Difference between revisions of "Manuals with a gender perspective"

From Gender and Tech Resources

Line 159: Line 159:
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (http://www.donestech.net/files/English_LELA_comic.pdf)
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (http://www.donestech.net/files/English_LELA_comic.pdf)
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (http://www.donestech.net/files/KIT_CAST_5.pdf)
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)

Revision as of 13:59, 30 November 2017

This HowTo is still largely Work In Progress.

A list of manuals about privacy and digital security from a gender perspective

Manuals produced by collectives/organisations

  • Association for Progressive Communications - 'Take back the tech'

Linkː https://www.takebackthetech.net/

Licenseː Copyleft

Languageː English, French, Spanish

Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː

- The "know more section" which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.

- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː ICTs for Feminist Movement Building: Activist Toolkit

How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity? How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?

  • Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'

Linkː https://akelarreciberfeminista.noblogs.org/category/kits/



Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional

Languageː Spanish

Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.

  • Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas

Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf

Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial

Languageː Spanish

Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia

  • Chayn.org - 'Do It Yourself Online Safety'

Linkː http://chayn.co/safety/

Licenseː Creative Commons Attribution 4.0 license

Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.

CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms. This guide can be useful irrespective of your gender, location or situation.

- How to build your own domestic violence case without a lawyer is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.

  • Ciberfeministas Guatemala'

Linkː http://www.ciberfeministas.or.gt/fanzines-libres/

Licenseː Copyleft

Languageː Spanish

Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos, como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la Privacidad, Violencia machista en línea, Ciberactivismo feminista, Empoderamiento de las mujeres a través de las TIC, Acoso callejero.


Linkː https://archive.org/details/guiaautodefensatelefonos

Licenseː Copyleft

Languageː Spanish

Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs. Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos.

  • Coding Rights - Send nudes'

Linkː http://www.codingrights.org/send-nudes/

Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)

Languageː Brasilian, English

Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.

  • Coding Rights - Chupadados

Linkː https://chupadados.codingrights.org/

Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)

Languageː Brasilian, Spanish

Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como "Big Data", "Smart Cities" e "Internet de las Cosas", creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual, aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no?

  • CommunityRED - '9 Ways to Dodge Trolls: A Feminist’s Guide to Digital Security'

Linkː https://medium.com/thelist/9-ways-to-dodge-trolls-a-feminists-guide-to-digital-security-471f66b98c79

Licenseː Not specified

Languageː English

This short manual offer to those feminists or allies who dare to publish any troll-life-ruining content a few ways to protect themselves.

  • Crash Override network - 'Various'

Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices

Licenseː Not specified

Languageː English

This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.

Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here. Link: http://www.crashoverridenetwork.com/preventingdoxing.html

Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. Link: http://www.crashoverridenetwork.com/familyandpolice.html

So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html

  • Cyborg Feministas - Recursos'

Linkː https://cyborgfeminista.tedic.org/inicio/recursos/

Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional

Languageː Spanish

Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta; Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre.

  • Digital Rights Foundation - 'The art of digital security for pakistani women'

Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf

Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.

Languageː English, Urdu

This guidebook has been specially made for Pakistani women and is available in Urdu and English.

  • Donestech.net - 'Various'

Linkː http://donestech.net/

Licenseː Creative Commons Attribution - Share Alike - No Commercial

Languageː Spanish, Catalan, English

- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (http://www.donestech.net/files/English_LELA_comic.pdf)

- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)

- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)

Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women.

  • Feminist Frequency - Countering Online Harassment Safety and Support Guide'

Linkː https://onlinesafety.feministfrequency.com/

Licenseː ?

Languageː English, Spanish, Arabic

This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups & cybermobs online.

  • FemTechNet - 'Center for solutions to online violence'

Linkː http://femtechnet.org/csov/

Licenseː Not specified

Languageː English

The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence

  • Fundacion Karisma'

Linkː https://karisma.org.co/?wpdmdl=7174

Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.

Languageː Spanish

Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.

  • Hacking with care'

Linkː http://hackingwithcare.in/ http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki http://hackingwithcare.in/by/ressources/

Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported

Languageː English

Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist, growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body & soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…

Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations, massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch….

  • Hollaback - Tehcnical safety guides and Social Media Safety Guides'

Linkː https://www.ihollaback.org/resources/

Licenseː Copright

Languageː English

Introducing our new Social Media Safety Guides for Facebook, Twitter, Reddit, Tumblr, and Youtube! We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one nifty location! Each guide offers expanded information regarding privacy settings and reporting tools, and provides this information with transparent and accessible language from each of the social media platforms. The guides provide a more user focused perspective to navigating tools to keep you safe online. Online harassment includes a wide range of targeted behaviors including: threats, continued hateful messages, doxing, DDoS attacks, swatting, defamation, and more. Online harassment can target (or come from) a group or individual and often has the expressed purpose of having the individual or group leave the internet or take down their content.

While there is space for debate and discussion online (as well as conflicting ideas!), what separates online harassment from healthy discourse is the focus on harm: including publishing personal information, sending threats with the intention to scare or harm, and even directly promoting harm against a person or organization. We believe in a free internet where individuals feel safe to connect, and online harassment isn’t a part of that.

  • Internet Democracy Project - Gendering surveillance'

Linkː https://genderingsurveillance.internetdemocracy.in/

Licenseː Creative Commons BY 4.0 (unless otherwise specified).

Languageː English

The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of safety apps, phone bans, or the use of CCTV in garment factories.

  • Institute of War and Peace - 'Cyber women'

Linkː https://cyber-women.com/en/

Licenseː Creative Commons BY - SA- NC

Languageː English, Spanish, Arabic

Cyberwomen is a self-defense guide with gender perspective aimed at offering learning experiences to women human right defenders that work in high-risk environments. The guide is made up of training modules and recommendations focused on specific contexts. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations. Cyberwomen includes interactive games, as well as audio-visual and graphic materials, as instructional aids for trainers. You can download this guide from the site and learn more about it's methodology and training modules, in addition to other useful resources. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.

  • Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'

Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/

Licenseː Creative Commons By Share Alike

Languageː English

In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner. Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.

  • Safe Hub Collective - 'DIY Guide to feminist Cybersecurity'

Linkː https://tech.safehubcollective.org/cybersecurity/


Licenseː CC-BY-4.0

Languageː English, Spanish

This guide is intended to be a comprehensive and accessible introduction to some of the most valuable cybersecurity tools available. There’s a lot of information here, so it can get a bit overwhelming! Feel free to read each section at your own pace: there’s no obligation to read through the whole guide and install every piece of tech we recommend.

  • Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran'

Linkː https://jensiat.io/ https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality

Licenseː CC Attribution-NonCommercial 2.5 Generic

Languageː Farsi

Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to.

  • Tactical technology collective - 'Zen and the art of making tech work for you'

Linkː https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es

Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)

Languageː English and Spanish

Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues: First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely?

The manual grew out of the 2014 Gender and Technology Institute, organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added. We hope to have it translated, edited and printed in 2016.

  • Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa

Linkː https://securityinabox.org/en/lgbti-mena

Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)

Languageː English

̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.

  • Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit

Linkː https://womensrights.informationactivism.org/

Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)

Languageː English, Hindi, Arabic and Swahili.

The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.

  • Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'

Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators


Licenseː CC BY SA NC

Languageː English, Spanish

This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.


Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/

Licenseː Commons Attribution-ShareAlike 4.0 International

Languageː English, Spanish, Arabic

Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the perspective of everyone involved in your work is the first step in fostering a productive and safe environment.

  • Web we wantː Recipes for a Digital Revolution

Linkː http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution

Licenseː Copyright

Languageː English

10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.

  • Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders

Linkː http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf

Licenseː Creative Commons BY (Creative Commons Attribution 4.0 International Licence)

Languageː English

Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.

  • Women's Media Center - 'Speech project'

Linkː http://wmcspeechproject.com/online-abuse-101/

Licenseː Copyright

Languageː English

The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.

Manuals produced by individuals

  • How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'

Linkː https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf

Licenseː ?

Languageː English

Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this.

  • Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'

Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf https://archive.org/details/FanzineNecesitoPrivacidad

Licenseː CC Attribution-Noncommercial-Share Alike 3.0

Languageː Spanish

Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.

  • Smart Girl's Guide to Privacy by Violet Blue'

Linkː https://www.nostarch.com/smartgirlsguide

You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)

Licenseː Copyright

Languageː English

In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to: Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites.

  • Twenty ways to help someone who's being bullied online..... by Laurie Penny'

Linkː https://www.patreon.com/posts/12240673

Licenseː Copyright

Languageː English

Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. 

  • So, you’re getting harassed on the Internet. What do you do now? by Deanna Zandt'

Linkː https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c

Licenseː Copyright

Languageː English

The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.

  • Programas de radio El Desarmador por Imilla hacker'

Linkː https://archive.org/details/@imilla_hacker&tab=uploads and http://www.eldesarmador.org/

You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)

Licenseː Creative Commons Attribution-NonCommercial 4.0 International

Languageː Spanish

El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.

Before producing a manual

Before producing a new manual some questions we should askː

  • Don't reinvent the wheelǃ Are you duplicating upstream work?
  • If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?
  • Who's the public and what are the objectives ? What are their security & technical levels? What are their comprehension about feminism?
  • Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?
  • Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?
  • Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?
  • Credits your reviewers and experts that have provided you with feed back!!
  • How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you.
  • How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.
  • How will you achieve or not translation & translatability of your manual? Which type of platforms will you use for achieving the translation? Will you achieve also cultural translation for instance?
  • Accessible for disable people
  • Will you provide further support to the readers such as a contact mail or a hotline?
  • How will you ensure that your contents are ethical, inclusive and trans-queer-feminist "approved"?
  • How will we monitor the impact of our self learning resources/Impact Assessment methodologies?
  • How the distribution will be done? What is the target public?
  • Think about potential partnerships (researchers, academia, volunteer translators etc)