{"id":2330,"date":"2022-11-19T13:48:45","date_gmt":"2022-11-19T17:48:45","guid":{"rendered":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/?post_type=resource&#038;p=2330"},"modified":"2022-11-19T13:48:45","modified_gmt":"2022-11-19T17:48:45","slug":"online-protection-and-digital-security-user-guide-for-human-rights-defenders","status":"publish","type":"resource","link":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/","title":{"rendered":"Online Protection and Digital Security: User Guide for Human Rights Defenders"},"content":{"rendered":"<p>In Iraq, human rights defenders increasingly rely on digital technology to monitor and advocate for human rights or to share their opinions, promote debate and mobilize. Nonetheless, malicious actors have also used these online platforms to threaten, intimidate and harass activists.<\/p>\n<p>The Human Rights Office of the United Nations Assistance Mission for Iraq (UNAMI HRO), in partnership with INSM for Digital Rights in Iraq, produced &#8220;Online Protection and Digital Security: User Guide for Human Rights Defenders&#8221; to offer critical knowledge about concrete tools and strategies for human rights defenders and other activists as well as journalists to increase their safety and privacy online. It provides individual users of digital technology in Iraq with practical information on how to mitigate online risks, protect their privacy and data, and preserve their rights and freedoms online.<\/p>\n","protected":false},"featured_media":2332,"template":"","tags":[243,346,234,345],"themes":[65,60],"types":[81,80],"languages":[8],"class_list":["post-2330","resource","type-resource","status-publish","has-post-thumbnail","hentry","tag-iraq","tag-digital-security","tag-human-rights","tag-online-protection","themes-data-security","themes-human-rights","types-guidelines","types-tools-and-templates","languages-lang-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Online Protection and Digital Security: User Guide for Human Rights Defenders - Iraqi Knowledge Sharing Platform<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Online Protection and Digital Security: User Guide for Human Rights Defenders - Iraqi Knowledge Sharing Platform\" \/>\n<meta property=\"og:description\" content=\"In Iraq, human rights defenders increasingly rely on digital technology to monitor and advocate for human rights or to share their opinions, promote debate and mobilize. Nonetheless, malicious actors have &hellip; Continue reading &quot;Online Protection and Digital Security: User Guide for Human Rights Defenders&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/\" \/>\n<meta property=\"og:site_name\" content=\"Iraqi Knowledge Sharing Platform\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-19-at-20.40.52.png\" \/>\n\t<meta property=\"og:image:width\" content=\"803\" \/>\n\t<meta property=\"og:image:height\" content=\"1144\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 \u062e\u0648\u0644\u06d5\u06a9\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/\",\"url\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/\",\"name\":\"Online Protection and Digital Security: User Guide for Human Rights Defenders - Iraqi Knowledge Sharing Platform\",\"isPartOf\":{\"@id\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-19-at-20.40.52.png\",\"datePublished\":\"2022-11-19T17:48:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#breadcrumb\"},\"inLanguage\":\"ckb\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ckb\",\"@id\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#primaryimage\",\"url\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-19-at-20.40.52.png\",\"contentUrl\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-19-at-20.40.52.png\",\"width\":803,\"height\":1144},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0633\u06d5\u0631\u0686\u0627\u0648\u06d5\u06a9\u0627\u0646\",\"item\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Online Protection and Digital Security: User Guide for Human Rights Defenders\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/#website\",\"url\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/\",\"name\":\"Iraqi Knowledge Sharing Platform\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ckb\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Online Protection and Digital Security: User Guide for Human Rights Defenders - Iraqi Knowledge Sharing Platform","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/","og_locale":"en_US","og_type":"article","og_title":"Online Protection and Digital Security: User Guide for Human Rights Defenders - Iraqi Knowledge Sharing Platform","og_description":"In Iraq, human rights defenders increasingly rely on digital technology to monitor and advocate for human rights or to share their opinions, promote debate and mobilize. Nonetheless, malicious actors have &hellip; Continue reading \"Online Protection and Digital Security: User Guide for Human Rights Defenders\"","og_url":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/","og_site_name":"Iraqi Knowledge Sharing Platform","og_image":[{"width":803,"height":1144,"url":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-19-at-20.40.52.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 \u062e\u0648\u0644\u06d5\u06a9"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/","url":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/","name":"Online Protection and Digital Security: User Guide for Human Rights Defenders - Iraqi Knowledge Sharing Platform","isPartOf":{"@id":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#primaryimage"},"image":{"@id":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#primaryimage"},"thumbnailUrl":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-19-at-20.40.52.png","datePublished":"2022-11-19T17:48:45+00:00","breadcrumb":{"@id":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#breadcrumb"},"inLanguage":"ckb","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/"]}]},{"@type":"ImageObject","inLanguage":"ckb","@id":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#primaryimage","url":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-19-at-20.40.52.png","contentUrl":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/wp-content\/uploads\/2022\/11\/Screenshot-2022-11-19-at-20.40.52.png","width":803,"height":1144},{"@type":"BreadcrumbList","@id":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/online-protection-and-digital-security-user-guide-for-human-rights-defenders\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0633\u06d5\u0631\u0686\u0627\u0648\u06d5\u06a9\u0627\u0646","item":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/resource\/"},{"@type":"ListItem","position":2,"name":"Online Protection and Digital Security: User Guide for Human Rights Defenders"}]},{"@type":"WebSite","@id":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/#website","url":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/","name":"Iraqi Knowledge Sharing Platform","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ckb"}]}},"_links":{"self":[{"href":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/wp-json\/wp\/v2\/resource\/2330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/wp-json\/wp\/v2\/types\/resource"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/wp-json\/wp\/v2\/media\/2332"}],"wp:attachment":[{"href":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/wp-json\/wp\/v2\/media?parent=2330"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/wp-json\/wp\/v2\/tags?post=2330"},{"taxonomy":"themes","embeddable":true,"href":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/wp-json\/wp\/v2\/themes?post=2330"},{"taxonomy":"types","embeddable":true,"href":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/wp-json\/wp\/v2\/types?post=2330"},{"taxonomy":"languages","embeddable":true,"href":"https:\/\/cnxus.org\/the-iraqi-knowledge-sharing-platform\/ku\/wp-json\/wp\/v2\/languages?post=2330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}