women
Rohini Lakshané
 
Exploring open hardware in mass produced mobile phones
Exploring open hardware in mass produced mobile phonesExploring open hardware in mass produced mobile phones
Exploring open hardware in mass produced mobile phones
Rohini Lakshané
 
Gender gap in the global south: Lessons from policy-making and outreach
Gender gap in the global south: Lessons from policy-making and outreachGender gap in the global south: Lessons from policy-making and outreach
Gender gap in the global south: Lessons from policy-making and outreach
Rohini Lakshané
 
Patent landscaping in the sub-$100 mobile device market in India
Patent landscaping in the sub-$100 mobile device market in IndiaPatent landscaping in the sub-$100 mobile device market in India
Patent landscaping in the sub-$100 mobile device market in India
Rohini Lakshané
 
Competition policy and the internet
Competition policy and the internetCompetition policy and the internet
Competition policy and the internet
Rohini Lakshané
 
Mobile phone standards operational in India and their patent licensing arrang...
Mobile phone standards operational in India and their patent licensing arrang...Mobile phone standards operational in India and their patent licensing arrang...
Mobile phone standards operational in India and their patent licensing arrang...
Rohini Lakshané
 
Designing technology for diversity and inclusion
Designing technology for diversity and inclusionDesigning technology for diversity and inclusion
Designing technology for diversity and inclusion
Rohini Lakshané
 
The WhatsApp economy
The WhatsApp economyThe WhatsApp economy
The WhatsApp economy
Rohini Lakshané
 
The art of community review
The art of community reviewThe art of community review
The art of community review
Rohini Lakshané
 

More from Rohini Lakshané (13)

Digital surveillance for covid 19 and its implications for security and privacy
Digital surveillance for covid 19 and its implications for security and privacyDigital surveillance for covid 19 and its implications for security and privacy
Digital surveillance for covid 19 and its implications for security and privacy
 
Of Sieges and Shutdowns
Of Sieges and ShutdownsOf Sieges and Shutdowns
Of Sieges and Shutdowns
 
Lessons from creating a diversity toolkit
Lessons from creating a diversity toolkitLessons from creating a diversity toolkit
Lessons from creating a diversity toolkit
 
Non-consensual intimate imagery in India
Non-consensual intimate imagery in IndiaNon-consensual intimate imagery in India
Non-consensual intimate imagery in India
 
Making crowdmaps effectual for mapping violence against women
Making crowdmaps effectual for mapping violence against womenMaking crowdmaps effectual for mapping violence against women
Making crowdmaps effectual for mapping violence against women
 
Exploring open hardware in mass produced mobile phones
Exploring open hardware in mass produced mobile phonesExploring open hardware in mass produced mobile phones
Exploring open hardware in mass produced mobile phones
 
Gender gap in the global south: Lessons from policy-making and outreach
Gender gap in the global south: Lessons from policy-making and outreachGender gap in the global south: Lessons from policy-making and outreach
Gender gap in the global south: Lessons from policy-making and outreach
 
Patent landscaping in the sub-$100 mobile device market in India
Patent landscaping in the sub-$100 mobile device market in IndiaPatent landscaping in the sub-$100 mobile device market in India
Patent landscaping in the sub-$100 mobile device market in India
 
Competition policy and the internet
Competition policy and the internetCompetition policy and the internet
Competition policy and the internet
 
Mobile phone standards operational in India and their patent licensing arrang...
Mobile phone standards operational in India and their patent licensing arrang...Mobile phone standards operational in India and their patent licensing arrang...
Mobile phone standards operational in India and their patent licensing arrang...
 
Designing technology for diversity and inclusion
Designing technology for diversity and inclusionDesigning technology for diversity and inclusion
Designing technology for diversity and inclusion
 
The WhatsApp economy
The WhatsApp economyThe WhatsApp economy
The WhatsApp economy
 
The art of community review
The art of community reviewThe art of community review
The art of community review
 

Recently uploaded

HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 

Recently uploaded (19)

HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 

Holistic security strategies to address non-consensual intimate imagery

  • 1.
  • 2. Holistic security strategies to address non-consensual intimate images (NCII) 11:00 GMT Breakout Session
  • 3. Lead discussants Peace Olive Amuge, Program Manager, Information Sharing and Networking, WOUGNET (Women of Uganda Network) Sandra Aceng, Program Officer, Gender and ICT Policy Advocacy, WOUGNET Patricia Nyasuna, Program Officer, Gender and ICT Program, WOUGNET Session Facilitator Rohini Lakshané, Director (Emerging Research), The Bachchao Project
  • 4. Section 1 NCII: Context and background
  • 5. Non-consensual intimate images (NCII) are defined as the distribution of sexually explicit images or videos that were initially shared with the expectation that they would remain private.  “Revenge porn” is a misnomer. Holistic security is an attempt to integrate these concepts [digital, physical and legal security, psychosocial wellbeing, and organisational security] and highlight their inter-relatedness so that we can approach these processes in a more connected and meaningful way. (Source: HURIDOCS https://bit.ly/35ku0hg) Section 1: NCII: Context and background
  • 6. Changes in the law, policy, and social norms are necessary, but they will take time to come into effect. Additionally, new threats such as stalkerware and spouseware have been emerging. The only immediate recourse currently available for most sub-Saharan girls, women, queer and non-binary persons is to practice good digital security in order to recognize and prevent potential incidents of NCII. Section 1: NCII: Context and background
  • 8. ● Physical ● Digital ● Psychosocial Section 2: Holistic security strategies and measures
  • 10. Section 4 Useful resources and recommended reading
  • 11. | Section 4: Useful resources and recommended reading ● How to find a hidden camera in an Airbnb https://www.youtube.com/watch?v=N88G1Pp8Qvs ● Airbnb has a hidden camera problem https://www.theatlantic.com/technology/archive/2019/03/what-happens-when-you- find-cameras-your-airbnb/585007 ● Security Planner https://www.securityplanner.org ● The Motherboard Guide to Sexting Securely https://vice.com/en_us/article/mb3nd4/how-to-sext-securely-safely-what-apps-to-u se-sexting ● Safer Nudes https://codingrights.org/4 ● All About Sexting [For teenagers] https://www.plannedparenthood.org/learn/teens/bullying-safety-privacy/all-about-s exting ● Hey Friend! https://www.takebackthetech.net/know-more/heyfriend
  • 12. | Section 4: Useful resources and recommended reading ● “Revenge Porn”: The Understanding and Impact of Non-Consensual Intimate Images (NCII) Violence https://impakter.com/author/sandra-aceng ● Decolonising emotional well-being and mental health in development: African feminist innovations https://policy-practice.oxfam.org.uk/publications/decolonising-emotional-well-bein g-and-mental-health-in-development-african-femi-620960 ● Self and Collective Care http://preventgbvafrica.org/wp-content/uploads/2019/01/Self-and-Collective-Care.pdf ● How to Provide Psychological First Aid emergencies https://soundcloud.com/user-425988972/how-to-provide-psychological-first-aid-in- emergencies