<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://gendersec.tacticaltech.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Akoth</id>
		<title>Gender and Tech Resources - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://gendersec.tacticaltech.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Akoth"/>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php/Special:Contributions/Akoth"/>
		<updated>2026-04-05T14:48:15Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.26.2</generator>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_and_privacy_session_-_Geek_Girl_festival,_Kenya&amp;diff=4493</id>
		<title>Digital security and privacy session - Geek Girl festival, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_and_privacy_session_-_Geek_Girl_festival,_Kenya&amp;diff=4493"/>
				<updated>2015-08-01T15:20:13Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Annual Geek Girl festival: session on digital security and privacy&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2015/04/25&lt;br /&gt;
|End when ?=2015/04/25&lt;br /&gt;
|Number of hours if only one day ?=8&lt;br /&gt;
|Where is located the activity ?=Kenya&lt;br /&gt;
|Who organize it=Akirachix&lt;br /&gt;
|organisation(s) website=http://akirachix.com/&lt;br /&gt;
|For whom is it organized=The session is for vocal women bloggers who create discussions on gender issues. &lt;br /&gt;
&lt;br /&gt;
The event is geared towards providing opportunites for high school girls and University students to engage with women already working in the industry, for guidance on career choices and opportunities.&lt;br /&gt;
|How many people trained=30&lt;br /&gt;
|Motivations for organizing training=Session: Awareness creation session on digital security and privacy.&lt;br /&gt;
Event: speed geeking, Design Thinking and much more&lt;br /&gt;
|Topics addressed=Feminism, Bloggers, Digital security, Privacy awareness, Speed Geeking, Design Thinking, Kenya&lt;br /&gt;
|Links about the activity=http://akirachix.com/fortune-favours-the-akirachix-woman/&lt;br /&gt;
|Upload content=Geekgirl.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Focus on feedback objectives, especially on the online and offline safe spaces. So that feedback compilation does not only come from the trainer's point of view but also from participants.&lt;br /&gt;
|Methodologies for training=Experience sharing, more collaborative and participatory&lt;br /&gt;
|Gender and tech tutorials used=myshadow.org,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Inspiring, many young girl and women interested in technology and using it to advance women issues&lt;br /&gt;
|Feedbacks=Many participants were happy to have attended the conference and a lot of enlightened discussions around cyber-bullying was talked about.&lt;br /&gt;
|START=Giving more young women a discourse platform to freely share their knowledge around tech, aspirations and areas of improvement&lt;br /&gt;
|STOP=Overthinking&lt;br /&gt;
|KEEP=Local networks, they help a lot in partnerships and collaborations&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:Geekgirl.jpg&amp;diff=4492</id>
		<title>File:Geekgirl.jpg</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:Geekgirl.jpg&amp;diff=4492"/>
				<updated>2015-08-01T15:19:35Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: {{PAGENAME}}&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Activities|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_meetup_for_women_human_rights_defenders,_Kenya&amp;diff=4491</id>
		<title>Digital security meetup for women human rights defenders, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_meetup_for_women_human_rights_defenders,_Kenya&amp;diff=4491"/>
				<updated>2015-08-01T15:15:50Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Digital security meetup&lt;br /&gt;
|Category=Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2015/02/20&lt;br /&gt;
|End when ?=2015/02/20&lt;br /&gt;
|Number of hours if only one day ?=4&lt;br /&gt;
|Where is located the activity ?=Nairobi, Kenya&lt;br /&gt;
|Who organize it=Akirachix&lt;br /&gt;
|organisation(s) website=http://akirachix.com/&lt;br /&gt;
|For whom is it organized=for women human rights defenders  who are also journalists and bloggers in their professions and are actively involved in policy advocacy on securing women online spaces in Kenya&lt;br /&gt;
|How many people trained=10&lt;br /&gt;
|Motivations for organizing training=To create a collective of digital security in Kenya with a focus on women.&lt;br /&gt;
|Topics addressed=WHRD, Journalists, bloggers, Kenya, Digital security&lt;br /&gt;
|Links about the activity=https://www.eventbrite.com/e/digital-security-meetup-tickets-15504945710?utm_campaign=new_event_email&amp;amp;utm_medium=email&amp;amp;utm_source=eb_email&amp;amp;utm_term=eventurl_textArticles, videos, photos on-line, ...&lt;br /&gt;
|Upload content=DS1.jpeg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=16:00-16:30- Registration, Ice breaker with the participants and introduction.&lt;br /&gt;
16;30-17:00- Introduction on the importance of digital security awareness.Share local case studies around digiSec in the country.&lt;br /&gt;
17:00-18:00- Group discussions around spectogram exercise to get the participants critical thinking on the relation of gender based violence and tech.&lt;br /&gt;
18:-19:00- Hands on session on tools deployment&lt;br /&gt;
19:00-20:00- Snack time with more hands on.&lt;br /&gt;
|Methodologies for training=Facilitation, group work, collaborative and sharing&lt;br /&gt;
|Existing toolkits and resources=security in a box&lt;br /&gt;
|Gender and tech tutorials used=myshadow.org,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Enlightening,engaging audience with a lot to offer&lt;br /&gt;
|Feedbacks=Need for follow up training.No one offs&lt;br /&gt;
|START=Being more proactive&lt;br /&gt;
|STOP=Procastinating&lt;br /&gt;
|KEEP=Learning&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:DS1.jpeg&amp;diff=4489</id>
		<title>File:DS1.jpeg</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:DS1.jpeg&amp;diff=4489"/>
				<updated>2015-08-01T15:15:20Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: {{PAGENAME}}&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Activities|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:DS.jpeg&amp;diff=4488</id>
		<title>File:DS.jpeg</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:DS.jpeg&amp;diff=4488"/>
				<updated>2015-08-01T15:14:27Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_and_privacy_session_-_Geek_Girl_festival,_Kenya&amp;diff=4487</id>
		<title>Digital security and privacy session - Geek Girl festival, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_and_privacy_session_-_Geek_Girl_festival,_Kenya&amp;diff=4487"/>
				<updated>2015-08-01T14:44:55Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Annual Geek Girl festival: session on digital security and privacy&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2015/04/25&lt;br /&gt;
|End when ?=2015/04/25&lt;br /&gt;
|Number of hours if only one day ?=8&lt;br /&gt;
|Where is located the activity ?=Kenya&lt;br /&gt;
|Who organize it=Akirachix&lt;br /&gt;
|organisation(s) website=http://akirachix.com/&lt;br /&gt;
|For whom is it organized=The session is for vocal women bloggers who create discussions on gender issues. &lt;br /&gt;
&lt;br /&gt;
The event is geared towards providing opportunites for high school girls and University students to engage with women already working in the industry, for guidance on career choices and opportunities.&lt;br /&gt;
|How many people trained=30&lt;br /&gt;
|Motivations for organizing training=Session: Awareness creation session on digital security and privacy.&lt;br /&gt;
Event: speed geeking, Design Thinking and much more&lt;br /&gt;
|Topics addressed=Feminism, Bloggers, Digital security, Privacy awareness, Speed Geeking, Design Thinking, Kenya&lt;br /&gt;
|Links about the activity=Articles, videos, photos on-line, ...&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Focus on feedback objectives, especially on the online and offline safe spaces. So that feedback compilation does not only come from the trainer's point of view but also from participants.&lt;br /&gt;
|Methodologies for training=Experience sharing, more collaborative and participatory&lt;br /&gt;
|Gender and tech tutorials used=myshadow.org,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Inspiring, many young girl and women interested in technology and using it to advance women issues&lt;br /&gt;
|Feedbacks=Many participants were happy to have attended the conference and a lot of enlightened discussions around cyber-bullying was talked about.&lt;br /&gt;
|START=Giving more young women a discourse platform to freely share their knowledge around tech, aspirations and areas of improvement&lt;br /&gt;
|STOP=Overthinking&lt;br /&gt;
|KEEP=Local networks, they help a lot in partnerships and collaborations&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:Sam_0773.jpg&amp;diff=2585</id>
		<title>File:Sam 0773.jpg</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:Sam_0773.jpg&amp;diff=2585"/>
				<updated>2015-06-18T11:17:05Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: Akoth uploaded a new version of File:Sam 0773.jpg&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Activities|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=FemH3ck_%E2%80%93_Digital_Security_and_Privacy_Advocacy_Flash_training_at_the_ihub_Space,_Nairobi,_Kenya&amp;diff=2584</id>
		<title>FemH3ck – Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=FemH3ck_%E2%80%93_Digital_Security_and_Privacy_Advocacy_Flash_training_at_the_ihub_Space,_Nairobi,_Kenya&amp;diff=2584"/>
				<updated>2015-06-18T11:09:17Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Talking Digital, Changing Lives: Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya for Women journalists and activists&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security&lt;br /&gt;
|Start when ?=2015/05/23&lt;br /&gt;
|End when ?=2015/05/23&lt;br /&gt;
|Number of hours if only one day ?=3&lt;br /&gt;
|Where is located the activity ?=Nairobi, Kenya&lt;br /&gt;
|Geo-localization of the activity ?=-1.3076473, 36.7346954&lt;br /&gt;
|Who organize it=Yvonne Oluoch of S.K.I.R.T.S (Socially Keen Individuals Redefining Tech Spaces) Kenya and Mary Kiio of Roshani Consultancy Services&lt;br /&gt;
|For whom is it organized=For women journalists, activists, women in tech, bloggers and security enthusiasts.&lt;br /&gt;
|How many people trained=30&lt;br /&gt;
|Motivations for organizing training=Many women in Kenya today are embracing the internet as a means of communication with their peers and colleagues on a social and professional basis. As they seek to share vital information about themselves so as to increase their networking skills, these women post information and pictures on various sites that are both of a personal and professional nature. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, this same medium of expression (the internet) exposes the information these women share to public scrutiny and may have negative effect, when this information falls in the hands (or eyes) of a person who can misuse this information through manipulation, or lead to harassment among other internet crimes.&lt;br /&gt;
|Topics addressed=-Staying Safe Online ( a peek into Kenya’s women background on cybercrime and/or harassment: IAWRT Kenya) &lt;br /&gt;
-Digital Security tools and tactics&lt;br /&gt;
-Privacy Advocacy&lt;br /&gt;
|Links about the activity=https://skirtskenya.wordpress.com/2015/05/25/recapping-f3mhack-nairobi/&lt;br /&gt;
|Upload content=F3mhack Nairobi.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=- Welcome to the training and Introductions: The facilitators gave a brief background of why the training was taking place. This included the thinking behind f3mhackathon and also sought to explain a little about Sabeen Mahmud and why we were dedicating this special day to her memory. This session also gave the participants an opportunity to get to know each other and the facilitators and to share their expectations of the training.&lt;br /&gt;
Staying Safe Online ( a peek into Kenya’s women background on cybercrime and/or harassment: IAWRT Kenya) –This session sought to give a background on the situation of cyber crime in Kenya against women with a special focus on the qualitative research conducted by the International Association of Women in Radio and Television,  (IAWRT-Kenya):Ending Violence: Women’s Rights and Safety Online. &lt;br /&gt;
From the research the facilitator of this session shared a story of one of the case studies of the research where a certain lady had openly shared her passwords to various online accounts with  her partner and father of her children but he had in turn used her passwords and posed as her when interacting with her friends , relatives and family including abusing them online. This was coupled with physical beatings.  The sharing of this story was aimed at providing the context of why it is important for us to spend some time learning more on how to enhance our digital security online and start privacy advocacy campaign.&lt;br /&gt;
Digital Security (Yvonne explain further on this session)&lt;br /&gt;
Privacy Advocacy –For one to understand why privacy advocacy is crucial, the facilitator took the participants through a personal exercise of mapping one’s shadow on the internet. These shadows were captured through drawing and were posted on a white board by each participant. This exercise led to discussions on the traces we leave online and the possible challenges we are exposing to ourselves everytime we are online.&lt;br /&gt;
The participants were then divided into various groups where they were expected to take up collaborative roles such as : You are a company that would like to sell crucial data on various people or organizations to the government. Using the data shadows on the white board identify which persons/organizations you think the government would be interested in and why they would be interested in them basing it on the data shared on the data shadows.  Or You have just opened a new restaurant in town. Identify which people (from the data shadows) you would like to target and how they would be important to your restaurant. The participants were then expected to make a presentation to the plenary of their findings.&lt;br /&gt;
These presentations led to further discussions on issues such as the use of free online platforms actually means that the individual is the product. That it is very easy for anyone with a specific motive or focus to collect data about you without your knowledge and hence that is why it is important to make use of the various digital security tools to protect your data where possible and to ensure that one does not leave their traces online.&lt;br /&gt;
&lt;br /&gt;
The members of the same group were further given a task to think about what they can do based on their various professions on what they can do towards informing others on how to protect their digital privacy and any initiatives they may think of that would be helpful towards championing for privacy advocacy. The participants also got to share their ideas in plenary. The facilitator further added some key points on other initiatives they can undertake towards achieving privacy advocacy.&lt;br /&gt;
|Methodologies for training=-Power point presentations&lt;br /&gt;
-Group Discussions&lt;br /&gt;
-Personal exercises-mapping one’s digital shadow&lt;br /&gt;
|Existing toolkits and resources=The toolkits and resources involved: Powerpoint presentations on privacy advocacy and &lt;br /&gt;
digital security: &lt;br /&gt;
Myshadow.org website&lt;br /&gt;
|Gender and tech tutorials used=Security in the box,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Loved sharing my knowledge on digital security but above all, loved the attendees enthusiasm on the subject matter.All the invited guests showed up even the ihub space manager created time to be involved and participate in the training.-Yvonne&lt;br /&gt;
“When the training came to an end, the participants were not willing to leave the training session. Their silence was pregnant with the desire to learn more. This filled me with lots of joy to know that we had been tackling a topic that people are hungry for information. It was a reflection that probably it was interesting and relevant to their day to day work.” Mary Kiio&lt;br /&gt;
|Feedbacks=Being city dwellers and internet savvy, the audience related well to the subject matter and how it affects their work both personally and professionally. The attendees fully participated and were engaging. It was a 50/50 involvement on the hands on given that a good number did not come with their laptops.-Yvonne&lt;br /&gt;
“While I was taking my tea, one of the participants came up to me and said, “this workshop has been great. It is so relevant to the issues that we women are facing especially in our personal lives. There are so many cybercrimes being committed to us by the one’s we love. I hope you can find time to come to our association and train many more women on how to stay safe online. It is a critical topic that we need further information on.” Mary Kiio&lt;br /&gt;
|START=I'll start looking for more avenues and resources to keep the conversation going. Consistency is key and focus more on women in civil society.-Yvonne&lt;br /&gt;
&lt;br /&gt;
Applying some of the privacy advocacy tips such as tracking through what legislation is being discussed in parliament that would enhance digital security and start sharing tips on my blog about how to stay safe online by using various digital security tools that are contained in the security in a box in a creative way. Mary Kiio&lt;br /&gt;
|STOP=I will stop downplaying my passion in tech training especially in digital security since more people lack the knowledge. _Yvonne&lt;br /&gt;
Procrastinating in looking for new avenues such as schools-primary, high school and universities to share on how they can stay safe online and if possible start advocacy groups that will hopefully enlighten them even when the young people get into the job market. Mary Kiio&lt;br /&gt;
|KEEP=Keep collaborating with other facilitators and institutions so as to encourage the adoption of digital security in various curriculum. Yvonne &lt;br /&gt;
Training and conducting roundtable discussions in various parts of the country on how women can stay safe online and the initiatives that they can set up towards achieving this by government officials, civil society organizations and media. Mary Kiio&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:F3mhack_Nairobi.jpg&amp;diff=2583</id>
		<title>File:F3mhack Nairobi.jpg</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:F3mhack_Nairobi.jpg&amp;diff=2583"/>
				<updated>2015-06-18T11:09:01Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: {{PAGENAME}}&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Activities|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=FemH3ck_%E2%80%93_Digital_Security_and_Privacy_Advocacy_Flash_training_at_the_ihub_Space,_Nairobi,_Kenya&amp;diff=2582</id>
		<title>FemH3ck – Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=FemH3ck_%E2%80%93_Digital_Security_and_Privacy_Advocacy_Flash_training_at_the_ihub_Space,_Nairobi,_Kenya&amp;diff=2582"/>
				<updated>2015-06-18T11:05:58Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Talking Digital, Changing Lives: Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya for Women journalists and activists&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security&lt;br /&gt;
|Start when ?=2015/05/23&lt;br /&gt;
|End when ?=2015/05/23&lt;br /&gt;
|Number of hours if only one day ?=3&lt;br /&gt;
|Where is located the activity ?=Nairobi, Kenya&lt;br /&gt;
|Geo-localization of the activity ?=-1.3076473, 36.7346954&lt;br /&gt;
|Who organize it=Yvonne Oluoch of S.K.I.R.T.S (Socially Keen Individuals Redefining Tech Spaces) Kenya and Mary Kiio of Roshani Consultancy Services&lt;br /&gt;
|For whom is it organized=For women journalists, activists, women in tech, bloggers and security enthusiasts.&lt;br /&gt;
|How many people trained=30&lt;br /&gt;
|Motivations for organizing training=Many women in Kenya today are embracing the internet as a means of communication with their peers and colleagues on a social and professional basis. As they seek to share vital information about themselves so as to increase their networking skills, these women post information and pictures on various sites that are both of a personal and professional nature. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, this same medium of expression (the internet) exposes the information these women share to public scrutiny and may have negative effect, when this information falls in the hands (or eyes) of a person who can misuse this information through manipulation, or lead to harassment among other internet crimes.&lt;br /&gt;
|Topics addressed=-Staying Safe Online ( a peek into Kenya’s women background on cybercrime and/or harassment: IAWRT Kenya) &lt;br /&gt;
-Digital Security tools and tactics&lt;br /&gt;
-Privacy Advocacy&lt;br /&gt;
|Links about the activity=https://skirtskenya.wordpress.com/2015/05/25/recapping-f3mhack-nairobi/&lt;br /&gt;
|Upload content=Femh3ck Nairobi.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=- Welcome to the training and Introductions: The facilitators gave a brief background of why the training was taking place. This included the thinking behind f3mhackathon and also sought to explain a little about Sabeen Mahmud and why we were dedicating this special day to her memory. This session also gave the participants an opportunity to get to know each other and the facilitators and to share their expectations of the training.&lt;br /&gt;
Staying Safe Online ( a peek into Kenya’s women background on cybercrime and/or harassment: IAWRT Kenya) –This session sought to give a background on the situation of cyber crime in Kenya against women with a special focus on the qualitative research conducted by the International Association of Women in Radio and Television,  (IAWRT-Kenya):Ending Violence: Women’s Rights and Safety Online. &lt;br /&gt;
From the research the facilitator of this session shared a story of one of the case studies of the research where a certain lady had openly shared her passwords to various online accounts with  her partner and father of her children but he had in turn used her passwords and posed as her when interacting with her friends , relatives and family including abusing them online. This was coupled with physical beatings.  The sharing of this story was aimed at providing the context of why it is important for us to spend some time learning more on how to enhance our digital security online and start privacy advocacy campaign.&lt;br /&gt;
Digital Security (Yvonne explain further on this session)&lt;br /&gt;
Privacy Advocacy –For one to understand why privacy advocacy is crucial, the facilitator took the participants through a personal exercise of mapping one’s shadow on the internet. These shadows were captured through drawing and were posted on a white board by each participant. This exercise led to discussions on the traces we leave online and the possible challenges we are exposing to ourselves everytime we are online.&lt;br /&gt;
The participants were then divided into various groups where they were expected to take up collaborative roles such as : You are a company that would like to sell crucial data on various people or organizations to the government. Using the data shadows on the white board identify which persons/organizations you think the government would be interested in and why they would be interested in them basing it on the data shared on the data shadows.  Or You have just opened a new restaurant in town. Identify which people (from the data shadows) you would like to target and how they would be important to your restaurant. The participants were then expected to make a presentation to the plenary of their findings.&lt;br /&gt;
These presentations led to further discussions on issues such as the use of free online platforms actually means that the individual is the product. That it is very easy for anyone with a specific motive or focus to collect data about you without your knowledge and hence that is why it is important to make use of the various digital security tools to protect your data where possible and to ensure that one does not leave their traces online.&lt;br /&gt;
&lt;br /&gt;
The members of the same group were further given a task to think about what they can do based on their various professions on what they can do towards informing others on how to protect their digital privacy and any initiatives they may think of that would be helpful towards championing for privacy advocacy. The participants also got to share their ideas in plenary. The facilitator further added some key points on other initiatives they can undertake towards achieving privacy advocacy.&lt;br /&gt;
|Methodologies for training=-Power point presentations&lt;br /&gt;
-Group Discussions&lt;br /&gt;
-Personal exercises-mapping one’s digital shadow&lt;br /&gt;
|Existing toolkits and resources=The toolkits and resources involved: Powerpoint presentations on privacy advocacy and &lt;br /&gt;
digital security: &lt;br /&gt;
Myshadow.org website&lt;br /&gt;
|Gender and tech tutorials used=Security in the box,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Loved sharing my knowledge on digital security but above all, loved the attendees enthusiasm on the subject matter.All the invited guests showed up even the ihub space manager created time to be involved and participate in the training.-Yvonne&lt;br /&gt;
“When the training came to an end, the participants were not willing to leave the training session. Their silence was pregnant with the desire to learn more. This filled me with lots of joy to know that we had been tackling a topic that people are hungry for information. It was a reflection that probably it was interesting and relevant to their day to day work.” Mary Kiio&lt;br /&gt;
|Feedbacks=Being city dwellers and internet savvy, the audience related well to the subject matter and how it affects their work both personally and professionally. The attendees fully participated and were engaging. It was a 50/50 involvement on the hands on given that a good number did not come with their laptops.-Yvonne&lt;br /&gt;
“While I was taking my tea, one of the participants came up to me and said, “this workshop has been great. It is so relevant to the issues that we women are facing especially in our personal lives. There are so many cybercrimes being committed to us by the one’s we love. I hope you can find time to come to our association and train many more women on how to stay safe online. It is a critical topic that we need further information on.” Mary Kiio&lt;br /&gt;
|START=I'll start looking for more avenues and resources to keep the conversation going. Consistency is key and focus more on women in civil society.-Yvonne&lt;br /&gt;
&lt;br /&gt;
Applying some of the privacy advocacy tips such as tracking through what legislation is being discussed in parliament that would enhance digital security and start sharing tips on my blog about how to stay safe online by using various digital security tools that are contained in the security in a box in a creative way. Mary Kiio&lt;br /&gt;
|STOP=I will stop downplaying my passion in tech training especially in digital security since more people lack the knowledge. _Yvonne&lt;br /&gt;
Procrastinating in looking for new avenues such as schools-primary, high school and universities to share on how they can stay safe online and if possible start advocacy groups that will hopefully enlighten them even when the young people get into the job market. Mary Kiio&lt;br /&gt;
|KEEP=Keep collaborating with other facilitators and institutions so as to encourage the adoption of digital security in various curriculum. Yvonne &lt;br /&gt;
Training and conducting roundtable discussions in various parts of the country on how women can stay safe online and the initiatives that they can set up towards achieving this by government officials, civil society organizations and media. Mary Kiio&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:Femh3ck_Nairobi.jpg&amp;diff=2581</id>
		<title>File:Femh3ck Nairobi.jpg</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:Femh3ck_Nairobi.jpg&amp;diff=2581"/>
				<updated>2015-06-18T11:05:37Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: {{PAGENAME}}&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Activities|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=FemH3ck_%E2%80%93_Talking_Digital_Saving_Lives_at_Egerton_University,_Njoro,_Kenya&amp;diff=2580</id>
		<title>FemH3ck – Talking Digital Saving Lives at Egerton University, Njoro, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=FemH3ck_%E2%80%93_Talking_Digital_Saving_Lives_at_Egerton_University,_Njoro,_Kenya&amp;diff=2580"/>
				<updated>2015-06-18T10:59:59Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Talking Digital Saving lives, workshop training and roundtable discussion&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security&lt;br /&gt;
|Start when ?=2015/05/25&lt;br /&gt;
|End when ?=2015/05/26&lt;br /&gt;
|Where is located the activity ?=Egerton University, Njoro, Kenya&lt;br /&gt;
|Geo-localization of the activity ?=-0.79648313511391, 38.3203125&lt;br /&gt;
|Who organize it=Yvonne Oluoch of S.K.I.R.T.S (Socially Keen Individuals Redefining Tech Spaces) Kenya and Mary Kiio of Roshani Consultancy Services&lt;br /&gt;
|For whom is it organized=Students undertaking courses in gender and development studies, lecturers, Head of departments and professors.&lt;br /&gt;
|How many people trained=40&lt;br /&gt;
|Motivations for organizing training=Issues of tech related violence is rampant among students of higher learning institutions. Unfortunately, there are no policies within the institutions that can deal with tech related violence.&lt;br /&gt;
&lt;br /&gt;
Egerton University  has a gender department that can strategically guide the conversations on tech related violence and possibly provide the required fora that would hopefully lead to the development of policies within the university that will curb tech related violence that occurs in the university.&lt;br /&gt;
&lt;br /&gt;
The training was also conducted at the University due to the request of the Head of the Gender department , who had attended a round table on safety online for key stakeholders in Nakuru and had seen the value of having a training intervention with the students who were most affected by tech related violence.&lt;br /&gt;
|Topics addressed=•Staying safe online&lt;br /&gt;
&lt;br /&gt;
•Digital Security tools and tactics&lt;br /&gt;
 •Privacy Advocacy&lt;br /&gt;
-Round table discussions on policy implementation and creating awareness and capacity building within the university to involve other departments.&lt;br /&gt;
|Links about the activity=https://skirtskenya.wordpress.com/2015/05/28/f3mhack-continues-to-egerton-university/&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Agenda of the event:&lt;br /&gt;
Day one:&lt;br /&gt;
Enhancing capacity of women in digital security and privacy advocacy&lt;br /&gt;
– Welcome presentation by Mary Kiio and Yvonne Oluoch&lt;br /&gt;
Honor of Sabeen Mahmud, a moment of silence for her death&lt;br /&gt;
-Staying safe online presentation by Mary Kiio&lt;br /&gt;
Discussion of various scenarios from the audience&lt;br /&gt;
Digital Security Tools and tactics presentation by Yvonne Oluoch&lt;br /&gt;
Privacy Advocacy presentation by Mary Kiio&lt;br /&gt;
Group work and discussion&lt;br /&gt;
Lunch break&lt;br /&gt;
Afternoon session &lt;br /&gt;
Group work and group presentations&lt;br /&gt;
Tea break&lt;br /&gt;
NB:The above sessions were in line with the training that was conducted in Nairobi, however as their was more time , there were more in depth discussions on the issues identified during the training. The training on digital security tools was also elaborate as the facilitator went online and took the participants through various ways of utilizing the various digital security tools.&lt;br /&gt;
&lt;br /&gt;
One spectrogram exercises was utilized during the training session that provided a healthy debate among the participants towards their understanding on tech related violence. &lt;br /&gt;
Day two&lt;br /&gt;
Round table discussions on policy advocacy and implementation&lt;br /&gt;
The discussions were aimed at guiding the participants to think of channels they can use towards developing policy within the university. The participants spent time thinking through the various channels a new policy has to go through before it is adapted i.e the bottoms up approach where the students would first bring up the issue on the need for tech related violence and go through the various university processes until it is adapted as an official policy.&lt;br /&gt;
&lt;br /&gt;
The participants also discussed on the various initiatives they would undertake from an individual level as well as utilizing various university groups towards sharing the importance of enhancing their safety online.&lt;br /&gt;
|Methodologies for training=Power Point presentations&lt;br /&gt;
Group Discussions&lt;br /&gt;
Spectogram exercise&lt;br /&gt;
Personal exercise.&lt;br /&gt;
|Existing toolkits and resources=The toolkits and resources involved: Powerpoint presentations on privacy advocacy and digital security. &lt;br /&gt;
Myshadow.org website for tools&lt;br /&gt;
|Gender and tech tutorials used=Security in the box, Donated three security in a box books to the gender head of department so as to help the students carry on with the conversation and research.,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Loved facilitating at the University and the students together with the lecturers were very vibrant to learn about digital security and how gender based violence easily becomes tech based violence with advancement of technology-Yvonne&lt;br /&gt;
“Open sharing of the student and lecturer participants on tech related violence they had experienced at the university made me sad to realize how widespread tech related violence is in our country, however, I was encouraged and energized by their eagerness to learn how to further enhance their security online.” Mary Kiio&lt;br /&gt;
|Feedbacks=Most students and lecturers were not aware of digital security and were in awe during the hands on sessions. Being the gender department, digital security is treated as a separate entity-Yvonne&lt;br /&gt;
“This session has been so practical in sharing crucial information on digital security. I have been talking to them (students) on the need for digital security but had not gone through it using such depth and identifying tools online they can use,” a lecturer said. &lt;br /&gt;
There is room for the trainings we conducted to be adapted in sessions such as the gender department as the lecturer above outlines, if we scale up our intervention with the university and hopefully others that have opportunities to adapt the trainings. Mary Kiio&lt;br /&gt;
|START=Organizing digital security trainings in institutions located  in the rural areas.-Yvonne&lt;br /&gt;
Engage more with higher learning institutions towards sharing information with them on how to stay safe online and privacy advocacy with the hope that they will adapt them into their existing curricula and university policies that tackle cybercrimes affecting their students. Mary Kiio&lt;br /&gt;
|STOP=Focusing more on city based institutions  _Yvonne&lt;br /&gt;
Thinking of sometime tomorrow is when I need to scale up my trainings on digital security and privacy advocacy with regards to universities, rather than now , no matter what challenges I think I may face. Mary Kiio&lt;br /&gt;
|KEEP=Sharing more digital security training resources especially security in a box toolkit and myshadow.org . Yvonne &lt;br /&gt;
&lt;br /&gt;
Maintain the networks I have developed with various heads of departments of various universities around the country with an aim of reaching out to their student bodies and other lecturers through training and conducting roundtable discussions. Mary&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=FemH3ck_%E2%80%93_Talking_Digital_Saving_Lives_at_Egerton_University,_Njoro,_Kenya&amp;diff=2579</id>
		<title>FemH3ck – Talking Digital Saving Lives at Egerton University, Njoro, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=FemH3ck_%E2%80%93_Talking_Digital_Saving_Lives_at_Egerton_University,_Njoro,_Kenya&amp;diff=2579"/>
				<updated>2015-06-18T10:57:40Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Talking Digital Saving lives, workshop training and roundtable discussion&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security&lt;br /&gt;
|Start when ?=2015/05/25&lt;br /&gt;
|End when ?=2015/05/26&lt;br /&gt;
|Where is located the activity ?=Egerton University, Njoro, Kenya&lt;br /&gt;
|Geo-localization of the activity ?=-0.79648313511391, 38.3203125&lt;br /&gt;
|Who organize it=Yvonne Oluoch of S.K.I.R.T.S (Socially Keen Individuals Redefining Tech Spaces) Kenya and Mary Kiio of Roshani Consultancy Services&lt;br /&gt;
|For whom is it organized=Students undertaking courses in gender and development studies, lecturers, Head of departments and professors.&lt;br /&gt;
|How many people trained=40&lt;br /&gt;
|Motivations for organizing training=Issues of tech related violence is rampant among students of higher learning institutions. Unfortunately, there are no policies within the institutions that can deal with tech related violence.&lt;br /&gt;
&lt;br /&gt;
Egerton University  has a gender department that can strategically guide the conversations on tech related violence and possibly provide the required fora that would hopefully lead to the development of policies within the university that will curb tech related violence that occurs in the university.&lt;br /&gt;
&lt;br /&gt;
The training was also conducted at the University due to the request of the Head of the Gender department , who had attended a round table on safety online for key stakeholders in Nakuru and had seen the value of having a training intervention with the students who were most affected by tech related violence.&lt;br /&gt;
|Topics addressed=•Staying safe online&lt;br /&gt;
&lt;br /&gt;
•Digital Security tools and tactics&lt;br /&gt;
 •Privacy Advocacy&lt;br /&gt;
-Round table discussions on policy implementation and creating awareness and capacity building within the university to involve other departments.&lt;br /&gt;
|Links about the activity=https://skirtskenya.wordpress.com/2015/05/28/f3mhack-continues-to-egerton-university/&lt;br /&gt;
|Upload content=Sam 0790.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Agenda of the event:&lt;br /&gt;
Day one:&lt;br /&gt;
Enhancing capacity of women in digital security and privacy advocacy&lt;br /&gt;
– Welcome presentation by Mary Kiio and Yvonne Oluoch&lt;br /&gt;
Honor of Sabeen Mahmud, a moment of silence for her death&lt;br /&gt;
-Staying safe online presentation by Mary Kiio&lt;br /&gt;
Discussion of various scenarios from the audience&lt;br /&gt;
Digital Security Tools and tactics presentation by Yvonne Oluoch&lt;br /&gt;
Privacy Advocacy presentation by Mary Kiio&lt;br /&gt;
Group work and discussion&lt;br /&gt;
Lunch break&lt;br /&gt;
Afternoon session &lt;br /&gt;
Group work and group presentations&lt;br /&gt;
Tea break&lt;br /&gt;
NB:The above sessions were in line with the training that was conducted in Nairobi, however as their was more time , there were more in depth discussions on the issues identified during the training. The training on digital security tools was also elaborate as the facilitator went online and took the participants through various ways of utilizing the various digital security tools.&lt;br /&gt;
&lt;br /&gt;
One spectrogram exercises was utilized during the training session that provided a healthy debate among the participants towards their understanding on tech related violence. &lt;br /&gt;
Day two&lt;br /&gt;
Round table discussions on policy advocacy and implementation&lt;br /&gt;
The discussions were aimed at guiding the participants to think of channels they can use towards developing policy within the university. The participants spent time thinking through the various channels a new policy has to go through before it is adapted i.e the bottoms up approach where the students would first bring up the issue on the need for tech related violence and go through the various university processes until it is adapted as an official policy.&lt;br /&gt;
&lt;br /&gt;
The participants also discussed on the various initiatives they would undertake from an individual level as well as utilizing various university groups towards sharing the importance of enhancing their safety online.&lt;br /&gt;
|Methodologies for training=Power Point presentations&lt;br /&gt;
Group Discussions&lt;br /&gt;
Spectogram exercise&lt;br /&gt;
Personal exercise.&lt;br /&gt;
|Existing toolkits and resources=The toolkits and resources involved: Powerpoint presentations on privacy advocacy and digital security. &lt;br /&gt;
Myshadow.org website for tools&lt;br /&gt;
|Gender and tech tutorials used=Security in the box, Donated three security in a box books to the gender head of department so as to help the students carry on with the conversation and research.,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Loved facilitating at the University and the students together with the lecturers were very vibrant to learn about digital security and how gender based violence easily becomes tech based violence with advancement of technology-Yvonne&lt;br /&gt;
“Open sharing of the student and lecturer participants on tech related violence they had experienced at the university made me sad to realize how widespread tech related violence is in our country, however, I was encouraged and energized by their eagerness to learn how to further enhance their security online.” Mary Kiio&lt;br /&gt;
|Feedbacks=Most students and lecturers were not aware of digital security and were in awe during the hands on sessions. Being the gender department, digital security is treated as a separate entity-Yvonne&lt;br /&gt;
“This session has been so practical in sharing crucial information on digital security. I have been talking to them (students) on the need for digital security but had not gone through it using such depth and identifying tools online they can use,” a lecturer said. &lt;br /&gt;
There is room for the trainings we conducted to be adapted in sessions such as the gender department as the lecturer above outlines, if we scale up our intervention with the university and hopefully others that have opportunities to adapt the trainings. Mary Kiio&lt;br /&gt;
|START=Organizing digital security trainings in institutions located  in the rural areas.-Yvonne&lt;br /&gt;
Engage more with higher learning institutions towards sharing information with them on how to stay safe online and privacy advocacy with the hope that they will adapt them into their existing curricula and university policies that tackle cybercrimes affecting their students. Mary Kiio&lt;br /&gt;
|STOP=Focusing more on city based institutions  _Yvonne&lt;br /&gt;
Thinking of sometime tomorrow is when I need to scale up my trainings on digital security and privacy advocacy with regards to universities, rather than now , no matter what challenges I think I may face. Mary Kiio&lt;br /&gt;
|KEEP=Sharing more digital security training resources especially security in a box toolkit and myshadow.org . Yvonne &lt;br /&gt;
&lt;br /&gt;
Maintain the networks I have developed with various heads of departments of various universities around the country with an aim of reaching out to their student bodies and other lecturers through training and conducting roundtable discussions. Mary&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:Sam_0790.jpg&amp;diff=2578</id>
		<title>File:Sam 0790.jpg</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:Sam_0790.jpg&amp;diff=2578"/>
				<updated>2015-06-18T10:57:06Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: {{PAGENAME}}&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Activities|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=FemH3ck_%E2%80%93_Talking_Digital_Saving_Lives_at_Egerton_University,_Njoro,_Kenya&amp;diff=2577</id>
		<title>FemH3ck – Talking Digital Saving Lives at Egerton University, Njoro, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=FemH3ck_%E2%80%93_Talking_Digital_Saving_Lives_at_Egerton_University,_Njoro,_Kenya&amp;diff=2577"/>
				<updated>2015-06-18T10:54:36Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Talking Digital Saving lives, workshop training and roundtable discussion&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security&lt;br /&gt;
|Start when ?=2015/05/25&lt;br /&gt;
|End when ?=2015/05/26&lt;br /&gt;
|Where is located the activity ?=Egerton University, Njoro, Kenya&lt;br /&gt;
|Geo-localization of the activity ?=-0.79648313511391, 38.3203125&lt;br /&gt;
|Who organize it=Yvonne Oluoch of S.K.I.R.T.S (Socially Keen Individuals Redefining Tech Spaces) Kenya and Mary Kiio of Roshani Consultancy Services&lt;br /&gt;
|For whom is it organized=Students undertaking courses in gender and development studies, lecturers, Head of departments and professors.&lt;br /&gt;
|How many people trained=40&lt;br /&gt;
|Motivations for organizing training=Issues of tech related violence is rampant among students of higher learning institutions. Unfortunately, there are no policies within the institutions that can deal with tech related violence.&lt;br /&gt;
&lt;br /&gt;
Egerton University  has a gender department that can strategically guide the conversations on tech related violence and possibly provide the required fora that would hopefully lead to the development of policies within the university that will curb tech related violence that occurs in the university.&lt;br /&gt;
&lt;br /&gt;
The training was also conducted at the University due to the request of the Head of the Gender department , who had attended a round table on safety online for key stakeholders in Nakuru and had seen the value of having a training intervention with the students who were most affected by tech related violence.&lt;br /&gt;
|Topics addressed=•Staying safe online&lt;br /&gt;
&lt;br /&gt;
•Digital Security tools and tactics&lt;br /&gt;
 •Privacy Advocacy&lt;br /&gt;
-Round table discussions on policy implementation and creating awareness and capacity building within the university to involve other departments.&lt;br /&gt;
|Links about the activity=https://skirtskenya.wordpress.com/2015/05/28/f3mhack-continues-to-egerton-university/&lt;br /&gt;
|Upload content=Sam 0773.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Agenda of the event:&lt;br /&gt;
Day one:&lt;br /&gt;
Enhancing capacity of women in digital security and privacy advocacy&lt;br /&gt;
– Welcome presentation by Mary Kiio and Yvonne Oluoch&lt;br /&gt;
Honor of Sabeen Mahmud, a moment of silence for her death&lt;br /&gt;
-Staying safe online presentation by Mary Kiio&lt;br /&gt;
Discussion of various scenarios from the audience&lt;br /&gt;
Digital Security Tools and tactics presentation by Yvonne Oluoch&lt;br /&gt;
Privacy Advocacy presentation by Mary Kiio&lt;br /&gt;
Group work and discussion&lt;br /&gt;
Lunch break&lt;br /&gt;
Afternoon session &lt;br /&gt;
Group work and group presentations&lt;br /&gt;
Tea break&lt;br /&gt;
NB:The above sessions were in line with the training that was conducted in Nairobi, however as their was more time , there were more in depth discussions on the issues identified during the training. The training on digital security tools was also elaborate as the facilitator went online and took the participants through various ways of utilizing the various digital security tools.&lt;br /&gt;
&lt;br /&gt;
One spectrogram exercises was utilized during the training session that provided a healthy debate among the participants towards their understanding on tech related violence. &lt;br /&gt;
Day two&lt;br /&gt;
Round table discussions on policy advocacy and implementation&lt;br /&gt;
The discussions were aimed at guiding the participants to think of channels they can use towards developing policy within the university. The participants spent time thinking through the various channels a new policy has to go through before it is adapted i.e the bottoms up approach where the students would first bring up the issue on the need for tech related violence and go through the various university processes until it is adapted as an official policy.&lt;br /&gt;
&lt;br /&gt;
The participants also discussed on the various initiatives they would undertake from an individual level as well as utilizing various university groups towards sharing the importance of enhancing their safety online.&lt;br /&gt;
|Methodologies for training=Power Point presentations&lt;br /&gt;
Group Discussions&lt;br /&gt;
Spectogram exercise&lt;br /&gt;
Personal exercise.&lt;br /&gt;
|Existing toolkits and resources=The toolkits and resources involved: Powerpoint presentations on privacy advocacy and digital security. &lt;br /&gt;
Myshadow.org website for tools&lt;br /&gt;
|Gender and tech tutorials used=Security in the box, Donated three security in a box books to the gender head of department so as to help the students carry on with the conversation and research.,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Loved facilitating at the University and the students together with the lecturers were very vibrant to learn about digital security and how gender based violence easily becomes tech based violence with advancement of technology-Yvonne&lt;br /&gt;
“Open sharing of the student and lecturer participants on tech related violence they had experienced at the university made me sad to realize how widespread tech related violence is in our country, however, I was encouraged and energized by their eagerness to learn how to further enhance their security online.” Mary Kiio&lt;br /&gt;
|Feedbacks=Most students and lecturers were not aware of digital security and were in awe during the hands on sessions. Being the gender department, digital security is treated as a separate entity-Yvonne&lt;br /&gt;
“This session has been so practical in sharing crucial information on digital security. I have been talking to them (students) on the need for digital security but had not gone through it using such depth and identifying tools online they can use,” a lecturer said. &lt;br /&gt;
There is room for the trainings we conducted to be adapted in sessions such as the gender department as the lecturer above outlines, if we scale up our intervention with the university and hopefully others that have opportunities to adapt the trainings. Mary Kiio&lt;br /&gt;
|START=Organizing digital security trainings in institutions located  in the rural areas.-Yvonne&lt;br /&gt;
Engage more with higher learning institutions towards sharing information with them on how to stay safe online and privacy advocacy with the hope that they will adapt them into their existing curricula and university policies that tackle cybercrimes affecting their students. Mary Kiio&lt;br /&gt;
|STOP=Focusing more on city based institutions  _Yvonne&lt;br /&gt;
Thinking of sometime tomorrow is when I need to scale up my trainings on digital security and privacy advocacy with regards to universities, rather than now , no matter what challenges I think I may face. Mary Kiio&lt;br /&gt;
|KEEP=Sharing more digital security training resources especially security in a box toolkit and myshadow.org . Yvonne &lt;br /&gt;
&lt;br /&gt;
Maintain the networks I have developed with various heads of departments of various universities around the country with an aim of reaching out to their student bodies and other lecturers through training and conducting roundtable discussions. Mary&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:Sam_0773.jpg&amp;diff=2576</id>
		<title>File:Sam 0773.jpg</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:Sam_0773.jpg&amp;diff=2576"/>
				<updated>2015-06-18T10:54:10Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: {{PAGENAME}}&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Activities|{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=FemH3ck_%E2%80%93_Talking_Digital_Saving_Lives_at_Egerton_University,_Njoro,_Kenya&amp;diff=2575</id>
		<title>FemH3ck – Talking Digital Saving Lives at Egerton University, Njoro, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=FemH3ck_%E2%80%93_Talking_Digital_Saving_Lives_at_Egerton_University,_Njoro,_Kenya&amp;diff=2575"/>
				<updated>2015-06-18T10:50:54Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Talking Digital Saving lives, workshop training and roundtable discussion&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security&lt;br /&gt;
|Start when ?=2015/05/25&lt;br /&gt;
|End when ?=2015/05/26&lt;br /&gt;
|Where is located the activity ?=Egerton University, Njoro, Kenya&lt;br /&gt;
|Geo-localization of the activity ?=-0.79648313511391, 38.3203125&lt;br /&gt;
|Who organize it=Yvonne Oluoch of S.K.I.R.T.S (Socially Keen Individuals Redefining Tech Spaces) Kenya and Mary Kiio of Roshani Consultancy Services&lt;br /&gt;
|For whom is it organized=Students undertaking courses in gender and development studies, lecturers, Head of departments and professors.&lt;br /&gt;
|How many people trained=40&lt;br /&gt;
|Motivations for organizing training=Issues of tech related violence is rampant among students of higher learning institutions. Unfortunately, there are no policies within the institutions that can deal with tech related violence.&lt;br /&gt;
&lt;br /&gt;
Egerton University  has a gender department that can strategically guide the conversations on tech related violence and possibly provide the required fora that would hopefully lead to the development of policies within the university that will curb tech related violence that occurs in the university.&lt;br /&gt;
&lt;br /&gt;
The training was also conducted at the University due to the request of the Head of the Gender department , who had attended a round table on safety online for key stakeholders in Nakuru and had seen the value of having a training intervention with the students who were most affected by tech related violence.&lt;br /&gt;
|Topics addressed=•Staying safe online&lt;br /&gt;
&lt;br /&gt;
•Digital Security tools and tactics&lt;br /&gt;
 •Privacy Advocacy&lt;br /&gt;
-Round table discussions on policy implementation and creating awareness and capacity building within the university to involve other departments.&lt;br /&gt;
|Links about the activity=https://skirtskenya.wordpress.com/2015/05/28/f3mhack-continues-to-egerton-university/&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Agenda of the event:&lt;br /&gt;
Day one:&lt;br /&gt;
Enhancing capacity of women in digital security and privacy advocacy&lt;br /&gt;
– Welcome presentation by Mary Kiio and Yvonne Oluoch&lt;br /&gt;
Honor of Sabeen Mahmud, a moment of silence for her death&lt;br /&gt;
-Staying safe online presentation by Mary Kiio&lt;br /&gt;
Discussion of various scenarios from the audience&lt;br /&gt;
Digital Security Tools and tactics presentation by Yvonne Oluoch&lt;br /&gt;
Privacy Advocacy presentation by Mary Kiio&lt;br /&gt;
Group work and discussion&lt;br /&gt;
Lunch break&lt;br /&gt;
Afternoon session &lt;br /&gt;
Group work and group presentations&lt;br /&gt;
Tea break&lt;br /&gt;
NB:The above sessions were in line with the training that was conducted in Nairobi, however as their was more time , there were more in depth discussions on the issues identified during the training. The training on digital security tools was also elaborate as the facilitator went online and took the participants through various ways of utilizing the various digital security tools.&lt;br /&gt;
&lt;br /&gt;
One spectrogram exercises was utilized during the training session that provided a healthy debate among the participants towards their understanding on tech related violence. &lt;br /&gt;
Day two&lt;br /&gt;
Round table discussions on policy advocacy and implementation&lt;br /&gt;
The discussions were aimed at guiding the participants to think of channels they can use towards developing policy within the university. The participants spent time thinking through the various channels a new policy has to go through before it is adapted i.e the bottoms up approach where the students would first bring up the issue on the need for tech related violence and go through the various university processes until it is adapted as an official policy.&lt;br /&gt;
&lt;br /&gt;
The participants also discussed on the various initiatives they would undertake from an individual level as well as utilizing various university groups towards sharing the importance of enhancing their safety online.&lt;br /&gt;
|Methodologies for training=Power Point presentations&lt;br /&gt;
Group Discussions&lt;br /&gt;
Spectogram exercise&lt;br /&gt;
Personal exercise.&lt;br /&gt;
|Existing toolkits and resources=The toolkits and resources involved: Powerpoint presentations on privacy advocacy and digital security. &lt;br /&gt;
Myshadow.org website for tools&lt;br /&gt;
|Gender and tech tutorials used=Security in the box, Donated three security in a box books to the gender head of department so as to help the students carry on with the conversation and research.,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Loved facilitating at the University and the students together with the lecturers were very vibrant to learn about digital security and how gender based violence easily becomes tech based violence with advancement of technology-Yvonne&lt;br /&gt;
“Open sharing of the student and lecturer participants on tech related violence they had experienced at the university made me sad to realize how widespread tech related violence is in our country, however, I was encouraged and energized by their eagerness to learn how to further enhance their security online.” Mary Kiio&lt;br /&gt;
|Feedbacks=Most students and lecturers were not aware of digital security and were in awe during the hands on sessions. Being the gender department, digital security is treated as a separate entity-Yvonne&lt;br /&gt;
“This session has been so practical in sharing crucial information on digital security. I have been talking to them (students) on the need for digital security but had not gone through it using such depth and identifying tools online they can use,” a lecturer said. &lt;br /&gt;
There is room for the trainings we conducted to be adapted in sessions such as the gender department as the lecturer above outlines, if we scale up our intervention with the university and hopefully others that have opportunities to adapt the trainings. Mary Kiio&lt;br /&gt;
|START=Organizing digital security trainings in institutions located  in the rural areas.-Yvonne&lt;br /&gt;
Engage more with higher learning institutions towards sharing information with them on how to stay safe online and privacy advocacy with the hope that they will adapt them into their existing curricula and university policies that tackle cybercrimes affecting their students. Mary Kiio&lt;br /&gt;
|STOP=Focusing more on city based institutions  _Yvonne&lt;br /&gt;
Thinking of sometime tomorrow is when I need to scale up my trainings on digital security and privacy advocacy with regards to universities, rather than now , no matter what challenges I think I may face. Mary Kiio&lt;br /&gt;
|KEEP=Sharing more digital security training resources especially security in a box toolkit and myshadow.org . Yvonne &lt;br /&gt;
&lt;br /&gt;
Maintain the networks I have developed with various heads of departments of various universities around the country with an aim of reaching out to their student bodies and other lecturers through training and conducting roundtable discussions. Mary&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=FemH3ck_%E2%80%93_Talking_Digital_Saving_Lives_at_Egerton_University,_Njoro,_Kenya&amp;diff=2574</id>
		<title>FemH3ck – Talking Digital Saving Lives at Egerton University, Njoro, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=FemH3ck_%E2%80%93_Talking_Digital_Saving_Lives_at_Egerton_University,_Njoro,_Kenya&amp;diff=2574"/>
				<updated>2015-06-18T10:49:31Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: Created page with &amp;quot;{{Activities |Title of the activity=Talking Digital Saving lives, workshop training and roundtable discussion |Start when ?=2015/05/25 |End when ?=2015/05/26 |Where is located...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Talking Digital Saving lives, workshop training and roundtable discussion&lt;br /&gt;
|Start when ?=2015/05/25&lt;br /&gt;
|End when ?=2015/05/26&lt;br /&gt;
|Where is located the activity ?=Egerton University, Njoro, Kenya&lt;br /&gt;
|Geo-localization of the activity ?=-0.796483135113907, 38.3203125&lt;br /&gt;
|Who organize it=Yvonne Oluoch of S.K.I.R.T.S (Socially Keen Individuals Redefining Tech Spaces) Kenya and Mary Kiio of Roshani Consultancy Services&lt;br /&gt;
|For whom is it organized=Students undertaking courses in gender and development studies, lecturers, Head of departments and professors.&lt;br /&gt;
|How many people trained=40&lt;br /&gt;
|Motivations for organizing training=Issues of tech related violence is rampant among students of higher learning institutions. Unfortunately, there are no policies within the institutions that can deal with tech related violence.&lt;br /&gt;
&lt;br /&gt;
Egerton University  has a gender department that can strategically guide the conversations on tech related violence and possibly provide the required fora that would hopefully lead to the development of policies within the university that will curb tech related violence that occurs in the university.&lt;br /&gt;
&lt;br /&gt;
The training was also conducted at the University due to the request of the Head of the Gender department , who had attended a round table on safety online for key stakeholders in Nakuru and had seen the value of having a training intervention with the students who were most affected by tech related violence.&lt;br /&gt;
|Topics addressed=•Staying safe online&lt;br /&gt;
&lt;br /&gt;
•Digital Security tools and tactics&lt;br /&gt;
 •Privacy Advocacy&lt;br /&gt;
-Round table discussions on policy implementation and creating awareness and capacity building within the university to involve other departments.&lt;br /&gt;
|Links about the activity=https://skirtskenya.wordpress.com/2015/05/28/f3mhack-continues-to-egerton-university/&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Agenda of the event:&lt;br /&gt;
Day one:&lt;br /&gt;
Enhancing capacity of women in digital security and privacy advocacy&lt;br /&gt;
– Welcome presentation by Mary Kiio and Yvonne Oluoch&lt;br /&gt;
Honor of Sabeen Mahmud, a moment of silence for her death&lt;br /&gt;
-Staying safe online presentation by Mary Kiio&lt;br /&gt;
Discussion of various scenarios from the audience&lt;br /&gt;
Digital Security Tools and tactics presentation by Yvonne Oluoch&lt;br /&gt;
Privacy Advocacy presentation by Mary Kiio&lt;br /&gt;
Group work and discussion&lt;br /&gt;
Lunch break&lt;br /&gt;
Afternoon session &lt;br /&gt;
Group work and group presentations&lt;br /&gt;
Tea break&lt;br /&gt;
NB:The above sessions were in line with the training that was conducted in Nairobi, however as their was more time , there were more in depth discussions on the issues identified during the training. The training on digital security tools was also elaborate as the facilitator went online and took the participants through various ways of utilizing the various digital security tools.&lt;br /&gt;
&lt;br /&gt;
One spectrogram exercises was utilized during the training session that provided a healthy debate among the participants towards their understanding on tech related violence. &lt;br /&gt;
Day two&lt;br /&gt;
Round table discussions on policy advocacy and implementation&lt;br /&gt;
The discussions were aimed at guiding the participants to think of channels they can use towards developing policy within the university. The participants spent time thinking through the various channels a new policy has to go through before it is adapted i.e the bottoms up approach where the students would first bring up the issue on the need for tech related violence and go through the various university processes until it is adapted as an official policy.&lt;br /&gt;
&lt;br /&gt;
The participants also discussed on the various initiatives they would undertake from an individual level as well as utilizing various university groups towards sharing the importance of enhancing their safety online.&lt;br /&gt;
|Methodologies for training=Power Point presentations&lt;br /&gt;
Group Discussions&lt;br /&gt;
Spectogram exercise&lt;br /&gt;
Personal exercise.&lt;br /&gt;
|Existing toolkits and resources=The toolkits and resources involved: Powerpoint presentations on privacy advocacy and digital security. &lt;br /&gt;
Myshadow.org website for tools&lt;br /&gt;
|Gender and tech tutorials used=Security in the box, Donated three security in a box books to the gender head of department so as to help the students carry on with the conversation and research.,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Loved facilitating at the University and the students together with the lecturers were very vibrant to learn about digital security and how gender based violence easily becomes tech based violence with advancement of technology-Yvonne&lt;br /&gt;
“Open sharing of the student and lecturer participants on tech related violence they had experienced at the university made me sad to realize how widespread tech related violence is in our country, however, I was encouraged and energized by their eagerness to learn how to further enhance their security online.” Mary Kiio&lt;br /&gt;
|Feedbacks=Most students and lecturers were not aware of digital security and were in awe during the hands on sessions. Being the gender department, digital security is treated as a separate entity-Yvonne&lt;br /&gt;
“This session has been so practical in sharing crucial information on digital security. I have been talking to them (students) on the need for digital security but had not gone through it using such depth and identifying tools online they can use,” a lecturer said. &lt;br /&gt;
There is room for the trainings we conducted to be adapted in sessions such as the gender department as the lecturer above outlines, if we scale up our intervention with the university and hopefully others that have opportunities to adapt the trainings. Mary Kiio&lt;br /&gt;
|START=Organizing digital security trainings in institutions located  in the rural areas.-Yvonne&lt;br /&gt;
Engage more with higher learning institutions towards sharing information with them on how to stay safe online and privacy advocacy with the hope that they will adapt them into their existing curricula and university policies that tackle cybercrimes affecting their students. Mary Kiio&lt;br /&gt;
|STOP=Focusing more on city based institutions  _Yvonne&lt;br /&gt;
Thinking of sometime tomorrow is when I need to scale up my trainings on digital security and privacy advocacy with regards to universities, rather than now , no matter what challenges I think I may face. Mary Kiio&lt;br /&gt;
|KEEP=Sharing more digital security training resources especially security in a box toolkit and myshadow.org . Yvonne &lt;br /&gt;
&lt;br /&gt;
Maintain the networks I have developed with various heads of departments of various universities around the country with an aim of reaching out to their student bodies and other lecturers through training and conducting roundtable discussions. Mary&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=FemH3ck_%E2%80%93_Digital_Security_and_Privacy_Advocacy_Flash_training_at_the_ihub_Space,_Nairobi,_Kenya&amp;diff=2573</id>
		<title>FemH3ck – Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=FemH3ck_%E2%80%93_Digital_Security_and_Privacy_Advocacy_Flash_training_at_the_ihub_Space,_Nairobi,_Kenya&amp;diff=2573"/>
				<updated>2015-06-18T09:45:31Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Talking Digital, Changing Lives: Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya for Women journalists and activists&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security&lt;br /&gt;
|Start when ?=2015/05/23&lt;br /&gt;
|End when ?=2015/05/23&lt;br /&gt;
|Number of hours if only one day ?=3&lt;br /&gt;
|Where is located the activity ?=Nairobi, Kenya&lt;br /&gt;
|Geo-localization of the activity ?=-1.3076473, 36.7346954&lt;br /&gt;
|Who organize it=Yvonne Oluoch of S.K.I.R.T.S (Socially Keen Individuals Redefining Tech Spaces) Kenya and Mary Kiio of Roshani Consultancy Services&lt;br /&gt;
|For whom is it organized=For women journalists, activists, women in tech, bloggers and security enthusiasts.&lt;br /&gt;
|How many people trained=30&lt;br /&gt;
|Motivations for organizing training=Many women in Kenya today are embracing the internet as a means of communication with their peers and colleagues on a social and professional basis. As they seek to share vital information about themselves so as to increase their networking skills, these women post information and pictures on various sites that are both of a personal and professional nature. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, this same medium of expression (the internet) exposes the information these women share to public scrutiny and may have negative effect, when this information falls in the hands (or eyes) of a person who can misuse this information through manipulation, or lead to harassment among other internet crimes.&lt;br /&gt;
|Topics addressed=-Staying Safe Online ( a peek into Kenya’s women background on cybercrime and/or harassment: IAWRT Kenya) &lt;br /&gt;
-Digital Security tools and tactics&lt;br /&gt;
-Privacy Advocacy&lt;br /&gt;
|Links about the activity=https://skirtskenya.wordpress.com/2015/05/25/recapping-f3mhack-nairobi/&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=- Welcome to the training and Introductions: The facilitators gave a brief background of why the training was taking place. This included the thinking behind f3mhackathon and also sought to explain a little about Sabeen Mahmud and why we were dedicating this special day to her memory. This session also gave the participants an opportunity to get to know each other and the facilitators and to share their expectations of the training.&lt;br /&gt;
Staying Safe Online ( a peek into Kenya’s women background on cybercrime and/or harassment: IAWRT Kenya) –This session sought to give a background on the situation of cyber crime in Kenya against women with a special focus on the qualitative research conducted by the International Association of Women in Radio and Television,  (IAWRT-Kenya):Ending Violence: Women’s Rights and Safety Online. &lt;br /&gt;
From the research the facilitator of this session shared a story of one of the case studies of the research where a certain lady had openly shared her passwords to various online accounts with  her partner and father of her children but he had in turn used her passwords and posed as her when interacting with her friends , relatives and family including abusing them online. This was coupled with physical beatings.  The sharing of this story was aimed at providing the context of why it is important for us to spend some time learning more on how to enhance our digital security online and start privacy advocacy campaign.&lt;br /&gt;
Digital Security (Yvonne explain further on this session)&lt;br /&gt;
Privacy Advocacy –For one to understand why privacy advocacy is crucial, the facilitator took the participants through a personal exercise of mapping one’s shadow on the internet. These shadows were captured through drawing and were posted on a white board by each participant. This exercise led to discussions on the traces we leave online and the possible challenges we are exposing to ourselves everytime we are online.&lt;br /&gt;
The participants were then divided into various groups where they were expected to take up collaborative roles such as : You are a company that would like to sell crucial data on various people or organizations to the government. Using the data shadows on the white board identify which persons/organizations you think the government would be interested in and why they would be interested in them basing it on the data shared on the data shadows.  Or You have just opened a new restaurant in town. Identify which people (from the data shadows) you would like to target and how they would be important to your restaurant. The participants were then expected to make a presentation to the plenary of their findings.&lt;br /&gt;
These presentations led to further discussions on issues such as the use of free online platforms actually means that the individual is the product. That it is very easy for anyone with a specific motive or focus to collect data about you without your knowledge and hence that is why it is important to make use of the various digital security tools to protect your data where possible and to ensure that one does not leave their traces online.&lt;br /&gt;
&lt;br /&gt;
The members of the same group were further given a task to think about what they can do based on their various professions on what they can do towards informing others on how to protect their digital privacy and any initiatives they may think of that would be helpful towards championing for privacy advocacy. The participants also got to share their ideas in plenary. The facilitator further added some key points on other initiatives they can undertake towards achieving privacy advocacy.&lt;br /&gt;
|Methodologies for training=-Power point presentations&lt;br /&gt;
-Group Discussions&lt;br /&gt;
-Personal exercises-mapping one’s digital shadow&lt;br /&gt;
|Existing toolkits and resources=The toolkits and resources involved: Powerpoint presentations on privacy advocacy and &lt;br /&gt;
digital security: &lt;br /&gt;
Myshadow.org website&lt;br /&gt;
|Gender and tech tutorials used=Security in the box,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Loved sharing my knowledge on digital security but above all, loved the attendees enthusiasm on the subject matter.All the invited guests showed up even the ihub space manager created time to be involved and participate in the training.-Yvonne&lt;br /&gt;
“When the training came to an end, the participants were not willing to leave the training session. Their silence was pregnant with the desire to learn more. This filled me with lots of joy to know that we had been tackling a topic that people are hungry for information. It was a reflection that probably it was interesting and relevant to their day to day work.” Mary Kiio&lt;br /&gt;
|Feedbacks=Being city dwellers and internet savvy, the audience related well to the subject matter and how it affects their work both personally and professionally. The attendees fully participated and were engaging. It was a 50/50 involvement on the hands on given that a good number did not come with their laptops.-Yvonne&lt;br /&gt;
“While I was taking my tea, one of the participants came up to me and said, “this workshop has been great. It is so relevant to the issues that we women are facing especially in our personal lives. There are so many cybercrimes being committed to us by the one’s we love. I hope you can find time to come to our association and train many more women on how to stay safe online. It is a critical topic that we need further information on.” Mary Kiio&lt;br /&gt;
|START=I'll start looking for more avenues and resources to keep the conversation going. Consistency is key and focus more on women in civil society.-Yvonne&lt;br /&gt;
&lt;br /&gt;
Applying some of the privacy advocacy tips such as tracking through what legislation is being discussed in parliament that would enhance digital security and start sharing tips on my blog about how to stay safe online by using various digital security tools that are contained in the security in a box in a creative way. Mary Kiio&lt;br /&gt;
|STOP=I will stop downplaying my passion in tech training especially in digital security since more people lack the knowledge. _Yvonne&lt;br /&gt;
Procrastinating in looking for new avenues such as schools-primary, high school and universities to share on how they can stay safe online and if possible start advocacy groups that will hopefully enlighten them even when the young people get into the job market. Mary Kiio&lt;br /&gt;
|KEEP=Keep collaborating with other facilitators and institutions so as to encourage the adoption of digital security in various curriculum. Yvonne &lt;br /&gt;
Training and conducting roundtable discussions in various parts of the country on how women can stay safe online and the initiatives that they can set up towards achieving this by government officials, civil society organizations and media. Mary Kiio&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:DIGITAL_SECURITY_presentation.pdf&amp;diff=2572</id>
		<title>File:DIGITAL SECURITY presentation.pdf</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:DIGITAL_SECURITY_presentation.pdf&amp;diff=2572"/>
				<updated>2015-06-18T09:42:47Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=FemH3ck_%E2%80%93_Digital_Security_and_Privacy_Advocacy_Flash_training_at_the_ihub_Space,_Nairobi,_Kenya&amp;diff=2571</id>
		<title>FemH3ck – Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=FemH3ck_%E2%80%93_Digital_Security_and_Privacy_Advocacy_Flash_training_at_the_ihub_Space,_Nairobi,_Kenya&amp;diff=2571"/>
				<updated>2015-06-18T09:37:18Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: Created page with &amp;quot;{{Activities |Title of the activity=Talking Digital, Changing Lives: Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya for Women journalis...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Talking Digital, Changing Lives: Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya for Women journalists and activists&lt;br /&gt;
|Start when ?=2015/05/23&lt;br /&gt;
|End when ?=2015/05/23&lt;br /&gt;
|Number of hours if only one day ?=3&lt;br /&gt;
|Where is located the activity ?=Nairobi, Kenya&lt;br /&gt;
|Geo-localization of the activity ?=4th Floor, Bishop Magua Centre, Ngong Rd, Nairobi, Kenya&lt;br /&gt;
|Who organize it=Yvonne Oluoch of S.K.I.R.T.S (Socially Keen Individuals Redefining Tech Spaces) Kenya and Mary Kiio of Roshani Consultancy Services&lt;br /&gt;
|For whom is it organized=For women journalists, activists, women in tech, bloggers and security enthusiasts.&lt;br /&gt;
|How many people trained=30&lt;br /&gt;
|Motivations for organizing training=Many women in Kenya today are embracing the internet as a means of communication with their peers and colleagues on a social and professional basis. As they seek to share vital information about themselves so as to increase their networking skills, these women post information and pictures on various sites that are both of a personal and professional nature. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, this same medium of expression (the internet) exposes the information these women share to public scrutiny and may have negative effect, when this information falls in the hands (or eyes) of a person who can misuse this information through manipulation, or lead to harassment among other internet crimes.&lt;br /&gt;
|Topics addressed=-Staying Safe Online ( a peek into Kenya’s women background on cybercrime and/or harassment: IAWRT Kenya) &lt;br /&gt;
-Digital Security tools and tactics&lt;br /&gt;
-Privacy Advocacy&lt;br /&gt;
|Links about the activity=https://skirtskenya.wordpress.com/2015/05/25/recapping-f3mhack-nairobi/&lt;br /&gt;
|Upload content=SAM 0741.JPG&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=- Welcome to the training and Introductions: The facilitators gave a brief background of why the training was taking place. This included the thinking behind f3mhackathon and also sought to explain a little about Sabeen Mahmud and why we were dedicating this special day to her memory. This session also gave the participants an opportunity to get to know each other and the facilitators and to share their expectations of the training.&lt;br /&gt;
Staying Safe Online ( a peek into Kenya’s women background on cybercrime and/or harassment: IAWRT Kenya) –This session sought to give a background on the situation of cyber crime in Kenya against women with a special focus on the qualitative research conducted by the International Association of Women in Radio and Television,  (IAWRT-Kenya):Ending Violence: Women’s Rights and Safety Online. &lt;br /&gt;
From the research the facilitator of this session shared a story of one of the case studies of the research where a certain lady had openly shared her passwords to various online accounts with  her partner and father of her children but he had in turn used her passwords and posed as her when interacting with her friends , relatives and family including abusing them online. This was coupled with physical beatings.  The sharing of this story was aimed at providing the context of why it is important for us to spend some time learning more on how to enhance our digital security online and start privacy advocacy campaign.&lt;br /&gt;
Digital Security (Yvonne explain further on this session)&lt;br /&gt;
Privacy Advocacy –For one to understand why privacy advocacy is crucial, the facilitator took the participants through a personal exercise of mapping one’s shadow on the internet. These shadows were captured through drawing and were posted on a white board by each participant. This exercise led to discussions on the traces we leave online and the possible challenges we are exposing to ourselves everytime we are online.&lt;br /&gt;
The participants were then divided into various groups where they were expected to take up collaborative roles such as : You are a company that would like to sell crucial data on various people or organizations to the government. Using the data shadows on the white board identify which persons/organizations you think the government would be interested in and why they would be interested in them basing it on the data shared on the data shadows.  Or You have just opened a new restaurant in town. Identify which people (from the data shadows) you would like to target and how they would be important to your restaurant. The participants were then expected to make a presentation to the plenary of their findings.&lt;br /&gt;
These presentations led to further discussions on issues such as the use of free online platforms actually means that the individual is the product. That it is very easy for anyone with a specific motive or focus to collect data about you without your knowledge and hence that is why it is important to make use of the various digital security tools to protect your data where possible and to ensure that one does not leave their traces online.&lt;br /&gt;
&lt;br /&gt;
The members of the same group were further given a task to think about what they can do based on their various professions on what they can do towards informing others on how to protect their digital privacy and any initiatives they may think of that would be helpful towards championing for privacy advocacy. The participants also got to share their ideas in plenary. The facilitator further added some key points on other initiatives they can undertake towards achieving privacy advocacy.&lt;br /&gt;
|Methodologies for training=-Power point presentations&lt;br /&gt;
-Group Discussions&lt;br /&gt;
-Personal exercises-mapping one’s digital shadow&lt;br /&gt;
|Existing toolkits and resources=The toolkits and resources involved: Powerpoint presentations on privacy advocacy and &lt;br /&gt;
digital security: &lt;br /&gt;
Myshadow.org website&lt;br /&gt;
|Gender and tech tutorials used=Security in the box,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Loved sharing my knowledge on digital security but above all, loved the attendees enthusiasm on the subject matter.All the invited guests showed up even the ihub space manager created time to be involved and participate in the training.-Yvonne&lt;br /&gt;
“When the training came to an end, the participants were not willing to leave the training session. Their silence was pregnant with the desire to learn more. This filled me with lots of joy to know that we had been tackling a topic that people are hungry for information. It was a reflection that probably it was interesting and relevant to their day to day work.” Mary Kiio&lt;br /&gt;
|Feedbacks=Being city dwellers and internet savvy, the audience related well to the subject matter and how it affects their work both personally and professionally. The attendees fully participated and were engaging. It was a 50/50 involvement on the hands on given that a good number did not come with their laptops.-Yvonne&lt;br /&gt;
“While I was taking my tea, one of the participants came up to me and said, “this workshop has been great. It is so relevant to the issues that we women are facing especially in our personal lives. There are so many cybercrimes being committed to us by the one’s we love. I hope you can find time to come to our association and train many more women on how to stay safe online. It is a critical topic that we need further information on.” Mary Kiio&lt;br /&gt;
|START=I'll start looking for more avenues and resources to keep the conversation going. Consistency is key and focus more on women in civil society.-Yvonne&lt;br /&gt;
&lt;br /&gt;
Applying some of the privacy advocacy tips such as tracking through what legislation is being discussed in parliament that would enhance digital security and start sharing tips on my blog about how to stay safe online by using various digital security tools that are contained in the security in a box in a creative way. Mary Kiio&lt;br /&gt;
|STOP=I will stop downplaying my passion in tech training especially in digital security since more people lack the knowledge. _Yvonne&lt;br /&gt;
Procrastinating in looking for new avenues such as schools-primary, high school and universities to share on how they can stay safe online and if possible start advocacy groups that will hopefully enlighten them even when the young people get into the job market. Mary Kiio&lt;br /&gt;
|KEEP=Keep collaborating with other facilitators and institutions so as to encourage the adoption of digital security in various curriculum. Yvonne &lt;br /&gt;
Training and conducting roundtable discussions in various parts of the country on how women can stay safe online and the initiatives that they can set up towards achieving this by government officials, civil society organizations and media. Mary Kiio&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:SAM_0741.JPG&amp;diff=2570</id>
		<title>File:SAM 0741.JPG</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:SAM_0741.JPG&amp;diff=2570"/>
				<updated>2015-06-18T09:05:41Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:SAM_0720.JPG&amp;diff=2569</id>
		<title>File:SAM 0720.JPG</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:SAM_0720.JPG&amp;diff=2569"/>
				<updated>2015-06-18T08:59:31Z</updated>
		
		<summary type="html">&lt;p&gt;Akoth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Akoth</name></author>	</entry>

	</feed>