CORE PROTECTION TRAINING MODULES PROTECTION TRAINING DAY 2: PROTECTION IN PRACTICE Date and location go here FACILITATORS: Names go here.

Slides:



Advertisements
Similar presentations
Outcome mapping in child rights-based programming
Advertisements

Gender Analysis Framework
Integrating the NASP Practice Model Into Presentations: Resource Slides Referencing the NASP Practice Model in professional development presentations helps.
WCDR Thematic Panel Governance: Institutional and Policy Frameworks for Risk Reduction Annotated Outline UNDP – UNV – ProVention Consortium – UN-Habitat.
SESSION 1: INTRODUCTION TO HUMANITARIAN ACTION. What guides UNICEFs humanitarian action Characteristics and challenges posed by complex emergencies UNICEFs.
Assessment of Laws and Policies for Strengthening Adolescent Sexual and Reproductive Health in Bangladesh Experience of implementing human rights related.
Intelligence Step 5 - Capacity Analysis Capacity Analysis Without capacity, the most innovative and brilliant interventions will not be implemented, wont.
Phase 1 Do No Harm Basic Phase 2 Partners Beneficiaries Diversion Phase 3 Complaints Flexibility Communication Phase 4 Review Building Capacity Good Enough.
AN INTRODUCTION TO SPHERE AND THE EMERGENCY CONTEXT
Information Sharing 1. Overview Inquiries into sexual violence incidents are extremely sensitive. Collecting and sharing information on GBV can be dangerous,
Human Rights Council Social Forum Policy Brief on Abuse of Older Persons Viviane Brunne UNECE Population Unit 2 April 2014.
Clinical Supervision Foundations Module Six Performance Evaluation.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
STANDARDS FOR SCHOOL LEADERS DR. Robert Buchanan Southeast Missouri State University.
2011 Overall Objectives Contributing toward limiting Violence against Women, and fostering the role of the NCHR in combating VAW focusing on domestic.
ATP Winter 2008 Workshop Jim Valkenburg Delta College.
CORE PROTECTION TRAINING MODULES PROTECTION TRAINING DAY 3: PROTECTION ADVOCACY AND PLANNING FOR THE FUTURE Date and location go here FACILITATORS: Names.
Principal CP issues and approaches in emergencies.
 Critical Enablers for HIV, TB & Malaria Responses UNDP & Global Fund informal session 30 th meeting of the Global Fund Board Dr Mandeep Dhaliwal United.
1 Foundation module 3 Programme design. 2 Section 1 Understand childhoods and child protection issues Section 2 Know the law and child rights Section.
Human Rights Monitoring and Reporting. What is human rights monitoring and how does it differ from similar activities? Human rights monitoring is a broad.
INTERACTION APPLYING BASIC Child Protection Mainstreaming TRAINING.
NSW Interagency Guidelines for Child Protection Intervention 2006 Briefing Information Session Child Protection Senior Officers Group.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Violence & Vulnerabilities Addressing GBV & HIV in Humanitarian Settings.
Protection Mainstreaming
Contingency Planning and Emergency Preparedness Process and Practice PCWG Protection Cluster Coordination Training 2008.
APAPDC National Safe Schools Framework Project. Aim of the project To assist schools with no or limited systemic support to align their policies, programs.
Community Participation in Recovery Jon Bennett Director, Oxford Development Consultants Wenchuan Earthquake Response, China Workshop, July 14-15, 2008,
IAEA International Atomic Energy Agency Reviewing Management System and the Interface with Nuclear Security (IRRS Modules 4 and 12) BASIC IRRS TRAINING.
Sexual and gender-based violence A two-day psychosocial training
LAW, JUSTICE AND DEVELOPMENT WEEK 2011 “Draft Voluntary Guidelines on the Responsible Governance of Tenure of Land, Fisheries and Forests” Patrice Talla,
Assessments. Assessment in the Project Cycle DESIGN IMPLEMENTATION MONITORING EVALUATION ASSESSMENT.
Crosswalk of Public Health Accreditation and the Public Health Code of Ethics Highlighted items relate to the Water Supply case studied discussed in the.
Environmental Management System Definitions
April_2010 Partnering initiatives at country level Proposed partnering process to build a national stop tuberculosis (TB) partnership.
NETWORK PRESENTATION- Botswana Network on Ethics, Law and HIV/AIDS(BONELA) REGIONAL WORKSHOP ON HIV/AIDS and VULNERABLE GROUPS MARCH 11-13, 2009, CAPE.
Keep your promise to women and girls Violence against Women and Girls in National AIDS plans.
Copyright © 2012 Brooks/Cole, a division of Cengage Learning, Inc. Professional Concerns Chapter Nine.
1 Critical issue module 1 Abuse and exploitation.
STAKEHOLDER MEETING Selecting Interventions to Improve Utilization of the IUD City, Country Date Insert MOH logoInsert Project logoInsert USAID logo (Note:
Strengthening Health System Responses to Gender-based Violence in EECA: A resource package 4. Principles and standards for service provision 1.
World Bank Social Development Strategy, June 2002 A Social Development Strategy for the World Bank Susan Jacobs Matzen Social Development Specialist World.
Annual Report 2011 PBF JP 2 SC 14 February OBJECTIVES and OUTCOME The objective of JP2 is to address the core issues of protection with a focus.
UNITED NATIONS POLICE STANDARDIZED BEST PRACTICES TOOLKIT ON GENDER MAINSTREAMING POLICING IN PEACEKEEPING 1.
Reporting and Referral Procedures Section 5 Page 19 1.
Defining Protection Concepts, Practices, Frameworks.
DEVELOPING THE WORK PLAN
Women and girls in sport in Ireland Let’s level the playing field 28th October Dublin Isabel Romão Member of the CoE Gender Equality Commission Member.
NALSA.  To minimize harm or secondary victimization of victims of trafficking  To protect and safeguard the rights of victims and witnesses of trafficking.
TRAINING COURSE. Course Objectives 1.Know how to handle a suspected case 2.Know how to care for a recognized trafficked person referred to you Session.
Defining Protection Protection of what, from what, by whom? Inter-Agency Definitions How do we do it? Priorities? ProCap Protection Stand-By Training.
Waisea Vosa Climate Change Unit Division of Political and Treaties Ministry of Foreign Affairs and International Cooperation.
Social Work Competencies Social Work Ethics
PARTICIPATORY GOVERNANCE ASSESSMENT (PGA) OVERVIEW OF PILOT RESEARCH IN CROSS RIVER STATE, NIGERIA Tony Atah, UN-REDD+ Stakeholder Engagement Specialist.
Education Queensland SMS-PR-021: Safe, Supportive and Disciplined School Environment pr/students/smspr021/
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
The Common Assessment Framework (CAF) & Lead Professional (LP)
Right 1 - ACCESS Right to access health and community services I have a right to access health and community services that meet my identified needs.
SAFE toward a WORLD for children Five-Year Strategic Plan
Gender, Diversity and Climate Change
HEALTH IN POLICIES TRAINING
Protection analysis tools
Purposes of the Convention
The Public Sector Equality Duty
PRESENTATION AT 49TH WASH IN EMERGENCY WORKING GROUP MEETING
Foundation module 3 Programme design.
The Public Sector Equality Duty
Humanitarian protection workshop
COMPREHENSIVE SEXUALITY EDUCATION (CSE) PROVISION
Presentation transcript:

CORE PROTECTION TRAINING MODULES PROTECTION TRAINING DAY 2: PROTECTION IN PRACTICE Date and location go here FACILITATORS: Names go here

TRAINING OUTLINE DAY TWO 09:00 – 10:40Practical approaches to protection 10:40 – 11:15Break 11:15 – 12:55Protection programming 12:55 – 2:00Lunch 2:00 – 3:50Protection assessment 3:50 – 4:10Break 4:10 – 6:00Developing a Proframe CRS Core Protection Training Modules

A FRAMEWORK FOR PROTECTION ACTIVITIES CRS Core Protection Training Modules 3

LEARNING OBJECTIVES  Describe the aims, outcomes, and activities typical of a protection program;  Integrate protection analysis into their assessment;  Mainstream protection across CRS’ strategic programming areas, both emergency and non emergency;  Describe how to gather data on sensitive issues like rape, GBV, abuses by public officials, etc.;  Describe systems for keeping information confidential; CRS Core Protection Training Modules 4

LEARNING OBJECTIVES  Strengthen analytical capacity and ability to manage sensitive data;  Describe ethical and practical implications associated with sensitive data collection or the management of sensitive information;  Apply knowledge of protection to design protection programs. CRS Core Protection Training Modules 5

FRAMEWORK FOR PROTECTION – EGG MODEL Spheres of Action  Responsive Action (deal with the current abuse, aim at preventing, stopping, or alleviating its immediate effect)  Remedial Action (subsequent action, restoration, rehabilitation, compensation)  Environment-Building ( create an environment conducive to full respect for the rights of the individual ) CRS Core Protection Training Modules 6

MODES OF ACTION Support to structures “Responsibilising”: working towards fulfilling legal obligations Direct services: working to provide assistance Persuasion Substitution of services Denunciation Mobilizing 7 CRS Core Protection Training Modules

FRAMEWORK FOR PROTECTION WORK MODES OF ACTION  Persuasion: convincing authorities through private dialogue to fulfill their obligations and to protect individuals and groups exposed to violations;  Denunciation: pressuring authorities through public disclosure into meeting their obligations and protecting individuals and groups exposed to abuses;  Mobilization: sharing information in a discreet way with selected individuals, bodies, or states that can influence authorities to satisfy their obligations and protect individuals and groups exposed to violations;  Substitution: directly providing services or material assistance to the victims of the violations;  Support to structures and services: empowering existing national and/or local structures through project-oriented aid to enable them to protect individuals and groups. CRS Core Protection Training Modules 8

COMPLEMENTARITY MAPPING “RESPONSIBILISING” DIRECT SERVICES Food packages Implementing water system Negotiating access Workshop on IHL Teacher Training Human rights report on violations Persuasion Denunciation Substitution of services Support to structures 9 CRS Core Protection Training Modules

QUESTIONS? CRS Core Protection Training Modules 10

ELEMENTS OF PROTECTION PROGRAMMING CRS Core Protection Training Modules 11

AIMS OF A GOOD PROTECTION PROGRAM Protection programs aim to change behaviors:  Changing behavior of perpetrators  Changing the actions of responsible authorities  Reducing the vulnerabilities of affected communities CRS Core Protection Training Modules 12

SPECIFYING PROTECTION OUTCOMES  Are positive and will genuinely improve people’s lives  Are practical descriptions of achievable changes and improved conditions  Will ideally address both threats and vulnerabilities CRS Core Protection Training Modules 13

A GOOD PROTECTION PROGRAM WILL…  Be as participatory and complementary as possible;  Be clear about its outcomes – select judiciously among the 5 modes of action;  Be realistic in its assumptions of what our agency can and cannot change in the short, medium, and long term;  Be complementary with others’ work so that the range of protection needs is covered; CRS Core Protection Training Modules 14

DESIGNING A PROTECTION PROGRAM  Goal  Strategic objectives  Intermediate results  Activities  Outputs  Outcomes ProFrame CRS Core Protection Training Modules 15

Identify information, needs, resources Collect data Analyze, interpret Report conclusions Design/modify response ASSESSMENT CYCLE CRS Core Protection Training Modules 16

RISK-BASED MODEL Risk = Threat + Vulnerability x Time The risk based model means appreciating the precise nature of the threats and vulnerabilities people are experiencing and the capacities they have to prevent and cope with them. This will lead to an analysis of what a programme might do to ‘fill the gap’ CRS Core Protection Training Modules 17

EXAMPLE: THREAT/VULNERABILITY Poor sanitation in the village force women and girls to use “open air latrines” in the nearby forest, exposing them to risks of being sexually harassed. And this could be the solution! CRS Core Protection Training Modules

PROTECTION ASSESSMENT  Understanding violations, threats, and perpetrators (involves collecting data)  Assessing the impact of violations on protected people  Understanding and mapping community protection strategies  Identifying relevant legal standards and responsibilities  Mapping political commitment and resources for protection CRS Core Protection Training Modules 19

RISK-BASED MODEL FOR PROTECTION ANALYSIS  Reducing Threats Engaging those directly or indirectly responsible  Reducing Vulnerabilities Engaging communities  Reducing The Danger Time Limiting exposure to risks  Recognizing Primary and Secondary Risks CRS Core Protection Training Modules 20

EXERCISE: 30 MINUTES In your small groups complete the threat and vulnerability analysis (on page X) in your workbooks for the sample case study. Record answers on a flip chart for feedback to plenary. CRS Core Protection Training Modules 21

EXERCISE: 30 MINUTES In your small groups develop a simple questionnaire for assessing the protection issues you identified in the threat and vulnerability analysis exercise. Record questions on a flip chart for feedback to plenary. CRS Core Protection Training Modules 22

QUESTIONS FOR PRIORITIZING A RESPONSE  Which violations and threats – primary and secondary – are having the most devastating impact on individuals and communities?  Which violations and threats are most prevalent and persistent?  What are people’s greatest vulnerabilities?  Which vulnerabilities is your agency best positioned to address? CRS Core Protection Training Modules 23

BASIC RULES FOR COLLECTING SENSITIVE DATA Confidentiality:  Client confidentiality is essential, not only to protect the client but also to safeguard the integrity of the information and future data collection activities.  Client must be free to withdraw consent from the interview at any moment without prejudice.  Interview should be conducted in a manner that respects privacy and safety.  Collected data should be coded and kept in a secure place. CRS Core Protection Training Modules 24

CULTURAL CONTEXTS  Be aware of cultural and gender differences in verbal and non-verbal communication.  Be conscious of your own body language and avoid intimidating gestures that will inhibit responses  Dress appropriately  Clarify concepts  Language: ensure agreement or understanding of terms such as: “safety” – “gender” – “sexual violence” CRS Core Protection Training Modules 25

BEST PRACTICES  Focus on safety, dignity, and integrity  Think about law, violations, rights, and responsibilities  Ensure respect  Build on people’s own self-protection capacity  Prioritize inter-agency complementarity and be realistic about our own agency/partners’ limits CRS Core Protection Training Modules 26

QUESTIONS? CRS Core Protection Training Modules 27