Module 3 - Preliminary Considerations Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 INTERNATIONAL.

Slides:



Advertisements
Similar presentations
Information Sharing 1. Overview Inquiries into sexual violence incidents are extremely sensitive. Collecting and sharing information on GBV can be dangerous,
Advertisements

Protecting the Privacy of Family Members in Survey and Pedigree Research Jeffrey R. Botkin, MD, MPH University of Utah.
Bali Process Workshop on “Human Trafficking: Victim Support” Bali, Indonesia 7-9 November 2006 IOM’s Approach To Victim Support.
2011 Overall Objectives Contributing toward limiting Violence against Women, and fostering the role of the NCHR in combating VAW focusing on domestic.
1 Critical issue module 6 Separated children in emergency settings.
Reporting Requirements POLICY DISCRIMINATION, HARASSMENT, AND SEXUAL MISCONDUCT FACULTY SENATE CONSULTATION, JANUARY 26, 2015.
Legislation and Working Practices. AIM: To understand the importance of policy and legislation To identify & summarise Key legislation To examine policies.
Select and Train the Fact- Finding Team. Selecting the Team.
Safeguarding Tutorial The Manchester College 1. Aim of session: To raise awareness of Safeguarding Objectives: By the end of the session you will be able.
Witness protection in human trafficking cases. Victims of trafficking as witnesses  Victims in countries of destination and origin  Mainly women and.
MODULE 3 Composition & Roles. TAT TEAM APPROACH UPON COMPLETION OF THIS MODULE, PARTICIPANTS SHOULD UNDERSTAND: 3 – 2  Composition of the Threat Assessment.
TRAINING COURSE. Course Objectives 1.Know how to handle a suspected case 2.Know how to care for a recognized trafficked person referred to you Session.
TRAINING COURSE. Course Objectives 1.Know how to handle a suspected case 2.Know how to care for a recognized trafficked person referred to you Session.
© Plan Plan’s Security Framework – A Refresher. © Plan Understanding Ourselves Values - Child Rights, Impartial, Neutral, Sensitive Mandate - Child Centred,
1 Risk Assessment and Child Protection. 2 INTRODUCTION Introduction to Risk Assessment What is Child Abuse? Introduction to Child Protection Policies.
To Learn & Develop Christine Johnson Lead Nurse Safeguarding (named nurse) - STFT Health Visitors Roles and Responsibilities in Domestic Abuse.
Child Safe Standards How effective is your leadership team in promoting a child safe culture in your organisation? 2 June 2016.
The revised EU Asylum Qualifications Directive WHAT ARE THE GROUNDS FOR GRANTING INTERNATIONAL PROTECTION FOR FGM SURVIVORS OR WOMEN AND GIRLS AT RISK.
SW Young Owls U15’s.. Safe Guarding Children Policy Football Club Safeguarding Children Policy 1 SW Young Owls U15’s [2014/2015] acknowledges its responsibility.
The revised EU Asylum Procedures Directive WHAT SUPPORT IS AVAILABLE TO ASYLUM SEEKERS WITH PARTICULAR NEEDS?
Module 9 – Storing Information Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 INTERNATIONAL.
Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 Module 6 – Testimony INTERNATIONAL PROTOCOL,
Module 1 – Understanding Sexual Violence Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 INTERNATIONAL.
Module 2 – Sexual Violence as an International Crime Training Materials on the International Protocol © Institute for International Criminal Investigations.
Module 4 – Key Planning Topics Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 INTERNATIONAL.
The ACT Public Service Family Violence Toolkit Information and Awareness Module.
Introduction – Using the International Protocol Training Materials on the International Protocol © Institute for International Criminal Investigations.
Guidelines for Integrating Gender- based Violence Interventions in Humanitarian Action MODULE 3: Addressing GBV in emergencies.
QUESTION 1 - For persons with disabilities who have been placed under legal guardianship; what guarantees need to be in place to ensure there is no breach.
Working with Immigrant Communities in Your CCR
Interviewing Vulnerable Populations
Partnership in Action – Keeping Children Safer
The added Value of the Istanbul Convention: Prevention, Protection and Support to victims of violence Hilary Fisher Expert consultant, former member of.
TRIPLE JEOPARDY: Protecting
Domestic and Family Violence - A workplace issue
Peer on Peer (Child on child) Abuse
Medical/Legal and Ethical Issues
Disaster and Emergency Planning
SAFEGUARDING – MENTAL CAPAPCITY ACT.
Assessing Child Safety in the Context of Domestic Violence
Sexting case study Every case is unique, taking risk factors into consideration to aid decision making. No clear definite answers but safeguarding the.
TRIPLE JEOPARDY: Protecting
TRIPLE JEOPARDY: Protecting
Assessing Child Safety in the Context of Domestic Violence
TRIPLE JEOPARDY: Protecting
Sexual Assault Employee Training.
Anti- Human Trafficking Manual for Criminal Justice Practitioners Purpose
Safeguarding and Devolution:Northern Ireland Perspective
Module 7 Do No Harm INTERNATIONAL PROTOCOL
GENERAL DATA PROTECTION REGULATION (GDPR)
Individual Criminal Responsibility
Module 8 Safety and Security INTERNATIONAL PROTOCOL
HOW CAN PROVIDERS DEAL WITH ELDER ABUSE
International Protocol
209: Family Reunification and Case Closure in Child Sexual Abuse Cases
Forced Marriage A forced marriage is a marriage where one or both people do not (or in the case of some people with learning or physical disabilities,
13 February 2018 In search of a Remedy:
Module 9 Planning INTERNATIONAL PROTOCOL
Respond Evaluate Crime Scene Investigation Hermitage Technical Center - Criminal Justice Team Process Debrief.
Centre for Non-Violence
Safeguarding.
Connections Abuse Prevention Plan 2018.
Management of Allegations Against Adults who work with Children Linda Evans (Head of Quality Assurance for Safeguarding) and Majella O’Hagan (Local Authority.
Assessment of Hotline (Screen-In) Assignments
“Seven-minute Staff Meeting”
Chiamaka Anyaegbu Centre for Socio-Legal Studies
Safe programming/Protection mainstreaming
CEng progression through the IOM3
DEFINING THE CONCEPT OF TRAFFICKING IN PERSONS
Presentation transcript:

Module 3 - Preliminary Considerations Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 INTERNATIONAL PROTOCOL, PART 2 MODULE 3 PAGES 29-36

What is your most important obligation? Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 DO NO HARM

 The guiding principle for any investigation or documentation of sexual or gender-based violence should be to do no harm – particularly when dealing with children  This means thinking carefully about the possible negative impacts of cooperation for the survivor/witness (e.g. social, legal, psychological, security, data protection) and making every possible effort to prevent or minimise them in your work Do No Harm International Protocol, pages 29, 30, 38 Module 1 – Understanding Sexual Violence Module 5 – Identifying Survivors or Other Witnesses Training Materials on the International Protocol © Institute for International Criminal Investigations 2015

P LAN AND PREPARE – DON ’ T PATRONISE  It does not mean assuming that all victims of sexual violence are broken or fearful – they may be vulnerable, but they can also be empowered by telling their story and pursuing accountability  If your analysis indicates that the risks are too severe or cannot be mitigated, you should not approach that survivor or witness  No piece of evidence/information or professional ambition should take priority over the safety, privacy or personal wishes of survivors or witnesses Do No Harm International Protocol, pages 29, 30, 38 Module 1 – Understanding Sexual Violence Module 5 – Identifying Survivors or Other Witnesses Training Materials on the International Protocol © Institute for International Criminal Investigations 2015

All members of your team should try to meet the following minimum standards: Do No Harm International Protocol, pages 29, 30, 38 Module 1 – Understanding Sexual Violence Module 6 – Testimony Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 Understand the risks Be properly trained Get informed consent Protect the information Take special care with children

 All members of your team should be appropriately trained and vetted to deal with sexual violence – that includes interpreters, interviewers, analysts, support staff and intermediaries  The International Protocol and these training materials can be used to train team members on the basic standards of documentation  All members of the documentation team should also be trained on and be aware of the following issues: Training International Protocol, pages Module 7 – Interviewing Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 Appropriate interview techniques Sensitive responses to disclosure Recognising trauma

 There are some specific considerations when working with children who are victims or witnesses of sexual violence  If you or your colleagues will be approaching, interviewing or referring children, you should be trained on issues such as: Training International Protocol, pages Module 6 – Testimony Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 Do no harm, confidentiality and informed consent Age-appropriate interviewing techniques Preventing re-traumatisation Specific challenges and vulnerabilities

 Before undertaking any documentation of sexual violence, careful research and planning is crucial  It is vital to understand the context to be able to assist survivors to remain safe and pursue accountability  Careful research allows you to discover what information is already publicly available and to assess the following issues: Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 Research and risk assessments International Protocol, page 30 Crimes, context and community Risks to witnesses, staff and data Available support services

 Research is a key part of the preparation phase before beginning any investigation or documentation of sexual violence  It allows you to understand the context, plan your approach, identify gaps in the available information and to recognise and minimise risks to survivors, witnesses or staff   Some information will be readily available from open source reports or international organisations, some may only be available locally or from domestic authorities /NGOs   Analysing as much information as possible before beginning the investigation or documentation will help focus your enquiries and increase the relevance of information/evidence collected Research International Protocol, pages Module 4 – Key Planning Topics Training Materials on the International Protocol © Institute for International Criminal Investigations 2015

PRELIMINARY RESEARCH - SPECIFIC CRIMES Relevant issues for researching specific crimes of sexual violence include: Research International Protocol, pages Module 1 – Understanding Sexual Violence Module 2 – Sexual Violence as an International Crime Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 Cultural attitudes to sexual violence Gender roles & social dynamics Forms & patterns of sexual violence Specific obstacles for male & child victims Available forms of justice & redress Local & regional security situation Official reports & national inquiries Rules of evidence & legal elements

PRELIMINARY RESEARCH – CONTEXT OF CRIMES Relevant issues for researching the context in which crimes of sexual violence have taken place include: Research International Protocol, pages Module 1 – Understanding Sexual Violence Module 2 – Sexual Violence as an International Crime Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 Ethnic/ religious/ racial tension History & patterns of gender violence Targeted groups – who and how Political & security situation Overlap with other crimes Details of conflict/ attack

Research International Protocol, pages Module 2 – Sexual Violence as an International Crime Module 5 – Identifying Survivors and Other Witnesses Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 Armed groups, territory and control Male/female membership of armed groups Ability to block/control inquiries Military/ security structures Influence over local society Political or military contacts PRELIMINARY RESEARCH – PERPETRATORS Relevant issues for researching groups or individuals who are alleged or suspected to have committed sexual violence include:

PRELIMINARY RESEARCH – REFERRAL SERVICES Relevant issues for researching the support services available to survivors or witnesses of sexual violence include: Research International Protocol, pages Module 4 – Key Planning Topics Module 6 – Testimony Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 Medical & psycho-social services Local NGOs & victim support groups Security & financial obstacles Local/ national/ regional organisations Ability to access legal or economic aid Referral options/ follow-up

 During the planning phase, it is your responsibility to conduct careful and thorough threat and risk assessments for those you will interact with, your own team and your information  This means identifying any possible threats that could cause harm to survivors, witnesses or team members and analysing the risk or likelihood that these threats could come to pass  Risk assessments have impacts for staffing, approaching and interviewing survivors, witnesses and information security – make use of information obtained during the research phase Threat and risk assessments International Protocol, pages Module 1 – Understanding Sexual Violence Module 5 – Identifying Survivors and Other Witnesses Training Materials on the International Protocol © Institute for International Criminal Investigations 2015

Threat and risk assessments International Protocol, pages Module 1 – Understanding Sexual Violence Module 5 – Identifying Survivors and Other Witnesses Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 ASSESSING RISKS TO SURVIVORS/ WITNESSES For each of these issues, you should assess the severity of the potential harm, identify individual vulnerability, analyse the risk or likelihood of them occurring and look for potential mitigating factors Violence & retaliation from suspects Reviving trauma Coercion or pressure from family Denial of access to services Impact on family & relationships Stigma or social rejection Punishment by family Arrest or legal penalty for complaint Loss of job or position in society

Threat and risk assessments International Protocol, pages Module 1 – Understanding Sexual Violence Module 5 – Identifying Survivors and Other Witnesses Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 ASSESSING RISKS TO SURVIVORS/ WITNESSES The following factors can be relevant when assessing risks to survivors or witnesses: Current level of hostilities and location of perpetrators Capacity of perpetrator/associates to carry out threats Ability to identify/trace sources of information Specific concerns for certain groups (i.e. children) Other & safer means of accessing information

Threat and risk assessments International Protocol, pages Module 5 – Identifying Survivors and Other Witnesses Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 ASSESSING RISKS TO STAFF/ TEAM MEMBERS For each of these issues, you should assess the severity of the potential harm, identify individual vulnerability, analyse the risk or likelihood of them occurring and look for potential mitigating factors Access to/ travel within region Kidnapping/ abduction Armed groups & terrorist activity Unexploded ordnance Specific targeting of investigators Local or ethnic team members Dangers from environment Evacuation/ emergency plan Vicarious trauma

Threat and risk assessments International Protocol, page 35 Module 9 – Storing Information Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 ASSESSING RISKS TO EVIDENCE/ INFORMATION The following factors can be relevant when planning how to store and manage your evidence or information: Confidentiality and control of information Security/capacity of storage facilities Maintaining the chain of custody Ability to collect & transport information

 Following your research and risk assessments, ask yourself the following questions about your overall strategic plan: Overall planning International Protocol, pages Module 4 – Key Planning Topics Module 6 – Testimony Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 What is our purpose/ desired outcome? Do we have the capacity to do this properly? What will we do with the evidence/ information? What and how will we prioritise? What sources are available to us? What are the security risks? How severe? How will we communicate our findings?