Example NGO Security Policy (Members only content)
This document contains an example NGO security policy.
From research papers to training packs, find the resources you need, all in one place. For GISF members, please log in to access member-only resources. For hard copies of any GISF resources, please contact research@gisf.ngo. If you would like to share a resource with GISF, please contact tolani@gisf.ngo.
This document contains an example NGO security policy.
This document contains an example administrative order pertaining to security management for individuals visiting NGO projects or staying in project locations but who are not employed by the NGO itself.
In this episode of the EISF in Conversation podcast series, we sat down with Eva Svoboda, a Senior Research Fellow at the Overseas Development Institute, to discuss the humanitarian principles and how they relate to security risk management. Eva speaks about the…
This paper by Christie Ulicny (2017) provides a review of effective smart practices in security risk management and recommendations that would support the improvement of the World University Service of Canada’s (WUSC) security risk management plan. The secondary intention of…
This report (2017) combines the latest statistics on major attacks on humanitarian aid workers from the Aid Worker Security Database (AWSD) and interviews with members of armed groups to shed light on the motivations behind attacks on humanitarian workers by…
This paper by Tom Keatinge and Florence Keen (2017) considers the impact of banking sector restrictions on UK-registered humanitarian actors conducting humanitarian operations abroad and offers recommendations to mitigate the financial disruption of humanitarian aid delivery.
This report by Other Solutions Consulting (2017) outlines the urgent need to (re)open negotiations with Anglophone activists to avoid a likely escalation of violence in the southwest and northwest regions of Cameroon, and advocates for a shift in the Government’s strategy…
This report by Amnesty International (2017) explores the measures used by state and non-state actors to silence or repress human rights defenders (HRDs). These measures range from personal attacks like threats, beatings and even killings to the use of legislation…
L’objectif de ces Directives de sécurité pour les personnes atteintes d’albinisme est de fournir des conseils concrets et spécifiques aux personnes atteintes d’albinisme ainsi qu’à celles qui travaillent avec elles, pour leur permettre de rester en sécurité là où elles…
This guide (2017) begins by considering definitions and origins of violent extremism, investigating the relevance of origins, traditions and politics. The authors also explore the driving forces behind violent extremism which are compartmentalised into individual and community factors. The document…