SlideShare una empresa de Scribd logo
1 de 1
1. Exercise prudence
Limit the collection of personal information;
include only information that is necessary.
2. Protect and secure information
from/about migrants
Pay attention to mitigating risks from both
technological and human factors.
3. Provide training
Ensure that volunteers and staff are aware and trained
regarding privacy- and security-related protocols.
Empower migrants to be more privacy aware.
4. Share-alike
Work with collaborators and partners to improve privacy and
security practices, based on on-going evaluation and
refinement.
5. Non-discrimination
Provide humanitarian services to everybody, including those
who prefer not to share their personal information.
Results
1) HIA-related risks involve both technology and
people:
• University of Nepantla: Low-tech method for students to
avoid cameras at highly photographed events
• La Resaca: No budget. Third-party services often
manage and store their databases to guarantee the data
is secured.
2) Need for clear guidelines for HIA:
• University of Nepantla: Only higher-ranking staff
members receive training on FERPA and in privacy and
security.
• La Resaca: normally no concrete sets of privacy
standards or do not provide privacy-related training to
employees and volunteers. Learning on-the-go, external,
or if required by funders.
3) Privacy self-management is not enough:
• University of Nepantla: leave it up to the students to
disclose their status, except for matters of tuition and
financial aid. Help them set their privacy settings on
Facebook. They do not feel they have the right to tell
students what they should and should not do.
• La Resaca: Staff members dedicate time to their clients
to make sure they understand what they are agreeing to.
They have concerns because their clients may not have
access to the tools, knowledge, and resources needed to
make appropriate privacy decisions.
Privacy and Security Guidelines
for Humanitarian Work with
Undocumented Migrants
Sara Vannini, Ricardo Gomez, Bryce Newell
GUIDELINES for HO Privacy and Security-related Protocols
Humanitarian Information Activities
HIA = All “activities and programs which may include the
collection, storage, processing, analysis, further use,
transmission, and public release of data and other forms
of information by humanitarian actors and/or affected
communities” (Greenwood et al., 2017 )
Related Work
1) HIA-related risks involve both technology and
people:
• leaks, hacks
• negligently handling information
2) Need for clear guidelines for HIA:
• gaps in HIA law standards
• data protection rights insufficient on informed
consent
• lack of a single accepted definition of
accountability
3) Privacy self-management is not enough:
• might resonate with the idea of empowering
people
• vulnerable populations have higher risk of
making ill-informed or non-careful decisions
• vulnerable people might not have the ability to
opt-out
Methodology
• Interviews with 9 staff members. Different roles:
executive directors, coordinators, legal advisors,
and IT directors.
• 4 different advocacy groups
• 2 higher education institutions
• US West Coast
[UNHCR, 2016]

Más contenido relacionado

Similar a Privacy and Security guidelines for Humanitarian Work with Undocumented Migrants

Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataTecnoIncentive
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExEADTU
 
Security Awareness and Training
Security Awareness and TrainingSecurity Awareness and Training
Security Awareness and TrainingPriyank Hada
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
Data Ethics and Privacy.pdf
Data Ethics and Privacy.pdfData Ethics and Privacy.pdf
Data Ethics and Privacy.pdfAmirKhan811717
 
“Access denied”? Barriers for staff accessing, using and sharing published in...
“Access denied”? Barriers for staff accessing, using and sharing published in...“Access denied”? Barriers for staff accessing, using and sharing published in...
“Access denied”? Barriers for staff accessing, using and sharing published in...Catherine Ebenezer
 
DWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxDWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxcaniceconsulting
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...Damir Delija
 
Groningen Declaration: Digitizing Data to Empower Students, Improve Integrity...
Groningen Declaration: Digitizing Data to Empower Students, Improve Integrity...Groningen Declaration: Digitizing Data to Empower Students, Improve Integrity...
Groningen Declaration: Digitizing Data to Empower Students, Improve Integrity...Cheryl DarrupBoychuck
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 versionJohan Koren
 
Responsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdfResponsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdfStefaan Verhulst
 
Transformation of Continuity Through Technology
Transformation of Continuity Through TechnologyTransformation of Continuity Through Technology
Transformation of Continuity Through TechnologyHeather Blanchard
 
Access denied? Managing access to the Web within the NHS in England: technolo...
Access denied? Managing access to the Web within the NHS in England: technolo...Access denied? Managing access to the Web within the NHS in England: technolo...
Access denied? Managing access to the Web within the NHS in England: technolo...Catherine Ebenezer
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014emilyensign
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKTrilateral Research
 
Balancing cost, quality and access with care in online education: the role of...
Balancing cost, quality and access with care in online education: the role of...Balancing cost, quality and access with care in online education: the role of...
Balancing cost, quality and access with care in online education: the role of...University of South Africa (Unisa)
 
Week1discussioncapstone
Week1discussioncapstoneWeek1discussioncapstone
Week1discussioncapstonebradbury234
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 

Similar a Privacy and Security guidelines for Humanitarian Work with Undocumented Migrants (20)

Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded data
 
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvExAvoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx
 
Security Awareness and Training
Security Awareness and TrainingSecurity Awareness and Training
Security Awareness and Training
 
1200 clare sanderon hse ireland
1200 clare sanderon hse ireland1200 clare sanderon hse ireland
1200 clare sanderon hse ireland
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
Data Ethics and Privacy.pdf
Data Ethics and Privacy.pdfData Ethics and Privacy.pdf
Data Ethics and Privacy.pdf
 
“Access denied”? Barriers for staff accessing, using and sharing published in...
“Access denied”? Barriers for staff accessing, using and sharing published in...“Access denied”? Barriers for staff accessing, using and sharing published in...
“Access denied”? Barriers for staff accessing, using and sharing published in...
 
DWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxDWEL - Module 5 final.pptx
DWEL - Module 5 final.pptx
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...
 
Groningen Declaration: Digitizing Data to Empower Students, Improve Integrity...
Groningen Declaration: Digitizing Data to Empower Students, Improve Integrity...Groningen Declaration: Digitizing Data to Empower Students, Improve Integrity...
Groningen Declaration: Digitizing Data to Empower Students, Improve Integrity...
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
 
Responsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdfResponsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdf
 
Transformation of Continuity Through Technology
Transformation of Continuity Through TechnologyTransformation of Continuity Through Technology
Transformation of Continuity Through Technology
 
Access denied? Managing access to the Web within the NHS in England: technolo...
Access denied? Managing access to the Web within the NHS in England: technolo...Access denied? Managing access to the Web within the NHS in England: technolo...
Access denied? Managing access to the Web within the NHS in England: technolo...
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACK
 
Balancing cost, quality and access with care in online education: the role of...
Balancing cost, quality and access with care in online education: the role of...Balancing cost, quality and access with care in online education: the role of...
Balancing cost, quality and access with care in online education: the role of...
 
Week1discussioncapstone
Week1discussioncapstoneWeek1discussioncapstone
Week1discussioncapstone
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Public deck
Public deckPublic deck
Public deck
 

Más de Sara Vannini

Visual Methodologies in Participatory ICT4D
Visual Methodologies in Participatory ICT4DVisual Methodologies in Participatory ICT4D
Visual Methodologies in Participatory ICT4DSara Vannini
 
Unmasking ICT through visual methodologies in participatory ICT4D
Unmasking ICT through visual methodologies in participatory ICT4DUnmasking ICT through visual methodologies in participatory ICT4D
Unmasking ICT through visual methodologies in participatory ICT4DSara Vannini
 
towards a conceptualization of digital sanctuary
towards a conceptualization of digital sanctuarytowards a conceptualization of digital sanctuary
towards a conceptualization of digital sanctuarySara Vannini
 
Mobile phones and other information practices among undocumented migrants at ...
Mobile phones and other information practices among undocumented migrants at ...Mobile phones and other information practices among undocumented migrants at ...
Mobile phones and other information practices among undocumented migrants at ...Sara Vannini
 
Fotohistorias - Security and Activism: using participatory photography to eli...
Fotohistorias - Security and Activism: using participatory photography to eli...Fotohistorias - Security and Activism: using participatory photography to eli...
Fotohistorias - Security and Activism: using participatory photography to eli...Sara Vannini
 
Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...
Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...
Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...Sara Vannini
 
FOTOHISTORIAS: vidas en la frontera, en EEUU y en el territorio.
FOTOHISTORIAS:  vidas en la frontera, en EEUU y en el territorio.FOTOHISTORIAS:  vidas en la frontera, en EEUU y en el territorio.
FOTOHISTORIAS: vidas en la frontera, en EEUU y en el territorio.Sara Vannini
 
Dissertation Defense - Social Representations of CMCs in Mozambique
Dissertation Defense - Social Representations of CMCs in MozambiqueDissertation Defense - Social Representations of CMCs in Mozambique
Dissertation Defense - Social Representations of CMCs in MozambiqueSara Vannini
 
RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...
RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...
RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...Sara Vannini
 
Participatory re-action: reflecting on a Design-Based Research approach in ICT4D
Participatory re-action: reflecting on a Design-Based Research approach in ICT4DParticipatory re-action: reflecting on a Design-Based Research approach in ICT4D
Participatory re-action: reflecting on a Design-Based Research approach in ICT4DSara Vannini
 
Reasons for non-use: a study on Mozambican telecentres,
 Reasons for non-use: a study on Mozambican telecentres, Reasons for non-use: a study on Mozambican telecentres,
Reasons for non-use: a study on Mozambican telecentres,Sara Vannini
 
Photo-Elicitation @ CIRN 2013
Photo-Elicitation @ CIRN 2013Photo-Elicitation @ CIRN 2013
Photo-Elicitation @ CIRN 2013Sara Vannini
 
Formal & Informal Learning practices in Community Multimedia Centres in Mozam...
Formal & Informal Learning practices in Community Multimedia Centres in Mozam...Formal & Informal Learning practices in Community Multimedia Centres in Mozam...
Formal & Informal Learning practices in Community Multimedia Centres in Mozam...Sara Vannini
 
PhD progresses @ 4th Cross-Field Residential Seminar
PhD progresses @ 4th Cross-Field Residential SeminarPhD progresses @ 4th Cross-Field Residential Seminar
PhD progresses @ 4th Cross-Field Residential SeminarSara Vannini
 
IFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation study
IFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation studyIFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation study
IFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation studySara Vannini
 
RE-ACT @ Crossfield
RE-ACT @ CrossfieldRE-ACT @ Crossfield
RE-ACT @ CrossfieldSara Vannini
 
Inbound and Outbound Information and Communication Flows
Inbound and Outbound Information and Communication FlowsInbound and Outbound Information and Communication Flows
Inbound and Outbound Information and Communication FlowsSara Vannini
 
Intro ai Telecentri e ai CMC in Mozambico
Intro ai Telecentri e ai CMC in MozambicoIntro ai Telecentri e ai CMC in Mozambico
Intro ai Telecentri e ai CMC in MozambicoSara Vannini
 
Intro to ICT4D, digital divide, and telecentres
Intro to ICT4D, digital divide, and telecentresIntro to ICT4D, digital divide, and telecentres
Intro to ICT4D, digital divide, and telecentresSara Vannini
 
Social Representations of CMCs in Mozambique: work in progress @ TASCHA
Social Representations of CMCs in Mozambique: work in progress @ TASCHASocial Representations of CMCs in Mozambique: work in progress @ TASCHA
Social Representations of CMCs in Mozambique: work in progress @ TASCHASara Vannini
 

Más de Sara Vannini (20)

Visual Methodologies in Participatory ICT4D
Visual Methodologies in Participatory ICT4DVisual Methodologies in Participatory ICT4D
Visual Methodologies in Participatory ICT4D
 
Unmasking ICT through visual methodologies in participatory ICT4D
Unmasking ICT through visual methodologies in participatory ICT4DUnmasking ICT through visual methodologies in participatory ICT4D
Unmasking ICT through visual methodologies in participatory ICT4D
 
towards a conceptualization of digital sanctuary
towards a conceptualization of digital sanctuarytowards a conceptualization of digital sanctuary
towards a conceptualization of digital sanctuary
 
Mobile phones and other information practices among undocumented migrants at ...
Mobile phones and other information practices among undocumented migrants at ...Mobile phones and other information practices among undocumented migrants at ...
Mobile phones and other information practices among undocumented migrants at ...
 
Fotohistorias - Security and Activism: using participatory photography to eli...
Fotohistorias - Security and Activism: using participatory photography to eli...Fotohistorias - Security and Activism: using participatory photography to eli...
Fotohistorias - Security and Activism: using participatory photography to eli...
 
Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...
Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...
Use of Mobile Devices in Public Access to ICTs: Preliminary results from a st...
 
FOTOHISTORIAS: vidas en la frontera, en EEUU y en el territorio.
FOTOHISTORIAS:  vidas en la frontera, en EEUU y en el territorio.FOTOHISTORIAS:  vidas en la frontera, en EEUU y en el territorio.
FOTOHISTORIAS: vidas en la frontera, en EEUU y en el territorio.
 
Dissertation Defense - Social Representations of CMCs in Mozambique
Dissertation Defense - Social Representations of CMCs in MozambiqueDissertation Defense - Social Representations of CMCs in Mozambique
Dissertation Defense - Social Representations of CMCs in Mozambique
 
RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...
RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...
RE-ACT final Workshop in Maputo: Social Representations of CMCs in Mozambique...
 
Participatory re-action: reflecting on a Design-Based Research approach in ICT4D
Participatory re-action: reflecting on a Design-Based Research approach in ICT4DParticipatory re-action: reflecting on a Design-Based Research approach in ICT4D
Participatory re-action: reflecting on a Design-Based Research approach in ICT4D
 
Reasons for non-use: a study on Mozambican telecentres,
 Reasons for non-use: a study on Mozambican telecentres, Reasons for non-use: a study on Mozambican telecentres,
Reasons for non-use: a study on Mozambican telecentres,
 
Photo-Elicitation @ CIRN 2013
Photo-Elicitation @ CIRN 2013Photo-Elicitation @ CIRN 2013
Photo-Elicitation @ CIRN 2013
 
Formal & Informal Learning practices in Community Multimedia Centres in Mozam...
Formal & Informal Learning practices in Community Multimedia Centres in Mozam...Formal & Informal Learning practices in Community Multimedia Centres in Mozam...
Formal & Informal Learning practices in Community Multimedia Centres in Mozam...
 
PhD progresses @ 4th Cross-Field Residential Seminar
PhD progresses @ 4th Cross-Field Residential SeminarPhD progresses @ 4th Cross-Field Residential Seminar
PhD progresses @ 4th Cross-Field Residential Seminar
 
IFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation study
IFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation studyIFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation study
IFIP 9.4 - Images of CMCs in Mozambique: a participatory photo-elicitation study
 
RE-ACT @ Crossfield
RE-ACT @ CrossfieldRE-ACT @ Crossfield
RE-ACT @ Crossfield
 
Inbound and Outbound Information and Communication Flows
Inbound and Outbound Information and Communication FlowsInbound and Outbound Information and Communication Flows
Inbound and Outbound Information and Communication Flows
 
Intro ai Telecentri e ai CMC in Mozambico
Intro ai Telecentri e ai CMC in MozambicoIntro ai Telecentri e ai CMC in Mozambico
Intro ai Telecentri e ai CMC in Mozambico
 
Intro to ICT4D, digital divide, and telecentres
Intro to ICT4D, digital divide, and telecentresIntro to ICT4D, digital divide, and telecentres
Intro to ICT4D, digital divide, and telecentres
 
Social Representations of CMCs in Mozambique: work in progress @ TASCHA
Social Representations of CMCs in Mozambique: work in progress @ TASCHASocial Representations of CMCs in Mozambique: work in progress @ TASCHA
Social Representations of CMCs in Mozambique: work in progress @ TASCHA
 

Último

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 

Último (20)

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 

Privacy and Security guidelines for Humanitarian Work with Undocumented Migrants

  • 1. 1. Exercise prudence Limit the collection of personal information; include only information that is necessary. 2. Protect and secure information from/about migrants Pay attention to mitigating risks from both technological and human factors. 3. Provide training Ensure that volunteers and staff are aware and trained regarding privacy- and security-related protocols. Empower migrants to be more privacy aware. 4. Share-alike Work with collaborators and partners to improve privacy and security practices, based on on-going evaluation and refinement. 5. Non-discrimination Provide humanitarian services to everybody, including those who prefer not to share their personal information. Results 1) HIA-related risks involve both technology and people: • University of Nepantla: Low-tech method for students to avoid cameras at highly photographed events • La Resaca: No budget. Third-party services often manage and store their databases to guarantee the data is secured. 2) Need for clear guidelines for HIA: • University of Nepantla: Only higher-ranking staff members receive training on FERPA and in privacy and security. • La Resaca: normally no concrete sets of privacy standards or do not provide privacy-related training to employees and volunteers. Learning on-the-go, external, or if required by funders. 3) Privacy self-management is not enough: • University of Nepantla: leave it up to the students to disclose their status, except for matters of tuition and financial aid. Help them set their privacy settings on Facebook. They do not feel they have the right to tell students what they should and should not do. • La Resaca: Staff members dedicate time to their clients to make sure they understand what they are agreeing to. They have concerns because their clients may not have access to the tools, knowledge, and resources needed to make appropriate privacy decisions. Privacy and Security Guidelines for Humanitarian Work with Undocumented Migrants Sara Vannini, Ricardo Gomez, Bryce Newell GUIDELINES for HO Privacy and Security-related Protocols Humanitarian Information Activities HIA = All “activities and programs which may include the collection, storage, processing, analysis, further use, transmission, and public release of data and other forms of information by humanitarian actors and/or affected communities” (Greenwood et al., 2017 ) Related Work 1) HIA-related risks involve both technology and people: • leaks, hacks • negligently handling information 2) Need for clear guidelines for HIA: • gaps in HIA law standards • data protection rights insufficient on informed consent • lack of a single accepted definition of accountability 3) Privacy self-management is not enough: • might resonate with the idea of empowering people • vulnerable populations have higher risk of making ill-informed or non-careful decisions • vulnerable people might not have the ability to opt-out Methodology • Interviews with 9 staff members. Different roles: executive directors, coordinators, legal advisors, and IT directors. • 4 different advocacy groups • 2 higher education institutions • US West Coast [UNHCR, 2016]