Presentation is loading. Please wait.

Presentation is loading. Please wait.

Risk, Wisdom, and Persecution  Personal  Organizational  Others What is the worst-case scenario if security is breached?  How would it affect foreign.

Similar presentations


Presentation on theme: "Risk, Wisdom, and Persecution  Personal  Organizational  Others What is the worst-case scenario if security is breached?  How would it affect foreign."— Presentation transcript:

1 Risk, Wisdom, and Persecution  Personal  Organizational  Others What is the worst-case scenario if security is breached?  How would it affect foreign workers?  How would it affect local workers?  How would it affect local Christians?  How would it effect the future access to the people group by others or us?  How would it affect my church/organization?  How would it affect me? Questions regarding Security

2 Risk, Wisdom, and Persecution  To provide a reasonably safe environment for the transmission of the Gospel.  To provide a reasonably safe environment for the residency of foreign workers.  To provide reasonably safe conditions under which conversions can be made.  To provide reasonably safe conditions under which discipleship and leadership training can occur.  To provide reasonably safe conditions under which worship can occur.  To provide for the on-going ministry of the Gospel in the multiplication of units and meeting the needs of the believer and the lost.

3 Security Types of Relationships  Private = Immediate family  Personal = Family and close friends  Public = Open to all  Perceived Work = Platform or reason for living in country  Ministry = Real reason for living in country  Professional = Organization who sponsors your Work and/or Ministry.

4 Security is not defense. It is a safety line that frees one to have the confidence to do one’s job.  Personal Security  Relationship (Network) Security  Professional Presence (Perceived Work) Security  Ministry Security Related topics  Health  Evacuation  Travel  Communications  Crisis Management

5 Personal Security – Taking care of the home so one will be free to do the job. Access Definitions  Restricted – Access is allowed only during the presence and by the permission of the household.  Limited – Access is limited to predefined times, areas, and conditions/situations.  Open – Family only (define family very clearly) Personal Security Related Recommendations  Work related meetings should take place away from the home.  Ministry related meetings should take place away from the home.  Vary routine of coming/going, and the routes taken to regular locations.

6 Personal Security – Taking care of the home so one will be free to do the job. Issues  Home safety and dealing with minor emergencies  Household help and their level of access and knowledge  Visitors and their level of access and knowledge Classification of Visitors  Stranger – No access  Service/Goods Providers – Restricted access  Employees – Limited access (related to duties and work hours)  Acquaintance – Restricted access  Friends – Restricted/Limited access  Colleagues – Restricted/Limited access  Guests – Limited Access  Family – Limited/Open access

7 Personal Security – Taking care of the home so one will be free to do the job. Other Security Recommendations  Have a safe to keep important and sensitive documents, and funds.  Use locking filing cabinets for all work related documents.  Use electronic filing under security encryption when possible.  Have alternate telephone communication routes.  Have an evacuation plan.  Have a separate office from the home. If you must have an office in the home, it should have a separate entrance from the home.  Have predefined procedures for employees, colleagues, guests, children, and family to follow in the home and the office.

8 Personal Security – Taking care of the home so one will be free to do the job.  Have an emergency contact list with an understanding of what level of emergency will result in contacting a certain person on the list.  Posted telephone/fax numbers  Local contacts  Foreign contacts

9 Network Security – Taking care of relationships Network Security Categories  No Access – Not allowed to know anyone or anything.  Restricted Access – Allowed to know limited information about me, but information about others or related to others is not revealed.  Limited Access – Allowed to know certain information pertaining to specific dimensions of work/life, while other areas remain restricted or no access.  Open access – Information is not hidden, but is only revealed when requested, or if there is a need to know the information. One person may fit any or all of these categories as related to private, personal, public, perceived work, ministry, or professional lives.

10 Who knows what about various dimensions of private/work/ministry lives. Principles  No one knows everything about you and what you do.  Access is built on trust and trust is earned, not given.  Not everyone needs to have or requires access or equal access to what you know even if they are trusted. Types of Relationships  Private = Immediate family  Personal = Family and close friends  Public = Open to all  Perceived Work = Platform or reason for living in country  Ministry = Real reason for living in country  Professional = Organization who sponsors your Work and/or Ministry. Network Security – Taking care of relationships


Download ppt "Risk, Wisdom, and Persecution  Personal  Organizational  Others What is the worst-case scenario if security is breached?  How would it affect foreign."

Similar presentations


Ads by Google