SlideShare a Scribd company logo
Holistic security strategies to address non consensual intimate images
Holistic security strategies
to address non-consensual
intimate images (NCII)
11:00 GMT Breakout Session
Lead discussants
Peace Olive Amuge, Program Manager, Information Sharing and Networking,
WOUGNET (Women of Uganda Network)
Sandra Aceng, Program Officer, Gender and ICT Policy Advocacy, WOUGNET
Patricia Nyasuna, Program Officer, Gender and ICT Program, WOUGNET
Session Facilitator
Rohini Lakshané, Director (Emerging Research), The Bachchao Project
Section 1
NCII: Context and
background
Source: WOUGNET
Non-consensual intimate images (NCII) are defined as
the distribution of sexually explicit images or videos
that were initially shared with the expectation that they
would remain private. 
“Revenge porn” is a misnomer.
Section 1: NCII: Context and background
Section 2
Holistic security
strategies and
measures
Changes in the law, policy, and social norms are
necessary, but they will take time to come into effect.
Additionally, new threats such as stalkerware and
spouseware have been emerging.
The only immediate recourse currently available for
most sub-Saharan girls, women, queer and non-binary
persons is to practice good digital security in order to
recognize and prevent potential incidents of NCII.
Section 1: NCII: Context and background
Why it is important to talk about NCII?
What are the implications of NCII on
the victims?
What are the legal frameworks
regarding NCII?
Holistic security is an attempt to integrate these
concepts [digital, physical and legal security,
psychosocial wellbeing, and organisational security]
and highlight their inter-relatedness so that we can
approach these processes in a more connected and
meaningful way. (Source: HURIDOCS
https://bit.ly/35ku0hg)
Section 2: Holistic security strategies and measures
● Physical
● Digital
● Psychosocial
Section 2: Holistic security strategies and measures
Section 3
Discussion
Section 4
Useful resources
and recommended
reading
| Section 4: Useful resources and recommended reading
● How to find a hidden camera in an Airbnb
https://www.youtube.com/watch?v=N88G1Pp8Qvs
● Airbnb has a hidden camera problem
https://www.theatlantic.com/technology/archive/2019/03/what-happens-when-you-
find-cameras-your-airbnb/585007
● Security Planner https://www.securityplanner.org
● The Motherboard Guide to Sexting Securely
https://vice.com/en_us/article/mb3nd4/how-to-sext-securely-safely-what-apps-to-u
se-sexting
● Safer Nudes https://codingrights.org/4
● All About Sexting [For teenagers]
https://www.plannedparenthood.org/learn/teens/bullying-safety-privacy/all-about-s
exting
● Hey Friend! https://www.takebackthetech.net/know-more/heyfriend
| Section 4: Useful resources and recommended reading
● “Revenge Porn”: The Understanding and Impact of Non-Consensual Intimate
Images (NCII) Violence https://impakter.com/author/sandra-aceng
● Decolonising emotional well-being and mental health in development: African
feminist innovations
https://policy-practice.oxfam.org.uk/publications/decolonising-emotional-well-bein
g-and-mental-health-in-development-african-femi-620960
● Self and Collective Care
http://preventgbvafrica.org/wp-content/uploads/2019/01/Self-and-Collective-Care.pdf
● How to Provide Psychological First Aid emergencies
https://soundcloud.com/user-425988972/how-to-provide-psychological-first-aid-in-
emergencies
● Technology Facilitated Gender based Violence Overview
https://www.icrw.org/publications/technology-facilitated-gender-based-violence-ov
erview/
| Section 4: Useful resources and recommended reading
● 1,600 Motel Guests Were Secretly Streamed Live in South Korea, Police Say
https://www.nytimes.com/2019/03/21/world/asia/korea-spycam-hotel-livestream.html
● Technology Related Violence against women in Uganda report study
http://wougnet.org/files/mydocs/report-vaw.pdf
● Online Violence Against Women & Girls is Still an Ignored Human Rights Violation in
Uganda
https://wougnet.org/news/online-violence-against-women-girls-is-still-an-ignored-
human-rights-violation-in-uganda
● Younger Women Continue to Face Increasing Online Threats
http://wougnet.org/news/younger-women-continue-to-face-increasing-online-thre
ats

More Related Content

PDF
Holistic security strategies to address non-consensual intimate imagery
PDF
CyberTerrorism - Security in Cyberspace
PDF
National Cybersecurity - Roadmap and Action Plan
PDF
UN Singapore Cyber Programme 15 july19
PDF
OSINT 2.0 - Past, present and future
PDF
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
PDF
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
PDF
Web hacking using Cyber range
Holistic security strategies to address non-consensual intimate imagery
CyberTerrorism - Security in Cyberspace
National Cybersecurity - Roadmap and Action Plan
UN Singapore Cyber Programme 15 july19
OSINT 2.0 - Past, present and future
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
Web hacking using Cyber range

What's hot (6)

PDF
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
PDF
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
PPTX
Osint - Dark side of Internet
PDF
NTXISSACSC4 - A Brief History of Cryptographic Failures
PDF
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
Osint - Dark side of Internet
NTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
Ad

Similar to Holistic security strategies to address non consensual intimate images (20)

PPTX
digital / cyber powerpoint presentation with examples
PPTX
Gender Equality: Realities in Lieu of UN Sustainable Development Goals
PPTX
Oula 9 a
PDF
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
PDF
8th Milestones meeting: Cyber violence roundtable
PPTX
INTERNET SAFER DAY-2021.pptx
PDF
Online Safety for Learners
PPT
Understanding the relation between risk and harm. EU Kids Online.
PDF
Noah Maina: Computer Emergency Response Team (CERT)
PPTX
NETS5003 Policy Primer: Cyber harassment
PPT
Sexual solicitation and harassment on the Internet and the mental health of y...
PDF
Global Commision on Internet Governance
PDF
8th Milestones meeting: Cyber violence roundtable
PDF
Cyber crime awareness
PPTX
Empowerment Technologies - Lesson 2.pptx
PDF
The Web Hacking Incidents Database Annual
PPTX
L2 - ONLINE SAFETY, SECURITY, ETHICS, ETIQUETTE.pptx
PDF
Technology and vulnerable users tink palmer (1)
digital / cyber powerpoint presentation with examples
Gender Equality: Realities in Lieu of UN Sustainable Development Goals
Oula 9 a
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
8th Milestones meeting: Cyber violence roundtable
INTERNET SAFER DAY-2021.pptx
Online Safety for Learners
Understanding the relation between risk and harm. EU Kids Online.
Noah Maina: Computer Emergency Response Team (CERT)
NETS5003 Policy Primer: Cyber harassment
Sexual solicitation and harassment on the Internet and the mental health of y...
Global Commision on Internet Governance
8th Milestones meeting: Cyber violence roundtable
Cyber crime awareness
Empowerment Technologies - Lesson 2.pptx
The Web Hacking Incidents Database Annual
L2 - ONLINE SAFETY, SECURITY, ETHICS, ETIQUETTE.pptx
Technology and vulnerable users tink palmer (1)
Ad

Recently uploaded (20)

PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Getting Started with Data Integration: FME Form 101
PDF
Approach and Philosophy of On baking technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
1. Introduction to Computer Programming.pptx
PPT
Teaching material agriculture food technology
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Machine Learning_overview_presentation.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Encapsulation theory and applications.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
August Patch Tuesday
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Getting Started with Data Integration: FME Form 101
Approach and Philosophy of On baking technology
Digital-Transformation-Roadmap-for-Companies.pptx
A Presentation on Artificial Intelligence
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Network Security Unit 5.pdf for BCA BBA.
1. Introduction to Computer Programming.pptx
Teaching material agriculture food technology
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
cloud_computing_Infrastucture_as_cloud_p
Machine Learning_overview_presentation.pptx
Machine learning based COVID-19 study performance prediction
gpt5_lecture_notes_comprehensive_20250812015547.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Encapsulation theory and applications.pdf
Spectral efficient network and resource selection model in 5G networks
August Patch Tuesday
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...

Holistic security strategies to address non consensual intimate images

  • 2. Holistic security strategies to address non-consensual intimate images (NCII) 11:00 GMT Breakout Session
  • 3. Lead discussants Peace Olive Amuge, Program Manager, Information Sharing and Networking, WOUGNET (Women of Uganda Network) Sandra Aceng, Program Officer, Gender and ICT Policy Advocacy, WOUGNET Patricia Nyasuna, Program Officer, Gender and ICT Program, WOUGNET Session Facilitator Rohini Lakshané, Director (Emerging Research), The Bachchao Project
  • 4. Section 1 NCII: Context and background
  • 6. Non-consensual intimate images (NCII) are defined as the distribution of sexually explicit images or videos that were initially shared with the expectation that they would remain private.  “Revenge porn” is a misnomer. Section 1: NCII: Context and background
  • 8. Changes in the law, policy, and social norms are necessary, but they will take time to come into effect. Additionally, new threats such as stalkerware and spouseware have been emerging. The only immediate recourse currently available for most sub-Saharan girls, women, queer and non-binary persons is to practice good digital security in order to recognize and prevent potential incidents of NCII. Section 1: NCII: Context and background
  • 9. Why it is important to talk about NCII? What are the implications of NCII on the victims? What are the legal frameworks regarding NCII?
  • 10. Holistic security is an attempt to integrate these concepts [digital, physical and legal security, psychosocial wellbeing, and organisational security] and highlight their inter-relatedness so that we can approach these processes in a more connected and meaningful way. (Source: HURIDOCS https://bit.ly/35ku0hg) Section 2: Holistic security strategies and measures
  • 11. ● Physical ● Digital ● Psychosocial Section 2: Holistic security strategies and measures
  • 13. Section 4 Useful resources and recommended reading
  • 14. | Section 4: Useful resources and recommended reading ● How to find a hidden camera in an Airbnb https://www.youtube.com/watch?v=N88G1Pp8Qvs ● Airbnb has a hidden camera problem https://www.theatlantic.com/technology/archive/2019/03/what-happens-when-you- find-cameras-your-airbnb/585007 ● Security Planner https://www.securityplanner.org ● The Motherboard Guide to Sexting Securely https://vice.com/en_us/article/mb3nd4/how-to-sext-securely-safely-what-apps-to-u se-sexting ● Safer Nudes https://codingrights.org/4 ● All About Sexting [For teenagers] https://www.plannedparenthood.org/learn/teens/bullying-safety-privacy/all-about-s exting ● Hey Friend! https://www.takebackthetech.net/know-more/heyfriend
  • 15. | Section 4: Useful resources and recommended reading ● “Revenge Porn”: The Understanding and Impact of Non-Consensual Intimate Images (NCII) Violence https://impakter.com/author/sandra-aceng ● Decolonising emotional well-being and mental health in development: African feminist innovations https://policy-practice.oxfam.org.uk/publications/decolonising-emotional-well-bein g-and-mental-health-in-development-african-femi-620960 ● Self and Collective Care http://preventgbvafrica.org/wp-content/uploads/2019/01/Self-and-Collective-Care.pdf ● How to Provide Psychological First Aid emergencies https://soundcloud.com/user-425988972/how-to-provide-psychological-first-aid-in- emergencies ● Technology Facilitated Gender based Violence Overview https://www.icrw.org/publications/technology-facilitated-gender-based-violence-ov erview/
  • 16. | Section 4: Useful resources and recommended reading ● 1,600 Motel Guests Were Secretly Streamed Live in South Korea, Police Say https://www.nytimes.com/2019/03/21/world/asia/korea-spycam-hotel-livestream.html ● Technology Related Violence against women in Uganda report study http://wougnet.org/files/mydocs/report-vaw.pdf ● Online Violence Against Women & Girls is Still an Ignored Human Rights Violation in Uganda https://wougnet.org/news/online-violence-against-women-girls-is-still-an-ignored- human-rights-violation-in-uganda ● Younger Women Continue to Face Increasing Online Threats http://wougnet.org/news/younger-women-continue-to-face-increasing-online-thre ats