{"id":2330,"date":"2022-11-19T13:48:45","date_gmt":"2022-11-19T17:48:45","guid":{"rendered":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/?post_type=resource&#038;p=2330"},"modified":"2022-11-19T13:48:45","modified_gmt":"2022-11-19T17:48:45","slug":"online-protection-and-digital-security-user-guide-for-human-rights-defenders","status":"publish","type":"resource","link":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/","title":{"rendered":"Online Protection and Digital Security: User Guide for Human Rights Defenders"},"content":{"rendered":"<p>In Iraq, human rights defenders increasingly rely on digital technology to monitor and advocate for human rights or to share their opinions, promote debate and mobilize. Nonetheless, malicious actors have also used these online platforms to threaten, intimidate and harass activists.<\/p>\n<p>The Human Rights Office of the United Nations Assistance Mission for Iraq (UNAMI HRO), in partnership with INSM for Digital Rights in Iraq, produced &#8220;Online Protection and Digital Security: User Guide for Human Rights Defenders&#8221; to offer critical knowledge about concrete tools and strategies for human rights defenders and other activists as well as journalists to increase their safety and privacy online. It provides individual users of digital technology in Iraq with practical information on how to mitigate online risks, protect their privacy and data, and preserve their rights and freedoms online.<\/p>\n","protected":false},"featured_media":2332,"template":"","tags":[243,346,234,345],"themes":[65,60],"types":[81,80],"languages":[8],"class_list":["post-2330","resource","type-resource","status-publish","has-post-thumbnail","hentry","tag-iraq","tag-digital-security","tag-human-rights","tag-online-protection","themes-data-security","themes-human-rights","types-guidelines","types-tools-and-templates","languages-lang-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Online Protection and Digital Security: User Guide for Human Rights Defenders - Search for Common Ground<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Online Protection and Digital Security: User Guide for Human Rights Defenders - Search for Common Ground\" \/>\n<meta property=\"og:description\" content=\"In Iraq, human rights defenders increasingly rely on digital technology to monitor and advocate for human rights or to share their opinions, promote debate and mobilize. Nonetheless, malicious actors have &hellip; Continue reading &quot;Online Protection and Digital Security: User Guide for Human Rights Defenders&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/\" \/>\n<meta property=\"og:site_name\" content=\"Search for Common Ground\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-19-at-20.40.52.png\" \/>\n\t<meta property=\"og:image:width\" content=\"803\" \/>\n\t<meta property=\"og:image:height\" content=\"1144\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 \u062f\u0642\u064a\u0642\u0629\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/\",\"url\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/\",\"name\":\"Online Protection and Digital Security: User Guide for Human Rights Defenders - Search for Common Ground\",\"isPartOf\":{\"@id\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-19-at-20.40.52.png\",\"datePublished\":\"2022-11-19T17:48:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#primaryimage\",\"url\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-19-at-20.40.52.png\",\"contentUrl\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-19-at-20.40.52.png\",\"width\":803,\"height\":1144},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0627\u0644\u0645\u0635\u0627\u062f\u0631\",\"item\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Online Protection and Digital Security: User Guide for Human Rights Defenders\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/#website\",\"url\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/\",\"name\":\"Search for Common Ground\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Online Protection and Digital Security: User Guide for Human Rights Defenders - Search for Common Ground","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/","og_locale":"ar_AR","og_type":"article","og_title":"Online Protection and Digital Security: User Guide for Human Rights Defenders - Search for Common Ground","og_description":"In Iraq, human rights defenders increasingly rely on digital technology to monitor and advocate for human rights or to share their opinions, promote debate and mobilize. Nonetheless, malicious actors have &hellip; Continue reading \"Online Protection and Digital Security: User Guide for Human Rights Defenders\"","og_url":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/","og_site_name":"Search for Common Ground","og_image":[{"width":803,"height":1144,"url":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-19-at-20.40.52.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"1 \u062f\u0642\u064a\u0642\u0629"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/","url":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/","name":"Online Protection and Digital Security: User Guide for Human Rights Defenders - Search for Common Ground","isPartOf":{"@id":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#primaryimage"},"image":{"@id":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#primaryimage"},"thumbnailUrl":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-19-at-20.40.52.png","datePublished":"2022-11-19T17:48:45+00:00","breadcrumb":{"@id":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#primaryimage","url":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-19-at-20.40.52.png","contentUrl":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-19-at-20.40.52.png","width":803,"height":1144},{"@type":"BreadcrumbList","@id":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0627\u0644\u0645\u0635\u0627\u062f\u0631","item":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/resource\/"},{"@type":"ListItem","position":2,"name":"Online Protection and Digital Security: User Guide for Human Rights Defenders"}]},{"@type":"WebSite","@id":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/#website","url":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/","name":"Search for Common Ground","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"}]}},"_links":{"self":[{"href":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/wp-json\/wp\/v2\/resource\/2330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/wp-json\/wp\/v2\/types\/resource"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/wp-json\/wp\/v2\/media\/2332"}],"wp:attachment":[{"href":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/wp-json\/wp\/v2\/media?parent=2330"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/wp-json\/wp\/v2\/tags?post=2330"},{"taxonomy":"themes","embeddable":true,"href":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/wp-json\/wp\/v2\/themes?post=2330"},{"taxonomy":"types","embeddable":true,"href":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/wp-json\/wp\/v2\/types?post=2330"},{"taxonomy":"languages","embeddable":true,"href":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ar\/wp-json\/wp\/v2\/languages?post=2330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}