Holistic security strategies to address non-consensual intimate imagery
Holistic security strategies
to address non-consensual
intimate images (NCII)
11:00 GMT Breakout Session
Lead discussants
Peace Olive Amuge, Program Manager, Information Sharing and Networking,
WOUGNET (Women of Uganda Network)
Sandra Aceng, Program Officer, Gender and ICT Policy Advocacy, WOUGNET
Patricia Nyasuna, Program Officer, Gender and ICT Program, WOUGNET
Session Facilitator
Rohini Lakshané, Director (Emerging Research), The Bachchao Project
Section 1
NCII: Context and
background
Non-consensual intimate images (NCII) are defined as
the distribution of sexually explicit images or videos
that were initially shared with the expectation that they
would remain private. 
“Revenge porn” is a misnomer.
Holistic security is an attempt to integrate these
concepts [digital, physical and legal security,
psychosocial wellbeing, and organisational security]
and highlight their inter-relatedness so that we can
approach these processes in a more connected and
meaningful way. (Source: HURIDOCS
https://bit.ly/35ku0hg)
Section 1: NCII: Context and background
Changes in the law, policy, and social norms are
necessary, but they will take time to come into effect.
Additionally, new threats such as stalkerware and
spouseware have been emerging.
The only immediate recourse currently available for
most sub-Saharan girls, women, queer and non-binary
persons is to practice good digital security in order to
recognize and prevent potential incidents of NCII.
Section 1: NCII: Context and background
Section 2
Holistic security
strategies and
measures
● Physical
● Digital
● Psychosocial
Section 2: Holistic security strategies and measures
Section 3
Discussion
Section 4
Useful resources
and recommended
reading
| Section 4: Useful resources and recommended reading
● How to find a hidden camera in an Airbnb
https://www.youtube.com/watch?v=N88G1Pp8Qvs
● Airbnb has a hidden camera problem
https://www.theatlantic.com/technology/archive/2019/03/what-happens-when-you-
find-cameras-your-airbnb/585007
● Security Planner https://www.securityplanner.org
● The Motherboard Guide to Sexting Securely
https://vice.com/en_us/article/mb3nd4/how-to-sext-securely-safely-what-apps-to-u
se-sexting
● Safer Nudes https://codingrights.org/4
● All About Sexting [For teenagers]
https://www.plannedparenthood.org/learn/teens/bullying-safety-privacy/all-about-s
exting
● Hey Friend! https://www.takebackthetech.net/know-more/heyfriend
| Section 4: Useful resources and recommended reading
● “Revenge Porn”: The Understanding and Impact of Non-Consensual Intimate
Images (NCII) Violence https://impakter.com/author/sandra-aceng
● Decolonising emotional well-being and mental health in development: African
feminist innovations
https://policy-practice.oxfam.org.uk/publications/decolonising-emotional-well-bein
g-and-mental-health-in-development-african-femi-620960
● Self and Collective Care
http://preventgbvafrica.org/wp-content/uploads/2019/01/Self-and-Collective-Care.pdf
● How to Provide Psychological First Aid emergencies
https://soundcloud.com/user-425988972/how-to-provide-psychological-first-aid-in-
emergencies

More Related Content

PDF
Holistic security strategies to address non consensual intimate images
PDF
Cyber Surveillance - Honors English 1 Presentation
PDF
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
PDF
OSINT 2.0 - Past, present and future
PDF
CyberTerrorism - Security in Cyberspace
PDF
National Cybersecurity - Roadmap and Action Plan
PDF
UN Singapore Cyber Programme 15 july19
PDF
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...
Holistic security strategies to address non consensual intimate images
Cyber Surveillance - Honors English 1 Presentation
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
OSINT 2.0 - Past, present and future
CyberTerrorism - Security in Cyberspace
National Cybersecurity - Roadmap and Action Plan
UN Singapore Cyber Programme 15 july19
Mei NELSON - Hacking and Trolling: The Changing Face of Hacktivism in the Dis...

Similar to Holistic security strategies to address non-consensual intimate imagery (20)

PPTX
Gender Equality: Realities in Lieu of UN Sustainable Development Goals
PPTX
NETS5003 Policy Primer: Cyber harassment
PPTX
digital / cyber powerpoint presentation with examples
PPSX
Cyberspace ncbi 2012
PPT
Sexual solicitation and harassment on the Internet and the mental health of y...
PDF
Technology and vulnerable users tink palmer (1)
PPT
2014 MC102 sexual harassment
PDF
Online Safety for Learners
PPTX
Sexual Harassment in the Workplace: Breaking the Silence
PDF
sexting as a tool for victimisation.pdf
PDF
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
PPT
E safety training ~ what ofsted are looking for by stephen carrick-davies
PPTX
Confronting Online Child Sexual Abuse and Exploitation
PPTX
Oula 9 a
PDF
Digital Citizenship Symposium - Slide Compilation
PDF
8th Milestones meeting: Cyber violence roundtable
PDF
Case study tackling violence against girls in egypt
Gender Equality: Realities in Lieu of UN Sustainable Development Goals
NETS5003 Policy Primer: Cyber harassment
digital / cyber powerpoint presentation with examples
Cyberspace ncbi 2012
Sexual solicitation and harassment on the Internet and the mental health of y...
Technology and vulnerable users tink palmer (1)
2014 MC102 sexual harassment
Online Safety for Learners
Sexual Harassment in the Workplace: Breaking the Silence
sexting as a tool for victimisation.pdf
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
E safety training ~ what ofsted are looking for by stephen carrick-davies
Confronting Online Child Sexual Abuse and Exploitation
Oula 9 a
Digital Citizenship Symposium - Slide Compilation
8th Milestones meeting: Cyber violence roundtable
Case study tackling violence against girls in egypt
Ad

More from Rohini Lakshané (13)

PDF
Digital surveillance for covid 19 and its implications for security and privacy
PDF
Of Sieges and Shutdowns
PDF
Lessons from creating a diversity toolkit
PDF
Non-consensual intimate imagery in India
PDF
Making crowdmaps effectual for mapping violence against women
PDF
Exploring open hardware in mass produced mobile phones
PDF
Gender gap in the global south: Lessons from policy-making and outreach
PDF
Patent landscaping in the sub-$100 mobile device market in India
PDF
Competition policy and the internet
PDF
Mobile phone standards operational in India and their patent licensing arrang...
PDF
Designing technology for diversity and inclusion
PDF
The WhatsApp economy
PDF
The art of community review
Digital surveillance for covid 19 and its implications for security and privacy
Of Sieges and Shutdowns
Lessons from creating a diversity toolkit
Non-consensual intimate imagery in India
Making crowdmaps effectual for mapping violence against women
Exploring open hardware in mass produced mobile phones
Gender gap in the global south: Lessons from policy-making and outreach
Patent landscaping in the sub-$100 mobile device market in India
Competition policy and the internet
Mobile phone standards operational in India and their patent licensing arrang...
Designing technology for diversity and inclusion
The WhatsApp economy
The art of community review
Ad

Recently uploaded (20)

PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PPT
250152213-Excitation-SystemWERRT (1).ppt
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PDF
Containerization lab dddddddddddddddmanual.pdf
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PDF
Exploring The Internet Of Things(IOT).ppt
PPTX
Artificial_Intelligence_Basics use in our daily life
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PPTX
The-Importance-of-School-Sanitation.pptx
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PPTX
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
PDF
Course Overview and Agenda cloud security
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
250152213-Excitation-SystemWERRT (1).ppt
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
AI_Cyberattack_Solutions AI AI AI AI .pptx
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
Containerization lab dddddddddddddddmanual.pdf
Alethe Consulting Corporate Profile and Solution Aproach
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
Exploring The Internet Of Things(IOT).ppt
Artificial_Intelligence_Basics use in our daily life
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
The-Importance-of-School-Sanitation.pptx
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
Course Overview and Agenda cloud security
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf

Holistic security strategies to address non-consensual intimate imagery

  • 2. Holistic security strategies to address non-consensual intimate images (NCII) 11:00 GMT Breakout Session
  • 3. Lead discussants Peace Olive Amuge, Program Manager, Information Sharing and Networking, WOUGNET (Women of Uganda Network) Sandra Aceng, Program Officer, Gender and ICT Policy Advocacy, WOUGNET Patricia Nyasuna, Program Officer, Gender and ICT Program, WOUGNET Session Facilitator Rohini Lakshané, Director (Emerging Research), The Bachchao Project
  • 4. Section 1 NCII: Context and background
  • 5. Non-consensual intimate images (NCII) are defined as the distribution of sexually explicit images or videos that were initially shared with the expectation that they would remain private.  “Revenge porn” is a misnomer. Holistic security is an attempt to integrate these concepts [digital, physical and legal security, psychosocial wellbeing, and organisational security] and highlight their inter-relatedness so that we can approach these processes in a more connected and meaningful way. (Source: HURIDOCS https://bit.ly/35ku0hg) Section 1: NCII: Context and background
  • 6. Changes in the law, policy, and social norms are necessary, but they will take time to come into effect. Additionally, new threats such as stalkerware and spouseware have been emerging. The only immediate recourse currently available for most sub-Saharan girls, women, queer and non-binary persons is to practice good digital security in order to recognize and prevent potential incidents of NCII. Section 1: NCII: Context and background
  • 8. ● Physical ● Digital ● Psychosocial Section 2: Holistic security strategies and measures
  • 10. Section 4 Useful resources and recommended reading
  • 11. | Section 4: Useful resources and recommended reading ● How to find a hidden camera in an Airbnb https://www.youtube.com/watch?v=N88G1Pp8Qvs ● Airbnb has a hidden camera problem https://www.theatlantic.com/technology/archive/2019/03/what-happens-when-you- find-cameras-your-airbnb/585007 ● Security Planner https://www.securityplanner.org ● The Motherboard Guide to Sexting Securely https://vice.com/en_us/article/mb3nd4/how-to-sext-securely-safely-what-apps-to-u se-sexting ● Safer Nudes https://codingrights.org/4 ● All About Sexting [For teenagers] https://www.plannedparenthood.org/learn/teens/bullying-safety-privacy/all-about-s exting ● Hey Friend! https://www.takebackthetech.net/know-more/heyfriend
  • 12. | Section 4: Useful resources and recommended reading ● “Revenge Porn”: The Understanding and Impact of Non-Consensual Intimate Images (NCII) Violence https://impakter.com/author/sandra-aceng ● Decolonising emotional well-being and mental health in development: African feminist innovations https://policy-practice.oxfam.org.uk/publications/decolonising-emotional-well-bein g-and-mental-health-in-development-african-femi-620960 ● Self and Collective Care http://preventgbvafrica.org/wp-content/uploads/2019/01/Self-and-Collective-Care.pdf ● How to Provide Psychological First Aid emergencies https://soundcloud.com/user-425988972/how-to-provide-psychological-first-aid-in- emergencies