Protection and security
Last updated
Was this helpful?
Last updated
Was this helpful?
Protection products are those that focus on vulnerable groups within the affected population, typically focusing on one or more of the four Areas of Responsibility (AoRs) with the Protection Cluster: Child Protection (CP), Gender-Based Violence (GBV), Mine Action (MA), or Housing, Land and Property (HLP). Security products typically report on incidents that have occurred, and may also show plans such as evacuation routes. Due to the sensitive nature of what this information may show, both protection and security products should be published and shared cautiously. In many cases they may only be shared within an organisation. Products referencing GBV themes are often pertinent to Child Protection actors (and vice versa) - there is often no clear thematic delineation nor a delineation in responsibility between the AoRs, so it is important to engage with all relevant AoRs.
Both.
Baseline and situational.
Protection products can be produced at any point. This is particularly the case during complex emergencies or in areas where there has been underlying tension in the past, i.e. areas that have a history of conflict. Demining programmes may occur during or immediately after the event, although these programmes will often be long term and therefore product updates may carry on longer too.
When publishing analysis, consider whether it is appropriate for it to be out in the public domain. Refer to the GPC website, consider the level of detail they make publicly available on their national/event responses to provide a steer. If in doubt, ask your Protection partners what the release conditions are - much of the work will be shareable on a need-to-know basis only.
Anyone responsible for the protection of vulnerable groups, particularly Child Protection and victims of Gender-Based Violence. Anyone involved with demining activity. Agency security officers who need to know where incidents may have occurred. IDP camp planners who may wish to allocate specific areas or specific resources to different groups based on their needs.
If there are no obvious Protection actors engaging in a response, consider that staff from other clusters work on protection themes but may not consider themselves as protection actors. Share Protection related outputs with them as relevant. Also note that many Protection interventions are run joinly with other clusters. The table below lists Protection themes that concern other clusters.
Education
All education interventions have Child Protection considerations. Child referrals to the Protection services often come from Education sector actors. Are schools being used as shelters? Have temporary learning centres been set up?
Health
Referrals to Protection services often come from Health sector actors and service providers.
Food Insecurity
The CP and GBV AoRs consider food insecurity interventions to simultaneously be Protection interventions. Food insecurity is a common outcome following rapid onset disasters, and can lead to negative coping mechanisms such as child labour, child marriage or sex work to enable families to feed themselves. Food insecurity interventions therefore act as critical Protection interventions.
WASH
The proximity of latrines and bathing facilities to shelters has a bearing on Protection outcomes.
Shelter
Where are the gaps in shelters across the affected population?Female-headed households (FHH) may benefit from targetted support.
The mapping of any reported incident or issue should highlight either broad areas of concern or hot spots where there may be groups of vulnerable people. In some cases this may lead to the need to evacuate vulnerable groups from the area. Cross-referenced with other information, it might be possible to address the problem by providing the appropriate aid. Anyone responsible for demining activity, this may lead to the evacuation of the local community where explosive remnants of war (ERW) may be scattered. If there are known minefields these will be shown as ‘no go areas’, with advice to avoid them.
Caution may need to be taken, particularly when publishing products on protection, as it is possible to aggravate already sensitive situations. It is sensible to use anonymous or data aggregated to a suitable level to mitigate this.
With security mapping, particularly relating to conflict, any maps representing land held should be represented as clearly as possible, particularly areas close to borders that are being fought over or areas that change hands frequently. To show the intensity of incidents, heat mapping is a good way of representing centres of activity. These maps also have a temporal element to them and lend themselves to animation too. Organisational evacuation routes should never be shown publicly without prior consent, as this may lead to an organisation being left vulnerable.
Demining activities have detailed standard operating procedures for the physical removal or destruction of mines and explosive remnants of war. With this in mind there is often a significant buffer around a contaminated area, and these are marked using internationally recognisable symbols. Areas can be divided into sectors in a similar way to those of search and rescue activities, so that they can be systematically cleared. Any evacuation routes or rendezvous points should be mapped.
With regards to Child Protection, as with GBV, disaggregating population by age-sex gives Protection actors critical detail on the numbers of children (boys, girls, infants, babies), women and men in affected areas. This is important for the coordination of a wide range of Child Protection and GBV measures.
The Minimum Standards for Child Protection in Humanitarian Action states that ‘children' refers to any person under the age of 18. It is further subdivided into:
Babies and toddlers: ages 0-2 years
Pre-school age: ages 3-5
Early school age: ages 6-8
Pre-adolescence: ages 9-10
Early adolescence: ages 10-14
Middle adolescence: ages 15-17
The GBV Minimum Standards focus on ‘young adolescents’ (10-14) and ‘older adolescents’ (15-19), so adding a further age category will cover this:
Older adolescence: ages 18-19
Age disaggregation may not be this granular, work with what you have and mould into above categories where possible.
All work in the Protection sector should be handled with the utmost caution and sensitivity. When requesting data, consider whether you are asking for the appropriate level of data, and whether it is appropriate to even be asking. Under the heading What information & data can illustrate the presence of GBV risk? the GPC website states:
It is fundamental to assume that GBV is happening everywhere. It is under-reported worldwide, due to fears of stigma or retaliation, limited availability or accessibility of trusted service providers, impunity for perpetrators, and lack of awareness of the benefits of seeking care. Waiting for or seeking population-based data on the true magnitude of GBV should not be a priority due to safety and ethical challenges in collecting such data. With this in mind, all humanitarian actors should assume GBV is occurring and threatening affected populations; treat it as a serious and life-threatening problem; and take actions based on sector recommendations, regardless of the presence or absence of concrete ‘evidence’.
From a data perspective, it is therefore important to be realistic with what data is likely to be available.
All baseline population products should be age-sex disaggregated, and further disaggregated to include ethnicity, languages, etc where possible.
Needs Assessments give an important sense of Protection risks. From a CP perspective, any data regarding unaccompanied or separated children is valuable.
Consult the GPC Protection Risks Tracker to see if the affected region is listed as having protection risks. If so, bear these in mind (as per the Centrality of Protection) throughout the response, as many response themes may relate to the listed risks.
Armed Conflict Location and Event Data (ACLED) provides data on Protection risks including
Abduction, Kidnapping, Enforced Disappearance, Arbitrary or Unlawful Arrest and/or Detention
Attacks on Civilians and other Unlawful Killings, and Attacks on Civilian Objects
Gender-Based Violence
Displacement Tracking Matrix (DTM)
Migrants are often a marginalised people, particularly in rapid onset disaster situations. Migrants (some of which will be children) have many of the same Protection needs as local communities, but can find access to relief provisions challenging for a variety of reasons. The DTM dataset allows us to shine a light on their needs by referring to DTM baseline and situational data. To access DTM datasets: click on the above link > click on country of interest in map > Datasets, the datasets will be presented with the latest first.
Baseline data: check the latest Migrants Baseline Assessments for the affected country. Data exists on number of migrants disaggregated by admin area, but also by age, sex, status, priority needs, length of displacement, and so on. These provide valuable baseline data when a rapid onset disaster occurs.
Site Assessments are undertaken typically some months following a disaster, these can be reviewed to get an idea of what the key Protection needs may be in a new response. Some of these datasets need to be requested.
Rapid Displacement Tracking Datasets track the number of individuals and households who experience displacement over a given period.
The Global Database of Events, Language and Tone (GDELT) event database monitors print, broadcast, and web news media in over 100 languages from across every country in the world to keep continually updated on breaking developments anywhere on the planet. Its historical archives stretch back to January 1, 1979 and update every 15 minutes. Through its ability to leverage the world's collective news media, GDELT moves beyond the focus of the Western media towards a far more global perspective on what's happening and how the world is feeling about it.
The Uppsala Conflict Data Program (UCDP) is the world’s main provider of data on organized violence and the oldest ongoing data collection project for civil war, with a history of almost 40 years. Its definition of armed conflict has become the global standard of how conflicts are systematically defined and studied.