IWPR's Digital Security and Capacity Tool (DISC) ================================================ - **Objective(s):** To gauge participants' existing digital security skill level, while also providing qualitative information on strengths and areas for improvement at a more granular, practice-specific level. disc tool is also a useful way to track their learning and comprehension progress. - **Format:** Appendix - **Needed materials:** - Copies of the DISC questionnaire Internal document with Scores ----------------------------- To Be Completed at Baseline and every six months, or at end of Training Period, as appropriate. Below you will find a series of questions that will allow your trainer to both understand the level of digital security practices within your organization, as well as to monitor any progress that it made thanks to the training you will or have received. The results are purely for monitoring and evaluation purposes and will only be shared anonymously within IWPR and with the donors supporting this project. Country .................................. At your organization: **1. The operating system and software I use to work have been updated: (please circle)** - Never (0 points) - In the last 6 months (1 point) - Within last 30 days (4 points) - Within last 15 days (5 points) - More than 6 months ago (0 points) - We have the newest system installed on this computer (5 points) - They are being updated at this moment (3 points) - I don't know that information (0 points) **2. ¿Do you backup your data through an external hard-drive or a cloud service: (please circle)** - Never (0 points) - More than a year ago (0 points) - In the last year (1 point) - In the last 6 months (2 points) - Within last 60 days (3 points) - Within last 30 days (4 points) - The data has been backed up within the last 14 days (5 points) - I don't know that information (0 points) **3. Are your hard drive or cloud service encrypted?** - Yes, both are encrypted (5 points) - No (0 points) - Only one of them is encrypted (3 points) - I don't know that information (0 points) - If you answered affirmatively, which encryption tool do you use? ...................... **4. The computer I use for work has original licensed software (for example Microsoft Windows, Microsoft Office, Adobe Photoshop, Adobe Illustrator, Corel Draw, Antivirus) or open source software programs (Open office, Scribus).** - Every program is pirated (0 points) - Some programs are pirated (1 point) - Most programs are licensed originals (2 points) - All programs are licensed and original (5 points) - Most programs are open source (2 points) - All programs are open source (5 points) - I am not sure (0 points) **5. Anti-virus programs are loaded on the computer and the mobile phone that I use to work, are up to date and run each time the equipment is turned on.** - Yes, computer and mobile phone (5 points) - Only on my computer (3 points) - Only on my mobile phone (3 points) - I don't have anti-virus programs (0 points) - I don't know if I have an antivirus program on all my devices (0 points) - If affirmative, which antivirus do you have on your computer? ............................................................. - If affirmative, which antivirus do you have on your phone? ............................................................. **6. I have locked my office computer screen/cellphone with a password for the screen lock.** - Yes (5 points) - No (0 points) - Only one of those devices has a password (2 points) **7. The Wi-Fi network where I work has a different password from the one that the internet service provider gave me, and it meets the standards for a strong password (Criteria: 1. includes at least 25 characters and, 2. includes both letters and numbers, and 3. Includes special characters, and 4. includes both lowercase and capital letters).** - Yes - password changed and meets at least two of the criteria for strong passwords (5 points) - No - servicer provider password was maintained (0 points) - Partially - only one of the criteria for passwords mentioned above has been applied (3 points) - Partially- the password was changed but none of the criteria for passwords were applied (1 point) **8. About the use of public Wi-Fi in hotels, airports or cafés** - I never use public Wi-Fi in hotels, airports or cafés unless I connect through a virtual private network (VPN) service. (5 points) - I sometimes use public Wi-Fi in hotels, airports or cafés without connecting through a VPN service. (2 points) - I always use public Wi-Fi in hotels, airports or cafés without a VPN service. (0 points) **9. About the back up of my work documents, I use file encryption tools for saving documents in my laptop** - Yes (5 points) - No (0 points) - Only for some documents (3 points) - If you answered yes, which file encryption tool do you use? ........................................ **10. Regarding the text via email or SMS between the members of your organization.** - I always use encryption for email, SMS or chats to transmit sensitive data (5 points) - I usually use encryption for email, SMS or chats to transmit sensitive data (3 points) - I rarely use encryption for email, SMS or chats to transmit sensitive data (2 points) - I never use encryption for email, SMS or chats to transmit sensitive data (0 points) **11. I share my passwords with (please circle all that apply):** - Intimate partner (0 points) - Siblings and/or parents (0 points) - Best friend (0 points) - Work colleagues (0 points) - No one (5 points) **12. Secure passwords have at least 25 characters (letters, numbers, special characters, small and capital). Do not use words from the dictionary, birthdays or any personal information. All my passwords meet these standards identified above to ensure a strong password.** - Yes (5 points) - No (0 points) - Only some of them (3 points) **13. I have different passwords for each of my devices and accounts (computer, phone, email, social media, bank etc)** - Yes (5 points) - No (0 points) - I have a few different passwords that I use, but sometimes repeat (1 point) - Some of my passwords are set by default by my organization/office/provider of service (3 points) **14. I have made a strategic decision about how to manage my social media identities for my private, work/activism accounts based on my level of risk.** *(For example using false/different identities and accounts for activism/work, or openly using my real name, photo and identity if I don't feel under threat ...)* - Yes - I have considered it and feel secure with my current management of online identities (5 points) - No - I haven't thought about it (0 points) - Partially- I consider it may make sense to create different or more anonymous online identities but haven't made the changes yet (2 points) - Partially - I have considered my online identities and made the changes, but I am still not sure if the setup is secure (4 points) - My situation means that it makes more sense for me to use my own name and real identity in all my social media accounts (5 points) **15. I store my passwords in a password protected secure digital keychain** - Yes (5 points) - No (0 points) - Only some accounts (3 points) - I don't know what that is (0 points) - Where is the key chain stored and in what format? **16. When you are browsing do you always navigate with HTTPS?** - Yes (5 points) - No (0 points) - What is that? (0 points) - I always check it but it is not always possible to navigate with HTTPS (3 points) **17. About your personal social media accounts.** - All my posts on social media are public (0 points) - I don't know who can see my posts on social media (0 points) - I choose specific settings for each post (4 points) - I adjust the settings to control who can see which information on my social media accounts (5 points) - I don't know how to set admin controls on any of my social media accounts (0 points) **18. click on links or open attachments in emails when: (please circle the dates closest to clicking)** - They seem to contain important or urgent information (0 points) - I know the sender, but unexpected email (ex. Emotional Partners, old friends) (1 point) - They come from my trusted network (2 point) - I expected them (3 points) - I know and verified the sender (5 points) **19. I use secure chats and secure online voice communications tools (VOIP) for my communications.** - Yes (5 points) - No (0 points) - Sometimes (2 points) - I don't know what this is (0 points) - Which secure tools do you use? ........................................ **20. I use power regulators to protect my important electronic devices from electrical surges:** - Yes (5 points) - No (0 points) - Only at my office (2 points) - Only at home (2 points) - Only for some devices (2 points) **Add up the points and record them on the Organizational Scorecard. ..... points/ 100 points** Example training agendas ======================== - **Format:** Appendix Although we are aware that the final content of a training session will be based on the diagnosis each trainer does of the group the will work with and we invite each trainer to adjust this session to better meeting the needs of the group, we do suggest a few options for what we think could be regular scenarios of trainings. The example agendas below are organized by length (in days), and then by participant skill level. Other planning parameters will of course inform the ultimate design of your training; however, time is almost always the most critical: How much time you have available ultimately determines how much content you can cover in a single workshop; this is furthermore determined by the collective skill level of the participants. You're more likely to know how many hours or days are available to work with a group before knowing other factors, such as the venue, the number of participants, or their collective skill level. Example Agendas for 1-Day to 1.5-Day Workshops ---------------------------------------------- ### 1.5-Day Introductory Workshop on Risk Assessment **Approximate Time Required: 10 hours** This training agenda was planned for a scenario involving a 1.5 day introductory digital security workshop, with a group of WHRDs or a women's collective, oriented primarily around general risk assessment. Ideally, the outcome of this workshop is that women participants can more easily identify their perceived risks, and can more clearly articulate their digital security needs. This agenda includes sessions on basic digital security, self-care practices and techniques for documenting and responding to abuse or threats. For this scenario, a follow-up strategy would need to be crafted by the trainer to address the results of participants' risk assessment(s). 1. Exercise: [The rules of the game](https://cyber-women.com/en/trust-building-exercises/the-rules-of-the-game/) ([Trust-building exercises](https://cyber-women.com/en/trust-building-exercises/)) 2. Exercise: [Defenders bingo](https://cyber-women.com/en/trust-building-exercises/defenders-bingo/) ([Trust-building exercises](https://cyber-women.com/en/trust-building-exercises/)) 3. Session: [Personal perceptions of security](https://cyber-women.com/en/rethinking-our-relationship-with-technology/personal-perceptions-of-security/) ([Rethinking our relationship with technology](https://cyber-women.com/en/rethinking-our-relationship-with-technology/)) 4. Exercise: [Who do you trust?](https://cyber-women.com/en/trust-building-exercises/who-do-you-trust/) ([Trust-building exercises](https://cyber-women.com/en/trust-building-exercises/)) 5. Session: [Your rights, your technology](https://cyber-women.com/en/rethinking-our-relationship-with-technology/your-rights-your-technology/) ([Rethinking our relationship with technology](https://cyber-women.com/en/rethinking-our-relationship-with-technology/)) 6. Exercise: [Gender-based risk model](https://cyber-women.com/en/determining-the-best-solution/gender-based-risk-model/) ([Determining the best solution](https://cyber-women.com/en/determining-the-best-solution/)) 7. Exercise: [Building feminist self-care](https://cyber-women.com/en/self-care/building-feminist-self-care/) ([Self-care](https://cyber-women.com/en/self-care/)) 8. Session: [Building stronger passwords](https://cyber-women.com/en/digital-security-basics-1/building-stronger-passwords/) ([Digital security basics 1](https://cyber-women.com/en/digital-security-basics-1/)) 9. Session: [How to secure your computer](https://cyber-women.com/en/digital-security-basics-1/how-to-secure-your-computer/) ([Digital security basics 1](https://cyber-women.com/en/digital-security-basics-1/)) 10. Session: [Safe browsing](https://cyber-women.com/en/digital-security-basics-1/safe-browsing/) ([Digital security basics 1](https://cyber-women.com/en/digital-security-basics-1/)) 11. Session: [Privacy](https://cyber-women.com/en/privacy/privacy/) ([Privacy](https://cyber-women.com/en/privacy/privacy/)) 12. Session: [Mobile phones 1](https://cyber-women.com/en/safer-mobiles/mobile-phones-1/) ([Safer mobiles](https://cyber-women.com/en/safer-mobiles/)) 13. Session: [Let's start a documentation journal!](https://cyber-women.com/en/online-violence-against-women/lets-start-a-documentation-journal/) ([Online violence against women](https://cyber-women.com/en/online-violence-against-women/)) 14. Exercise: [Feminist flowers](https://cyber-women.com/en/closing-and-review-exercises/feminist-flowers/) ([Closing and review exercises](https://cyber-women.com/en/closing-and-review-exercises/)) ### 1-Day Awareness Training for WHRDs Dealing with Online Harassment **Approximate Time Required: 5 hours** This training agenda was planned for a scenario involving a 1 day introductory digital security workshop with WHRDs who have just begun to deal with incidents of online harassment. Ideally, the outcome of this workshop is that women participants can more clearly articulate their digital security needs, and can more quickly identify warning signs or patterns of online gender-based violence. This agenda includes sessions about defining safety and security on a personal level, basic digital security practices and recognizing patterns of abuse and harassment. 1. Exercise: [The rules of the game](https://cyber-women.com/en/trust-building-exercises/the-rules-of-the-game/) ([Trust-building exercises](https://cyber-women.com/en/trust-building-exercises/)) 2. Exercise: [Tricky candy](https://cyber-women.com/en/trust-building-exercises/tricky-candy/) ([Trust-building exercises](https://cyber-women.com/en/trust-building-exercises/)) 3. Session: [Personal perceptions of security](https://cyber-women.com/en/rethinking-our-relationship-with-technology/personal-perceptions-of-security/) ([Rethinking our relationship with technology](https://cyber-women.com/en/rethinking-our-relationship-with-technology/)) 4. Session: [Building stronger passwords](https://cyber-women.com/en/digital-security-basics-1/building-stronger-passwords/) ([Digital security basics 1](https://cyber-women.com/en/digital-security-basics-1/)) 5. Exercise: [Symbolic violence](https://cyber-women.com/en/online-violence-against-women/symbolic-violence/) ([Online violence against women](https://cyber-women.com/en/online-violence-against-women/)) 6. Exercise: [Time to watch!](https://cyber-women.com/en/sexting/time-to-watch/) ([Sexting](https://cyber-women.com/en/sexting/sexting/)) 7. Session: [Sexting](https://cyber-women.com/en/sexting/sexting/) ([Sexting](https://cyber-women.com/en/sexting/sexting/)) 8. Exercise: [Our Reflection](https://cyber-women.com/en/self-care/our-reflection/) ([Self-care](https://cyber-women.com/en/self-care/)) ### 1-Day Risk Assessment Training for WHRDs Dealing with Online Harassment **Approximate Time Required: 7 hours** This training agenda was planned for a scenario involving a 1 day workshop with WHRDs who are dealing with ongoing incidents of online harassment, and who need support developing security plans and response strategies. Ideally, the outcome of this workshop is that women participants can more clearly articulate their digital security needs, feel more in control of their personal risk environment, and are able to develop a responsive, context-specific security plan and protocol for themselves. This agenda includes sessions about defining safety and security on a personal level, basic digital security practices and gender-based risk assessment. 1. Exercise: [The rules of the game](https://cyber-women.com/en/trust-building-exercises/the-rules-of-the-game/) ([Trust-building exercises](https://cyber-women.com/en/trust-building-exercises/)) 2. Session: [Personal perceptions of security](https://cyber-women.com/en/rethinking-our-relationship-with-technology/personal-perceptions-of-security/) ([Rethinking our relationship with technology](https://cyber-women.com/en/rethinking-our-relationship-with-technology/)) 3. Exercise: [Who do you trust?](https://cyber-women.com/en/trust-building-exercises/who-do-you-trust/) ([Trust-building exercises](https://cyber-women.com/en/trust-building-exercises/)) 4. Exercise: [Gender-based risk model](https://cyber-women.com/en/determining-the-best-solution/gender-based-risk-model/) ([Determining the best solution](https://cyber-women.com/en/determining-the-best-solution/)) 5. Session: [Privacy](https://cyber-women.com/en/privacy/privacy/) ([Privacy](https://cyber-women.com/en/privacy/privacy/)) 6. Exercise: [Doxxing the Troll](https://cyber-women.com/en/online-violence-against-women/doxxing-the-troll/) ([Online violence against women](https://cyber-women.com/en/online-violence-against-women/)) 7. Exercise: [Building feminist self-care](https://cyber-women.com/en/self-care/building-feminist-self-care/) ([Self-care](https://cyber-women.com/en/self-care/)) Example Agendas for 3-Day Workshops ----------------------------------- ### 3-Day Introductory-Level Training **Approximate Time Required: 15 hours** This training agenda is designed for a 3-day long workshop with beginner-level WHRDs who have not yet had a great deal of (or any) prior exposure to digital security practices. Introducing basic digital security and risk assessment practices, with an explicit parallel emphasis on self-care strategies, this training agenda would be appropriate for either an organizationally-focused workshop or a workshop for a mixed group of WHRDs from different collectives or countries within the same region. Furthermore, this agenda will prepare the group for an intermediate level follow-up training (see 3-Day Intermediate-Level Training example below); however, it can also be used for a standalone workshop. 1. Exercise: [The rules of the game](https://cyber-women.com/en/trust-building-exercises/the-rules-of-the-game/) ([Trust-building exercises](https://cyber-women.com/en/trust-building-exercises/)) 2. Exercise: [Defenders bingo](https://cyber-women.com/en/trust-building-exercises/defenders-bingo/) ([Trust-building exercises](https://cyber-women.com/en/trust-building-exercises/)) 3. Session: [Personal perceptions of security](https://cyber-women.com/en/rethinking-our-relationship-with-technology/personal-perceptions-of-security/) ([Rethinking our relationship with technology](https://cyber-women.com/en/rethinking-our-relationship-with-technology/)) 4. Exercise: [Who do you trust?](https://cyber-women.com/en/trust-building-exercises/who-do-you-trust/) ([Trust-building exercises](https://cyber-women.com/en/trust-building-exercises/)) 5. Session: [Your rights, your technology](https://cyber-women.com/en/rethinking-our-relationship-with-technology/your-rights-your-technology/) ([Rethinking our relationship with technology](https://cyber-women.com/en/rethinking-our-relationship-with-technology/)) 6. Session: [How does the internet work?](https://cyber-women.com/en/digital-security-basics-1/how-does-the-internet-work/) ([Digital security basics 1](https://cyber-women.com/en/digital-security-basics-1/)) 7. Exercise: [Feminist flowers](https://cyber-women.com/en/closing-and-review-exercises/feminist-flowers/) ([Closing and review exercises](https://cyber-women.com/en/closing-and-review-exercises/)) 8. Exercise: [Gender-based risk model](https://cyber-women.com/en/determining-the-best-solution/gender-based-risk-model/) ([Determining the best solution](https://cyber-women.com/en/determining-the-best-solution/)) 9. Exercise: [The act of NO](https://cyber-women.com/en/self-care/the-act-of-no/) ([Self-Care](https://cyber-women.com/en/self-care/)) 10. Session: [Building stronger passwords](https://cyber-women.com/en/digital-security-basics-1/building-stronger-passwords/) ([Digital security basics 1](https://cyber-women.com/en/digital-security-basics-1/)) 11. Session: [Safe browsing](https://cyber-women.com/en/digital-security-basics-1/safe-browsing/) ([Digital security basics 1](https://cyber-women.com/en/digital-security-basics-1/)) 12. Session: [Malware and viruses](https://cyber-women.com/en/digital-security-basics-1/malware-and-viruses/) ([Digital security basics 1](https://cyber-women.com/en/digital-security-basics-1/)) 13. Exercise: [Building feminist self-care](https://cyber-women.com/en/self-care/building-feminist-self-care/) ([Self-care](https://cyber-women.com/en/self-care/)) 14. Session: [How to secure your computer](https://cyber-women.com/en/digital-security-basics-1/how-to-secure-your-computer/) ([Digital security basics 1](https://cyber-women.com/en/digital-security-basics-1/)) 15. Session: [What does your metadata say about you?](https://cyber-women.com/en/safe-online-advocacy/what-does-your-metadata-say-about-you/) ([Safe online advocacy](https://cyber-women.com/en/safe-online-advocacy/)) 16. Exercise: [Marco Polo](https://cyber-women.com/en/safer-mobiles/marco-polo/) ([Safer Mobiles](https://cyber-women.com/en/safer-mobiles/)) 17. Session: [Mobile phones 1](https://cyber-women.com/en/safer-mobiles/mobile-phones-1/) ([Safer Mobiles](https://cyber-women.com/en/safer-mobiles/)) 18. Session: [Networked publics](https://cyber-women.com/en/privacy/networked-publics/) ([Privacy](https://cyber-women.com/en/privacy/privacy/)) 19. Session: [Privacy](https://cyber-women.com/en/privacy/privacy/) ([Privacy](https://cyber-women.com/en/privacy/privacy/)) 20. Session: [Let's start a documentation journal!](https://cyber-women.com/en/online-violence-against-women/lets-start-a-documentation-journal/) ([Online violence against women](https://cyber-women.com/en/online-violence-against-women/)) ### 3-Day Intermediate-Level Training **Approximate Time Required: 15 hours** This training agenda is designed for a 3-day long workshop with WHRDs who have already had a more introductory level training (see 3-Day Intermediate-Level Training example above) and is intended to be offered as a follow-up. It is considerably more technical in nature than the introductory-level agenda, focusing on practical applications of digital security concepts as well as critical thinking skills for informed decision making on tool use. It also goes more into depth on topics such as women and technology, privacy, encryption and anonymity. If working with participants from the same organization, this training will also provide them with strategic approaches to begin sharing their knowledge with others at their organization, including designing organization security plans and protocols. 1. Exercise: [Tricky candy](https://cyber-women.com/en/trust-building-exercises/tricky-candy/) ([Trust-building exercises](https://cyber-women.com/en/trust-building-exercises/)) 2. Exercise: [I decide](https://cyber-women.com/en/determining-the-best-solution/i-decide/) ([Determining the best solution](https://cyber-women.com/en/determining-the-best-solution/)) 3. Session: [Her-story of technology](https://cyber-women.com/en/rethinking-our-relationship-with-technology/herstory-of-technology/) ([Rethinking our relationship with technology](https://cyber-women.com/en/rethinking-our-relationship-with-technology/)) 4. Exercise: [Ask me anything!](https://cyber-women.com/en/privacy/ask-me-anything/) ([Privacy](https://cyber-women.com/en/privacy/privacy/)) 5. Session: [Apps and online platforms: friend or foe?](https://cyber-women.com/en/privacy/apps-and-online-platforms-friend-or-foe/) ([Privacy](https://cyber-women.com/en/privacy/privacy/)) 6. Session: [Safe online campaigning](https://cyber-women.com/en/safe-online-advocacy/safe-online-campaigns/) ([Safe online advocacy](https://cyber-women.com/en/safe-online-advocacy/)) 7. Session: [Mobile phones 2](https://cyber-women.com/en/safer-mobiles/mobile-phones-2/) ([Digital security basics 1](https://cyber-women.com/en/digital-security-basics-1/)) 8. Session: [Introduction to encryption](https://cyber-women.com/en/encryption/introduction-to-encryption/) ([Encryption](https://cyber-women.com/en/encryption/)) 9. Session: [Encrypted communication](https://cyber-women.com/en/encryption/encrypted-communication/) ([Encryption](https://cyber-women.com/en/encryption/)) 10. Exercise: [The cauldron](https://cyber-women.com/en/closing-and-review-exercises/the-cauldron/) ([Closing and review exercises](https://cyber-women.com/en/closing-and-review-exercises/)) 11. Session: [Storage and encryption](https://cyber-women.com/en/digital-security-basics-2/storage-and-encryption/) ([Digital security basics 2](https://cyber-women.com/en/digital-security-basics-2/)) 12. Exercise: [Secret friend](https://cyber-women.com/en/anonymity/secret-friend/) ([Anonymity](https://cyber-women.com/en/anonymity/anonymity/)) 13. Session: [Anonymity](https://cyber-women.com/en/anonymity/anonymity/) ([Anonymity](https://cyber-women.com/en/anonymity/anonymity/)) 14. Session: [Digital security decisions](https://cyber-women.com/en/determining-the-best-solution/digital-security-decisions/) ([Determining the best solution](https://cyber-women.com/en/determining-the-best-solution/)) 15. Session: [Organizational security plans and protocols](https://cyber-women.com/en/planning-ahead/organizational-security-plans-and-protocols/) ([Planning ahead](https://cyber-women.com/en/planning-ahead/)) 16. Exercise: [Love Letter to Myself](https://cyber-women.com/en/self-care/love-letter-to-myself/) ([Self-care](https://cyber-women.com/en/self-care/)) ### 3-Day Advanced-Level Training **Approximate Time Required: 12 hours** This training agenda is designed for a 3-day long workshop with WHRDs who have already progressed through introductory and intermediate-level trainings (see prior examples) and are ready for more advanced-level experience. This workshop -- more tactical in nature than the previous trainings - focuses less on leveraging conceptual knowledge into development of practices for specific tools, and more on real world scenario-based applications of critical thinking and decision making skills (which also allows you, as the trainer, to more comprehensively assess the overall progress of the group). 1. Exercise: [Charades](https://cyber-women.com/en/closing-and-review-exercises/charades/) ([Closing and review exercises](https://cyber-women.com/en/closing-and-review-exercises/)) 2. Session: [Safer websites](https://cyber-women.com/en/safe-online-advocacy/safer-websites/) ([Safe online advocacy](https://cyber-women.com/en/safe-online-advocacy/)) 3. Exercise: [More online identities!](https://cyber-women.com/en/anonymity/more-online-identities/) ([Anonymity](https://cyber-women.com/en/anonymity/anonymity/)) 4. Session: [Let's reset!](https://cyber-women.com/en/digital-security-basics-2/lets-reset/) ([Digital security basics 2](https://cyber-women.com/en/digital-security-basics-2/) 5. Exercise: [Doxxing the troll](https://cyber-women.com/en/online-violence-against-women/doxxing-the-troll/) ([Online violence against women](https://cyber-women.com/en/online-violence-against-women/)) 6. Session: [Digital security plans and protocols: post-training replication](https://cyber-women.com/en/planning-ahead/digital-security-plans-and-protocols-post-training-replication/) ([Planning ahead](https://cyber-women.com/en/planning-ahead/)) 7. Exercise: [The loving touch](https://cyber-women.com/en/self-care/the-loving-touch/) ([Self-care](https://cyber-women.com/en/self-care/)) 8. Exercise: [DigiSec rally](https://cyber-women.com/en/closing-and-review-exercises/digisec-rally/) ([Closing and review exercises](https://cyber-women.com/en/closing-and-review-exercises/)) Resources ========= [Coding rights](https://codingrights.org) ----------------------------------------- Brazilian-born women lead Think-and-Do tank that aims to advance in the enforcement of Human Rights in the digital world by integrating usages and understandings of technology into policy making processes. [Cuida tu info](https://cuidatuinfo.org) ---------------------------------------- Security of information and communication. [Derechos Digitales](https://derechosdigitales.org) --------------------------------------------------- Latin American independent organization and non-profit founded in 2005 and whose main objective is the development, defense and promotion of human rights in the digital environment in the region. [Feminist Internet](https://feministinternet.org) ------------------------------------------------- Works towards empowering more women and queer persons -- in all our diversities -- to fully enjoy our rights, engage in pleasure and play, and dismantle patriarchy. [Gender Sec wiki \| Tactical Tech](https://gendersec.tacticaltech.org) ---------------------------------------------------------------------- This manual is a community-built resource for our growing community of women and trans\* activists, human rights defenders and technologists. [Karisma Foundation](https://karisma.org.co) -------------------------------------------- A civil society organization dedicated to supporting and spreading the good use of technologies in digital environments. [Me and My Shadow](https://myshadow.org) ---------------------------------------- Tactical Tech's Me and My Shadow project helps you control your data traces, see how you're being tracked, and learn more about the data industry. [PRISM Break](https://prism-break.org) -------------------------------------- Opt out of global data surveillance programs like PRISM, XKeyscore and Tempora. [Red en defensa de los derechos digitales](https://r3d.mx) ---------------------------------------------------------- Mexican organization dedicated to the defense of human rights in the digital environment. [Security in a box](https://securityinabox.org) ----------------------------------------------- If you're new to digital security, the Tactics Guides cover the basic principles, including advice on how to use social networking platforms and mobile phones more safely. [Surveillance self-defense](https://ssd.eff.org) ------------------------------------------------ Tips, tools and how-tos for safer online communications. [Take back the tech](https://takebackthetech.net) ------------------------------------------------- Take Back The Tech! is a call to everyone, especially women and girls, to take control of technology to end violence against women. [Tem boi na linha \| is There an Ox in Your Line?](https://temboinalinha.org) ----------------------------------------------------------------------------- Practical guide to combat online surveillance. [Protection of Human Rights Defenders](http://consorciooaxaca.org.mx/proteccion-a-defensoras-de-derechos-humanos) ----------------------------------------------------------------------------------------------------------------- Protection, security and self-care for human rights defenders. [Donestech](http://donestech.net) --------------------------------- An investigation that arises from the desire to elucidate certain questions to transform research into a reservoir of useful knowledge for people concerned about gender inequalities and, also, for people oriented to social and political transformation. [No fear](http://sinmiedo.com.co) --------------------------------- To the streets without fear, tools against repression. [La violencia en línea es violencia (video)](https://vimeo.com/207361788) ------------------------------------------------------------------------- Online violence is violence [Quick tips for spaces](https://cyber-women.com/en/downloads/quick-tips-gender-sensitive-learning-spaces-digital-security.pdf) ------------------------------------------------------------------------------------------------------------------------------ Quick tips for facilitating gender-sensitive learning spaces on digital security. A guide created by IWPR and Social Tic, with content by Indira Cornelio, Dhaniella Falk and Alma Ugarte. [Level Up](https://level-up.cc/) -------------------------------- Resources for the global digital safety training community.