Difference between revisions of "Training, Digital Security and Online Safety Training Philippines"
From Gender and Tech Resources
(Created page with "{{Activities |Title of the activity=Digital Security and Online Safety Training |Category=Digital Security |Start when ?=2017/05/24 |End when ?=2017/05/26 |Where is located th...") |
|||
Line 5: | Line 5: | ||
|End when ?=2017/05/26 | |End when ?=2017/05/26 | ||
|Where is located the activity ?=Country | |Where is located the activity ?=Country | ||
− | |Geo-localization of the activity ?= | + | |Geo-localization of the activity ?=14.5995124, 120.9842195 |
|Who organize it=Foundation for Media Alternatives (with the support of the World Wide Web Foundation) | |Who organize it=Foundation for Media Alternatives (with the support of the World Wide Web Foundation) | ||
|organisation(s) website=http://fma.ph/ | |organisation(s) website=http://fma.ph/ |
Revision as of 10:08, 12 June 2017
Title | Digital Security and Online Safety Training |
---|---|
Category | Digital Security |
Start | 2017/05/24 |
End | 2017/05/26 |
Hours | |
Scale | Country |
Geolocalization | 14° 35' 57", 120° 59' 2"
Loading map...
|
Organisation | Foundation for Media Alternatives (with the support of the World Wide Web Foundation) |
Website | http://fma.ph/ |
Target audience | Filipino Women Human Rights Defenders/Advocates |
Number of participants | 23 |
Context and motivations | |
Topics | Digital security and privacy with a gend2f2a20616b2fef1e92fb8cd086d52b3d |
Links | |
Media | [[File:]] |
Agenda | Topics include How Internet Works, History of Internet from global to Philippines context, Risk Assessment, Managing Identities Online, Building Strategies to counter online gender-based violence and mobile security. |
---|---|
Methodologies | |
Resources | |
Gendersec |
Feelings | As an organization, we could say that the objective and expectations were met. At the end of the training, participants made their commitments on how to pass on the skills and knowledge they have learned from the training. Majority of them will re-echo training in their respective organization and networks. Some are thinking to hold their own risk assessment and later to conduct a digital security and online safety training in a modular session. |
---|---|
Feedbacks | |
Start | |
Stop | |
Keep |