Skip to content
Digital Safety Manual
  • About
  • All Cards
  • Downloads
  • Glossary
  • Dutchnl
  • 2
    Basic Device Security

    Easy steps for big improvements in digital security

    3
    Passwords and Account Protection

    Managing your multiple identities across devices and services

    4
    Connecting to the Internet Securely

    In certain areas and contexts, the very act of connecting to the internet – as an embassy staff member working on human rights, or as a human rights defender – can be a threat to your information security:

    5
    Secure Calls, Chat, and Email

    Communication with chat and messaging app and services

    6
    Security and Social Media Use

    Social media can be a useful tool in supporting and giving visibility to the work of civil society organisations. As contexts vary widely, it is important to use it carefully and strategically.

    7
    Secure Data Storage and Deletion

    Although you may have a user password, data on devices may be accessible to third parties who obtain physical access to the device.

    8
    Secure File Transfer

    Transferring files over the internet is another form of online communication, and most of the same vulnerabilities and protection tactics apply.

    9
    Secure Contract Handling

    Giving funds or other kinds of formal support to civil society and HRDs can involve risks for the civil society groups, embassy staff and others who are tangentially involved or involved by association.

    10
    Targeted Malware and Other Attacks

    Malicious software, or ‘malware’, is any software that can cause damage to your digitally stored data, or give third parties access to it.

    11
    Phone Tracking and Surveillance

    Mobile phones are invaluable resources for work and can also be of great use for security: in an emergency situation, they are the first tools that many will reach for. However, they do have vulnerabilities.

    12
    Security Concerns Related to In-Person Meetings

    n-person meetings with civil society may have a number of security implications, particularly in an environment where authorities are hostile to such contact.

    Creative Commons License
    This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.