Planning Security Risk Management Strategies and Systems
Planning Security Risk Management Strategies and Systems
Toolkit: Strategies
Security Risk
Management Planning
Note to Learners
The information in this guide is for educational purposes only; it is not intended to be a substitute
for professional or specialist security advice. Any reliance you place on such information is
therefore at your own risk and the European Interagency Security Forum (EISF) will have no
responsibility or liability under any circumstances.
Risk Assessment
Security Strategies
Security Plan
NGO Security Coordination
WITHIN FIRST
Support
Security Evacuation
ONGOING
Risk Assessment
Consider these key questions to guide your security risk assessment:
• What are the threats you face?
• What are the vulnerabilities of your organization and staff to those threats? What are the
risks to staff members with minority profiles?
• What is the probability and impact of risks?
Security Plan
A security plan is:
• A simple document to provide guidance for safe daily work.
• An inclusive plan, created with a representation of all staff, roles, and profiles.
Contingency Plans
Determine how management and staff should respond to anticipated situations.
Facility Security
Identify and mitigate the threats, vulnerabilities, and risks to all property, including offices,
compounds, and facilities, used by your organization.
Travel Safety
Establish procedures for safe travel management at airports and when using vehicles/
transportation within and between countries.
Decision to start
a new project / work in a What threats will we face?
new region Risk Assessment
NO
Residual risk
Management Decision:
YES Are we willing to accept NO
the risks?
What funding,
equipment and training
do we need?
Risk Management
How Measures
will we monitor and
adapt for change? Design and implement program
Duty of Care
• Duty of Care is the legal and moral obligation of an organization to take all possible
measures to reduce the risk of harm to those working for or operating on behalf of an
organization.
• Duty of care applies to all organizations employing staff in challenging environments.
This includes employees, volunteers, interns, contractors (such as guards or drivers), and
implementing partner organizations (although the level of duty of care required may be
different).
• Organizations, including senior managers and directors on an individual basis, can be sued
in many jurisdictions for negligence in their duty of care.
Incident Mapping
An important factor to monitoring the changing nature of threats in the operational environment
is to identify indicators of change. One of the simplest and best methods for monitoring
change is incident mapping. This may involve:
• Determine what contextual developments can and should be monitored to give early warning
of the changes that can have an impact on the risks faced by the organization.
• Include ‘near misses’ and incidents that have occurred within your operating environment
but have not specifically affected your organization.
• Develop strong and easily accessible reporting mechanisms to monitor internal threats and
facilitate reporting of concerns and incidents.
• Track when and where incidents occur, including time of day, who was targeted, and the
consequences, in order to determine if and when the situation is improving or deteriorating.
For example, you can use a map with differently colored pins to represent each type
of incident and/or who was involved (your organization, another NGO, the UN, partner
organization, local NGO).
Security Strategies
There are three main security strategies used by humanitarian aid organizations in all contexts:
acceptance, protection, and deterrence. International and national aid organizations often prioritize
an acceptance strategy as their preferred approach; however, this takes time to develop, and
organizations deploying to new areas should not assume they will have the acceptance of the
community from the start. In this case, organizations may initially focus on protection and deterrence
measures until acceptance has been developed, keeping in mind that all employee behaviors and
actions will impact efforts to building acceptance.
Acceptance
Protection Deterrence
Acceptance
Reducing the risk by changing the threat.
Example: Building a safe operating environment through consent, approval, and cooperation
from all local stakeholders, including individuals, communities, and local authorities.
Deterrence
Reducing the risk by containing the threat with a counter threat.
Example: Armed protection, diplomatic/political leverage, temporary suspension
Understand that acceptance has to be earned and can be lost very easily. The behavior of one
responder can affect the whole community.
Build acceptance not only within the communities in which your organization works, but with all
its stakeholders.
Approach acceptance proactively. Ensure key stakeholders are engaged before commencing
any work.
Create an actor map to identify which stakeholders may be affected by your organization’s
programs and what allies it may have in developing acceptance with other stakeholders.
Remember that stakeholders obtain information from other sources, not only from your
organization and local staff.
Be clear about your organization’s mission, background, priorities, funding sources, and how
programs are developed.
Keep messages to communities and local authorities consistent with the information on your
organization’s website and social media channels.
Be aware of how your organization and its staff will be perceived. Understand the partners you
are working with, how they are perceived, and what impact your relationship will have on your
acceptance and theirs.
Have a rigorous complaints system and a clear process to follow-up and take action on
concerns.
Do not isolate your staff from communities. Stay visible and accessible.
Provide training and regular updates on security measures to staff, including the “why” as well
as the “what”.
Ensure protection procedures are appropriate to the context. Measures that are too strict can be
just as ineffective as those that are too lenient.
Identify the different vulnerabilities of staff and ensure that measures reflect the needs of
individual profile types, including hidden as well as visible characteristics.
Give security measure briefings as part of orientation for all new employees, both local and
international staff.
Ensure that compounds and other offices or working spaces blend in with the buildings in the
vicinity. The physical protection of buildings, compounds, and/or distributing sites should not
make it appear as if the organization is building a bunker or a fort.
Use the best communications systems that are available and affordable for your organization
(radio, internet, mobile, landline, satellite, fax, informal couriers). Do not rely only on one
communication method.
Be cautious when withdrawing services from an insecure area. Your organization must first
ensure that local governments and donor agreements are not compromised.
Avoid armed guards, military, or police escort where possible. They will often make acceptance
impossible or very difficult – even at a later stage. They may also increase the risks of extortion,
harassment, or injuries from crossfire.
Understand how all organizations are different, not only in their mission and programs, but also
in their vulnerabilities and capacity to respond to incidents. Implementing a particular strategy
used by another organization does not mean it will work for your organization, even if you are
working in the same context.
In an emergency or crisis situation, the safety of organizational staff and beneficiary communities will
depend on your ability to make decisions and activate contingency plans. Use this simple grid to assess
the validity of information (and its source) your organization may receive.
Trusted,
reliable Good information for Consider information and
source decision-making seek confirmation
Unknown
or Seek confirmation from Do not disregard but
unreliable known source do not make decisions
source without another source
Source Information
• Completely reliable • Confirmed
1 A
• No doubt about the source’s authenticity, • Logical
trustworthiness, or competency • Consistent with other relevant
• History of complete reliability information
2 B
• Minor doubts • Logical
• History of mostly valid information • Consistent with other relevant
information
3 • Doubts
• Provided valid information in the past C • Reasonably logical
• Consistent with some relevant
information
4 • Significant doubts
• Provided invalid information in the past D • Not logical but possible
• No other information on the subject
• Unreliable • Improbable