This guide provides standards and directions on how to carry out rapid needs assessment for Psychosocial Support (PSS) and Violence Prevention (VP) initiatives including child protection and sexual and gender-based violence. In particular, this rapid assessment tool is designed to help gather data i...n an efficient and effective way to help inform integration of PSS and VP issues, as minimum standards, into the broader disaster management action plans in response to an emergency.
more
Women and girls with mental and intellectual disabilities were perceived to be most at risk of sexual violence, and family and service providers may only become aware of sexual violence against them when they become pregnant.
Discrimination by GBV service providers, family and community members was... the most common barrier to access. Inadequate transportation and inappropriate communication approaches were also common impediments.
On this website you can download the report in different languages,
more
Prioritise education in conflict-affected areas:
Across the world 28 million1 primary school-age children living in conflict-affected countries are
out-of-school, and they form half of the world’s total out-of-school population. During conflict,
infrastructure assets such as schools are damaged... or completely destroyed during fighting. Children
may choose to stay away from school due to their and their family’s safety fears in the midst of
conflict, or the need to supplement their family’s income amidst conflict-related financial loss.
Children who are internally displaced by conflict face a particularly challenging task accessing
education due to the specific conditions created by their displacement, such as loss of livelihoods
making school fees hard to find, and discrimination from host communities. Children caught in
conflict are being deprived of their right to education2 and denied the opportunity to benefit from the
protective and life-sustaining mechanisms of education.
more
Annex I to: To stay and deliver, good practice for humanitarians in complex security environments
The principal findings of the report include that despite overall improvements in aid agencies’ security risk management, national aid workers perceive continued inequities in security suppor...t compared with their international counterparts. National aid workers, while less subject to major attacks per capita than international aid workers, nevertheless form the majority of victims, and their specific security needs require more attention.
more
Section One
summarizes UNHCR’s mandate of international protecdtion and the aim and principles of emergency
response;
Section Two
deals with emergency management;
Section Three
covers the vital sectors and problem areas in refugee emergencies, including health, food, sanitation
and water, a...s well as key field activities underpinning the operations such as logistics, community
services and registration. The chapters in this section start with a summary so that readers, who
might not need the full level of detail in each of these chapters, can understand the basic principles of
the subject quickly;
Section Four
gives guidance on the support to field operations, primarily administration and staffing;
The Appendices
include a “Toolbox” which gathers, in one location, the standards, indicators and useful references
used throughout the handbook;
more
A summary of what we know
This Guidance Note is meant to help protection cluster coordinators apply nexus approaches in a practical way by, providing concrete steps and means to address prevalent or longstanding protection issues, risk patterns, trends and chronic vulnerabilities. The guidance calls for a practical, problem-...solving approach that seeks opportunities to identify and collaborate with actors beyond the humanitarian sphere to address deep-rooted protection issues
more
AidData has developed a set of open source data collection methods to track project-level data on suppliers of official finance who do not participate in global reporting systems. This codebook outlines the version 1.1 set of TUFF procedures that have been developed, tested, refined, and implemented... by AidData researchers and affiliated faculty at the College of William & Mary and Brigham Young University.
In the first iteration of this codebook, AidData's Media-Based Data Collection Methodology, Version 1.0, we referred to our data collection procedures as a “media-based data collection” (MBDC) methodology. The term “media-based” was misleading, as the methodology does not rely exclusively on media reports; rather, media reports are used only as a departure point, and are supplemented with case studies undertaken by scholars and non-governmental organizations, project inventories supplied through Chinese embassy websites, and grants and loan data published by recipient governments. In the interest of providing greater clarity, we now refer to our methodology for systematically gathering open source development finance information as the Tracking Underreported Financial Flows (TUFF) methodology. This codebook outlines the set of TUFF procedures that have been developed, tested, refined, and implemented by AidData staff and affiliated faculty at the College of William & Mary and Brigham Young University.
more
Gender-based violence, including rape is a problem throughout the world, occurring in every society, country and region. Refugees and internally displaced people are particularly at risk of this violation during every phase of an emergency situation. The systematic use of sexual violence as a method... of warfare is well documented and constitutes a grave breach of international humanitarian law.
The Arabic Version can be downloaded here: http://reliefweb.int/report/syrian-arab-republic/guidelines-health-staff-caring-gender-based-violence-survivors-including
more
Gender-based Violence Area of Responsibility Working Group July 2010
IAEA Safety Standards for protecting people and the environment