Information Sharing 1. Overview Inquiries into sexual violence incidents are extremely sensitive. Collecting and sharing information on GBV can be dangerous,

Slides:



Advertisements
Similar presentations
Targeted Case Management
Advertisements

CP Sub-Cluster Coordinator Training CP Sub-Cluster Coordinator Training 2010 The Role of the Coordinator in Information and Knowledge Management.
Gender-Based Violence Information Management System
Child Safeguarding Standards
Gender-based Violence Information Management System
Ethics in Field Research Philip Verwimp 27 February, 2014.
2015 Point In Time Count: Broward County CoC Plan to End Homelessness
Fundamentals of IRB Review. Regulatory Role of the IRB Authority to approve, require modifications in (to secure approval), or disapprove all research.
TODAY’S TOPIC: Ethics – deconstructing consent and participation with “vulnerable” populations.
Chapter Four. Writing the Proposal  What does the intended reader/audience need to understand better about the topic?  What does the audience know little.
CUMC IRB Investigator Meeting November 9, 2004 Research Use of Stored Data and Tissues.
Copyright Eileen Pittaway and Linda Bartolomei, UNSW Centre for Refugee Research Session 2 What is Community Consultation?
Evaluation. Practical Evaluation Michael Quinn Patton.
Network security policy: best practices
Gender-based Violence SOP Training Workshop Standard Operating Procedures 1.
Codex Guidelines for the Application of HACCP
National Public Health Performance Standards Local Assessment Instrument Essential Service:3 Inform, Educate, and Empower People about Health Issues.
Overview of MASH MASH training. What is a MASH?  Multi Agency Safeguarding Hub  A MASH is a centre which brings together agencies (and their information)
Administrator Checklist Research and Training Center on Service Coordination.
International Research & Research Involving Children K. Lynn Cates, MD Assistant Chief Research & Development Officer Office of Research & Development.
D OCUMENT O UR W ORK (DOW) VDSS O UTCOME R EPORT VAdata: Virginia’s Sexual and Domestic Violence Data Collection System.
Topic 4 How organisations promote quality care Codes of Practice
Violence & Vulnerabilities Addressing GBV & HIV in Humanitarian Settings.
Training on Child Protection Rapid Assessment the Libya Crisis Cairo, 9-11 April 2011 Inter-agency Child Protection Working Group & Save the Children Picture:
 Understanding the IRB Process University of Tennessee Health Science Center Institutional Review Board.
Strengthening Health System Responses to Gender-based Violence in EECA: A resource package 7. Documentation of GBV 1.
1. IASC Operational Guidance on Coordinated Assessments (session 05) Information in Disasters Workshop Tanoa Plaza Hotel, Suva, Fiji June
ENHANCING FAMILY GROUP DECISION MAKING WITH FAMILIES EXPERIENCING DOMESTIC VIOLENCE April 8, 2010.
IRB Belmont Report Federally mandated Risks -> minimized & reasonable Informed consent rospective Approval Prospective Approval Monitoring for subject.
Crosswalk of Public Health Accreditation and the Public Health Code of Ethics Highlighted items relate to the Water Supply case studied discussed in the.
Coordination Page Multi-Sectoral, Coordinated Action General coordination responsibilities of a multi- sectoral and community-based approach include:
Gender-based Violence (GBV) prevention and response in humanitarian settings TYPHOON HAIYAN / YOLANDA.
1-2 Training of Process Facilitators 3-1. Training of Process Facilitators 1- Provide an overview of the role and skills of a Communities That Care Process.
Inter-agency Global Evaluation of RH Services for Refugees and IDPs Component 4 Part B: Assessment of the Minimum Initial Service Package (MISP) of Reproductive.
Consultant Advance Research Team. Outline UNDERSTANDING M&E DATA NEEDS PEOPLE, PARTNERSHIP AND PLANNING 1.Organizational structures with HIV M&E functions.
Qualitative Approaches for FS Assessments Summary of Day 1.
APPROVAL CRITERIA AN IRB INFOSHORT MAY CFR CRITERIA FOR IRB APPROVAL OF RESEARCH In order for an IRB to approve a research study, all.
National Public Health Performance Standards Local Assessment Instrument Essential Service:6 Enforce Laws and Regulations that Protect Health and Ensure.
Reporting and Referral Procedures Section 5 Page 19 1.
Guidelines for Integrating Gender-based Violence Interventions in Humanitarian Action Basic Introduction and Overview.
Documentation, Data, and Monitoring Section 9 Page 38 1.
Elements of Ethical Review of Study Documents Dr.C.H.Shashindran Director-Professor & Head Department of Pharmacology JIPMER.
GBV Window GenCap Technical Workshop 20 February Presented by Jessica Gorham and Janey Lawry- White.
HPTN Ethics Guidance for Research: Community Obligations Africa Regional Working Group Meeting, May 19-23, 2003 Lusaka, Zambia.
Mortality Review VI-4. 2 Benefits of Mortality Review  improved monitoring of quality of care  development of a mortality database  improved timeliness.
HUMANITARIAN RESPONSE MONITORING. HOW TO USE THIS PRESENTATION This presentation contains a complete overview of all aspects of Response Monitoring Presenting.
Training of Process Facilitators 1- Training of Process Facilitators 5-1.
Session 2: Developing a Comprehensive M&E Work Plan.
Sharing Personal Information Programme Wales Accord on the Sharing of Personal Information (WASPI) for organisations involved in the protection, safety,
Quality Metrics of Performance of Research Ethics Committees Cristina E. Torres, PhD FERCAP Coordinator.
Moving Beyond Response Multi-Disciplinary Teams and Strategies for Preventing Abuse.
GCP (GOOD CLINICAL PRACTISE)
Module 3 - Preliminary Considerations Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 INTERNATIONAL.
Module 4 – Key Planning Topics Training Materials on the International Protocol © Institute for International Criminal Investigations 2015 INTERNATIONAL.
Child safe guarding Child protection in your organisation.
Norm Suchar Director, Office of Special Needs Assistance Programs
Sexting case study Every case is unique, taking risk factors into consideration to aid decision making. No clear definite answers but safeguarding the.
How can field leadership make a difference?
Data Collection Methods for Problem Statement
Overview – Guide to Developing Safety Improvement Plan
Research Ethics Matthew Billington
Overview – Guide to Developing Safety Improvement Plan
International Protocol
PRESENTATION AT 49TH WASH IN EMERGENCY WORKING GROUP MEETING
Results of the Organizational Performance
Data Collection An Overview of the AEMS Sampling Plan and
GENERAL INTRODUCTION TO ADVOCACY
Safeguarding Adults local procedures
Monitoring and Evaluating FGM/C abandonment programs
New Special Education Teacher Webinar Series
Presentation transcript:

Information Sharing 1

Overview Inquiries into sexual violence incidents are extremely sensitive. Collecting and sharing information on GBV can be dangerous, even life threatening to survivors, communities, and those involved in collecting the information. There are many ethical and safety issues that must be considered and planned for in advance. 2

Why Share Information? To improve GBV programming by: Strengthening inter-agency coordination – Facilitating referral mechanisms – Improving communication/feedback between GBV actors Informing decisions – Understanding gaps and where there may be duplication of services for improved response – Enhancing, coordinating with and broadening the target audience for prevention programming Managing GBV information in an effective, ethical, safe and coordinated way for all stakeholders working on prevention and response to GBV. – Informing advocacy and fundraising efforts 3

Considerations for GBV Info Management At every stage of the data management process (collection, storage, sharing and analysis), actors must carefully consider the following: – how the information will be used – who will see it – how the information will be reported and to whom – for what purposes will it be reported – who will benefit from it and when – possible risks and risk minimization 4

Considerations for GBV Info Management (continued) Is the information truly needed? What happens when: – SV is “over-researched”? – Multiple inquiries are conducted in the same place, by different actors, with little info sharing or coordination? Given that sexual violence is known to be prevalent in all settings, a lack of specific data about sexual violence in a specific setting is not sufficient justification for the collection of information about sexual violence, much less sharing collected information with others. 5

Reference Guide Read: WHO Ethical and safety recommendations for researching, documenting and monitoring sexual violence in emergencies The following slides outline 8 essential Ethical and Safety considerations outlined in this publication. 6

8 Ethical & Safety Recommendations 1.The benefits to respondents or communities of documenting GBV must be greater than the risks to respondents and communities. 2.Information gathering and documentation must be done in a manner that presents the least risk to respondents, is methodologically sound, and builds on current experience and good practice. 7

8 Ethical & Safety Recommendations (continued) 3.Basic care and support for survivors/victims must be available locally before commencing any activity that may involve individuals disclosing information about their experiences of sexual violence. 4.The safety and security of all those involved in information gathering about sexual violence is of paramount concern and should be continuously monitored. 5.The confidentiality of individuals who provide information about sexual violence must be protected at all times. 8

8 Ethical & Safety Recommendations (continued) 6.Anyone providing information about sexual violence must give informed consent before participating in the data gathering activity. 7.All members of the data collection team must be carefully selected and receive relevant and sufficient specialized training and support. 8.Additional safeguards must be put into place if children (i.e. those under 18 years) are to be the subject of information gathering. 9

Questions to Consider What is the purpose of the proposed data collection activity? How likely is it that the data collection and analysis will achieve the intended purpose? What are the likely risks to survivors, their families, supporters, and communities? What are the likely risks to those involved in the proposed data collection activity? How can the above risks be minimized? Will this population benefit directly from the end result? 10

Info-sharing protocols Determine the purpose and expected outcomes for sharing information Decide what information is to be shared and how/to whom (information flow chain) Clarify the roles and responsibilities for all actors involved (those sharing, those compiling, those analyzing) Please see the sample Information Sharing protocol in your Workbook 11

Info-sharing protocols (continued) Agree on how submitted and compiled data is stored, analyzed and used once compiled (and how it will not be used) Ensure confidentiality measures are taken at every step – to protect the individuals who have experienced and reported GBV, and the organizations documenting their cases Determine how consent from GBV survivors is obtained for all data to be shared 12

Activity (15min) Read the information sharing protocol example in groups. How would you change this document to pertain to your field site? 13

Publicizing GBV Information The degree to which even non-identifiable aggregate information can – or should – be shared publicly (including on the Internet) must be determined on a case-by-case basis by all those providing the data, and in accordance to the information sharing protocol that was developed. To ensure that it is both safe and appropriate to share any GBV data, each organization should separately evaluate any risks to individuals, the community, staff and programs that may arise as a result of the sharing and publicizing of data. 14

Questions, Comments 15