Network Resources: Difference between revisions
From TCU Wiki
No edit summary |
No edit summary |
||
Line 8: | Line 8: | ||
|} | |} | ||
==== [[Resources for At-Risk Digital Rights Defenders|<span style="font-size:larger"> | ==== [[Resources for At-Risk Digital Rights Defenders|<span style="font-size:larger">Resources for At-Risk Digital Rights Defenders</span>]] ==== | ||
Here you will find... | Here you will find... | ||
---- | ---- | ||
==== [[The Holistic Security Protocol for Human Rights Defenders|<span style="font-size:larger"> | ==== [[The Holistic Security Protocol for Human Rights Defenders|<span style="font-size:larger">The Holistic Security Protocol for Human Rights Defenders</span>]] ==== | ||
Here you will find... | Here you will find... | ||
---- | ---- | ||
==== | ==== [[Security resources organized by topic|<span style="font-size:larger">Security Resources Organized by Topic</span>]] ==== | ||
Here you will find... | Here you will find... | ||
---- | ---- | ||
==== [[Building a trauma-informed organization| | ==== [[Building a trauma-informed organization|<span style="font-size:larger">Building a Trauma-informed Organization</span>]] ==== | ||
Here you will find... | Here you will find... | ||
---- | ---- |
Revision as of 04:22, 12 January 2024
Review our Digital Justice House Toolkit here, which proposes three transformations in the digital rights workplace to improve your team health:
|
Resources for At-Risk Digital Rights Defenders
Here you will find...
The Holistic Security Protocol for Human Rights Defenders
Here you will find...
Security Resources Organized by Topic
Here you will find...
Building a Trauma-informed Organization
Here you will find...