Tools for securely documenting human rights violations: Difference between revisions

From TCU Wiki
(→‎Technology Tools: added defenders' database)
Line 38: Line 38:
=== Ushahidi ===
=== Ushahidi ===
The Ushahidi Platform helps communities turn information into action with an intuitive and accessible crowdsourcing and mapping tool. By enabling the rapid collection, management and analysis of crowdsourced information, Ushahidi empowers everyone—individuals, community groups, governments, activists, organizations—to create meaningful change. https://www.ushahidi.com/
The Ushahidi Platform helps communities turn information into action with an intuitive and accessible crowdsourcing and mapping tool. By enabling the rapid collection, management and analysis of crowdsourced information, Ushahidi empowers everyone—individuals, community groups, governments, activists, organizations—to create meaningful change. https://www.ushahidi.com/
=== Defenders' Database ===
The Defenders’ Database is a multifaceted and adaptable tool that helps you document and organise information about human rights violations. The database offers a safe place to store your information until it can be used for advocacy purposes and to achieve justice and accountability. Even if your computer is hacked or someone breaks into your office, your data is safely stored on Civil Rights Defenders’ servers. https://crd.org/database/


== Informed consent ==
== Informed consent ==

Revision as of 13:33, 13 February 2024

Technology Tools

Uwazi

Uwazi is a web-based tool designed for managing your data in one easy-to-search place. This open-source database application allows you to capture, organise and make sense of a set of facts, observations, testimonies, research, documents and more. The entries in an Uwazi database can be made publicly available, completely private or somewhere in between. Different file types? Don’t worry—Uwazi accepts many formats, including pieces of text, PDFs, word processing documents, photos, images, video and audio. (Developed by HURIDOCS, hosted by Greenhost)

https://uwazi.io/

Tella app

In challenging environments, with limited or no internet connectivity or in the face of repression, Tella makes it easier and safer to document human rights violations and collect data.

If you are an activist, journalist, human rights defender, or anyone who engages in documentation of injustice, you can use Tella to:

  • Protect yourself from physical and digital repression while collecting and storing sensitive information.
  • Protect the data you collect from censorship, tampering, interception, and destruction.
  • Easily produce high quality documentation that can be used for research, advocacy, or transitional justice.

Tella can be configured to send its data to KoboToolbox, Uwazi (see below) and other database platforms.

https://tella-app.org/

Uwazi database + Tella app

Organisations who already use Uwazi as a database tool, can connect Tella to one or more of their databases to upload data. All that is required to connect Tella to an Uwazi instance is the Uwazi database url, and the username and password. The Uwazi database should already have one or more templates configured, which can be downloaded into Tella.

Once successfully downloaded, users can easily navigate between their templates to enter details for each new record, even when there is no internet connection.

When the data entry is complete, it can be saved as a draft in the Tella app or immediately uploaded to the connected Uwazi database. This enables users who work offline to collect data, add it to the submission forms, save it and upload the information when it is convenient.

In addition to the protection and encryption features, working in offline mode is a huge benefit for those who collect information in risky environments and areas with limited or no connectivity."

https://huridocs.org/2022/07/the-new-tella-app-lets-uwazi-users-document-violations-safely-and-while-offline/

Save app

Save protects internet freedom by leveraging a suite of privacy-enhancing technologies to safeguard your media and identity in the event of internet shutdowns, surveillance, device confiscations, content takedowns, limited bandwidth, and data loss. Developed by Open Archive. https://open-archive.org/save

eyeWitness to Atrocities

eyeWitness works with partner organisations to capture photo and video to build dossiers of evidence. We have collaborated with civil society, litigation groups, the private sector, domestic and international courts, the United Nations and other international investigators to facilitate justice. https://www.eyewitness.global/

Ushahidi

The Ushahidi Platform helps communities turn information into action with an intuitive and accessible crowdsourcing and mapping tool. By enabling the rapid collection, management and analysis of crowdsourced information, Ushahidi empowers everyone—individuals, community groups, governments, activists, organizations—to create meaningful change. https://www.ushahidi.com/

Defenders' Database

The Defenders’ Database is a multifaceted and adaptable tool that helps you document and organise information about human rights violations. The database offers a safe place to store your information until it can be used for advocacy purposes and to achieve justice and accountability. Even if your computer is hacked or someone breaks into your office, your data is safely stored on Civil Rights Defenders’ servers. https://crd.org/database/

Informed consent

This article titled How to Add Informed Consent to Your Responsible Data Practices by ICT Works is a good resource for developing your informed consent procedure.

An example of an Informed Consent template, related to human rights documentation. It is on page 42 of this document published by the ICC titled "Documenting international crimes and human rights violations for accountability purposes: Guidelines for civil society organisations"

Components of an informed consent document:

  1. About you, your organization
  2. Purpose of the project (the reason why you are collecting this information)
  3. Data security and confidentiality -- how do you plan to protect the information?
  4. How the person can provide their consent (verbally, written, other)
  5. Benefits of participation
  6. Risks of participation (examples: psychological discomfort, risk of sharing sensitive information), and are there ways to mitigate these risks?
  7. Their rights as a participant
  8. Participation costs
  9. Compensation
  10. How you plan to use the information you have received (examples: public dissemination, collaboration with accountability mechanisms)
  11. Contact information if they have questions or concerns