Security Plans and Protocols

Credits Jennifer Schulte, Indira Cornelio, Alma Uguarte Perez Last Updated 2017-12

This module aims to encourage critical thinking about digital security risks, support the development of personalized, context-specific strategies to mitigate such risks, and provide guidance to participants on how to sustain these strategies after the training, whether as individuals or as organizations and collectives.

Learning Goals for Participants

  • Enable participants to overcome any frustrations with their digital security practice, and reassure them that building their skills is an iterative process requiring time and patience.
  • Identify the specific risks that participants face, allowing them to design individual security plans and protocols to address these risks.
  • Support participants as they design strategies to facilitate post-training implementation of their security plans and protocols.

Important Notes

  • As trainers, we can often impose our own vision of digital security practice on participants, either deliberately but with sincere intentions or unwittingly. However, it is important for us to remember that – as trainers and experts – our participants are under no obligation to either use the tools we teach, or to adapt to the practices that we deem to be “the safest”.
  • Some sessions in this module involve detailed discussion of personal risk - in some cases, participants may begin to appear concerned or stressed. Therefore, it becomes extremely important for you as the trainer to manage the level of stress in the room. Make sure that at frequent intervals you remind the group that this session is ultimately focused on identifying strategies, tools, networks or allies that can help them to face risks; you don’t want them to be or feel scared, there are lots of actions that they can take to fight online violence.
  • Also consider articles on Recommending Tools, and Threat Modeling from the Security Education Companion.

    Synthesis