 Hi, and thank you. My name is Jovey Gettemezian. I head the Innovation Service for UNITCR, very pleased to be with you today. I am also supposed to be the timekeeper, but I have a backup timekeeper that told me already that we're late. And so I have to rush through this. So wanted to welcome everyone. I guess I was picked for this role. Also because we at the Innovation Service are exploring the topic of digitizing access, looking at the opportunities and the risks, making sure that the communities we serve are included and they're at the center of the process of digitizing that many organizations are going through. So very excited to be with you today. It's going to be fun. As was said earlier, we have some questions for you. We want your feedback and participation, a really cool bunch of presenters. We do have some colleagues who are in Ukraine who might have some difficulties given the current situation there. We need to be mindful if there are any issues that arise. And without further delay, I want to give the floor now to the famous DJ and our opener for the ceremony, Mr. Sam Chong. Thank you, my dear friend, and very delighted on behalf of the Global Protection Cluster in all of our areas of responsibility to open today's session with some framing remarks on digitizing access opportunities and risks. Once again, very, very fortunate also to have with us a very exciting panel discussion with colleagues from ICRC, IRC and noted partners of the Ukraine Protection Cluster and want to give a shout out to Rokata and Right to Protection. And of course, of course, very ably moderated by our Innovation Service Hobiex. Thank you very much also for making the time and participating in this day four of the Global Protection Forum. We're looking forward in this session to exploring some of the tools approaches and considerations to protection in the digital sphere. In my remarks at the opening ceremony of this Global Protection Forum, we dove into some of the reasons behind we pick this as the theme for this year, which is on access that protects. And we discussed how we can how can we change the narrative on access, so that access is not only about getting trucks into geographic areas of coverage, but also about opening the space for conflict and crisis affected communities to be protected from human rights violations from violations of humanitarian law, and to access much needed protection services and responses. So changing this narrative on access, we must also consider and apply this in the sphere of the digital domain in terms of protection and what it means in the digital sphere. So certainly humanitarian agencies, whether UN NGOs, local partners, civil society, we are developing digital tools and remote services for conflict affected and displaced communities, who we cannot meet face to face and this obviously became much more real during the global pandemic. So we look forward in this session to learning more from our distinguished panel about their work about the positive impact that digital tools provide in crisis and humanitarian emergencies around the world. I think we've made great strides as a humanitarian community in, for example, communication with communities and affected populations, whether it be through digital applications humanitarian platforms, social media tools messaging applications, all of which enhance information sharing and access to protection services by crisis affected communities. At the same time, we're looking forward to learning from and considering some of the risks and challenges in this type of work, which differ from those in traditional face to face humanitarian programming. And I hope we can think hard about how to maximize these for protection outcomes, both in terms of risks in the design of the platforms but also in being ambitious in addressing protection threats and risks. Part of this understanding and being aware of the nature of protection risks and threats that occur in the digital sphere, whether they be causes and drivers or modalities that threaten or even modalities that can influence duty bearers and authorities. This is a new horizon in terms of how we look at access, how we as the protection community can best respond to these threats and risks through the digital sphere. Across the protection cluster, and in the protection community, we need awareness of we need familiarity and confidence in the opportunities but also the risks posed by the digital sphere. So what does that mean for the session today. Well, in addition to highlighting the impact of digital tools and technologies as a means of community engagement and access to or enabling access to protection services, increasing our awareness of the considerations and safeguards required around programming in this domain. I'd also like to challenge us to think what it means for access that protects. A couple questions for consideration throughout the session today. How can the digital sphere help us rethink what it means to have access that protects. Do these means, and these modalities of information and outreach. Do they mean that trucks delivering aid are no longer the driving narrative. How far can we use the digital sphere to provide not only information, but real protective services, or concrete protection interventions that mitigate or even remedy protection threats, and it's their impacts. How can the digital sphere reshape, for example, protection monitoring and advocacy, can it safely get us where we were previously unable to reach. Can it safely connect us with those most at risk of violations of international humanitarian or human rights law. Can it help us bring the story on the ground to the world, so that we can make impacts on the protection domain. Can we use digital tools to bring protection by presence. And in this we're talking about presence in the digital domain, are the protection threats risks and effects that are best handled digitally. And finally, can we use digital tools for humanitarian negotiation and diplomacy, our duty bearers authorities and others in the digital sphere. Others we can think of, in terms of the major stakeholders in this, can we influence their behavior toward a better protection outcome through these digital tools. So in all the learning first of all I want to give my tremendous thanks that for first of all for those who are here to share your experiences but also, and as importantly all those that are participating from around the world and in this global protection form. I want to challenge us all to first of all to be open to learn from one another, but also to look toward the horizon in terms of the opportunities, as well as the risks in the digital domain, but most importantly, how can we apply this how can we use this to actually to reach and fulfill our ambitions for better protection outcomes. So with those opening remarks, I hand back to you. Thank you very much. A number of very important questions that will inspire us through the day through the next few hours. I took note of some and I hope that we will find answers to your questions in the in the session. Without a further delay, I want to now give the floor to our first presenter from my CRCR colleague Romain. Romain you have 10 minutes, you will have to speak slowly because we do have live interpretation. And after the 10 minutes we will have some questions for you. So without further delay, Romain, the floor is yours. Okay, thank you. Thank you very much. I'm just trying to find, okay, thanks. I got my presentation. So, so we try to speak as slowly as I can. So basically I'm working for the ICRC. I've been working for the ICRC for the past 30 years. So it's quite a long time. So I'm not a digital native, as you can see, definitely not. So really my background was really on protections and working as coordinator of protections, visits to detainees, security detainees, prisons for war in Middle East and different countries, like Israel and occupied territories, also in former Yugoslavia before embracing would say digital digital transformation that ICRC needs. So we are really ICRC really face to face, I would say organization working on the ground and protecting trying to protect as much as we can I mean affected communities, but also providing specific services. So what we try to what we're trying to do now is to build a new digital emitting platform. And I will speak about the why the what and the security challenge is related to what we call red safe digital emitting platform of the ICRC I'm responsible of, which is really in a pilot phase is right now. So, maybe speaking about the why we saw that people are increasingly connected in the field. We saw that figures in some refugees resettlement in Africa close to nearly close to 90% of people have access to a phone. And this is quite an old data that we have. At the same time, there are also a new commercial actors appearing in you might in spaces and providing also services digital services. We saw the Google person find Earth following I mean high seas Craig but also in other, you know, in other contexts. And at the same times, we saw, for example, Facebook, launching is a Facebook safety safety space where people can inform would say France, is there a live following natural disaster and other organization like Refugee United. With this new actress I mean brings opportunities but at the same time risk I mean for the people because we know that the data that people are going to provide using this new services can be a can be a search for and people can be tracked and this this data can be used for other purposes and humanitarian ones. So, when I say I see try to see what kind of responses it has to make to digital transformation what does it mean digital transformation and providing digital services. One key value for the organization was really to work as a trusted manager of sensitive information in what is really I see Monday so conflict related and also also situation of violence, including migrations. So really working on digital proximity and trust as much as we can, and also having product with the high standards of data protection and data security at the same time. So that was the basis, which is the baseline for projects so when I speak about red safe, which is a new digital human platform which is right now in a pilot phase is really what we're trying to achieve to build is really a platform for people affected by conflict. And also you might in crisis so very ambitious in terms of in terms of means and scope, providing safe and secure services to the people in need, which is managed by CRC and this is important is open to partners open to other organization. You might in organizations. So the idea is really to have this platform to explore new services for example I will come into more details we built a digital vote for people to save documents or to save the contacts, but also exploring new ways to deliver services for some information as a people can find information where to get the right assistance for example where to get you know shelters where to get you know protections, which is not new, but it's a new way to reach people through that kind of platform and also becoming accessible. The idea would be for that platform to be that one stop digital shop, when people need to access to ICS services or partners, services. So, basically, it has a form of an app, which is available on Android on iOS, but also website in case people do not have I mean the phone with them, they could get access or through a computer. So, basically, these are the services that we have produced right now the first one is quite simple is information as it is called articles articles about what are the you might in services you can access to in a certain context. You can find I mean a basic articles about what to find shelters where to get legal advice where to get health services in the countries. So, this is an article that you can download of organization which have been vetted by the ICRC, which are providing trusted and reliable services. You can send alerts, you know, you get all alerts you need to have the push by the ICRC could be about natural disaster but it could be also about a new services you get access to. And the third type of information which could be very useful for people looking for services is a map of services you get your geolocation says like a Google map, but it's not using Google services to avoid tracking of people. These data are hosted internally are built within I would say ICRC servers. Other type of services are with the digital vault so we built a digital vault hosted on ICRC servers where people could save any document the need it could be the ID it could be a property rights. It could be a medical certificate that they need to have it's simple it's a simple I would say pictures and they get it saved on the digital vault they can retrieve whether they want. You can have it access in offline mode and they can also save the contacts. They can decide which contacts are important and want to save in red safe the same application. The last services we are developing that is not available right now but that would be available by the end of this year with the messages very simple messages. In fact it's preformatted text is more sharing a status about where you are about you can share your geolocation you can share your contacts, and you can share a status like I'm safe. I'm rested I'm still traveling this was focused on my grand this is the reason why we put on still traveling or I need assistance with geolocation the selfie of yourself and the contact and you can share with another user of red safe. So what are the benefits of doing that platform it's a new I would say remote way to reach individuals and meet the needs. It's based on interviews we have been doing in very in variety of context of people affected we are focusing first on migrants and refugees of this place people. And it's also driver for innovations and the new way also to engage with partners for a platform model because we give them the space to publish I would say the services. And at the same time it's really a secure field a secure testing ground to test assumption we might have about your services for example would people use the vault to protect the document with the trust ICRC. And it's a driver for digital transformation at the same time. So how you might and partners can be involved. Again, what we provide on our side it's red safe as a new channel of information as a map of services to promote trusted you might and services. And what you can provide as a trusted partners promotion of red safe maybe supporting people to create an account and use red safe or providing free connectivity which is very important for people who don't have the means to connect to red safe and also use other services. So, basically, if I speak about the first pilot we had it was launched in eight countries of Southern Africa in May 2021 was mainly focused on migrants and refugees, crossing Zimbabwe as it can come from other countries in Africa and going to South Africa. So we have we have many more users and expecting close to 19,000 after 17 months and more than 28 organization accepted to be a publisher services in red safe. So that was considered as a successful pilot promotion we use different means could be posters digital marketing ads on Google and Facebook because we are really dependent still on this means I mean people need to find the services and for that you need to to publicize them having also events organized and and also trying to convince also community leaders having the input on the services for them to promote also red safe and to get also and to get the feedback on what needs to be improved. So what's planned for three minutes. Three minutes. 2023. I'm still on time. Thanks. So the idea will be to to start building a secure to which channel communication between affected population and ICS delegation what I've been presenting is message between users and not messages to, I would say in my general organizations and two pilots we want to launch for 2023 one in Central America, Mexico and US will be again for migrants focusing on migrant refugees and IDPs, but a new one which is quite interesting because it's a very different context in Philippines in middle now for people affected by the armed conflicts in middle now. So one of the challenge is really how to protect that and limit the risk of people using digital services, because what we are aiming at is a deployment in context affected by violence now conflict in line with our mandate. So we have to be seen as independent neutral and purely you might and tool this is quite important and we need to protect the users data but also to present misuse of the tool to be trusted by the authorities and different governments and the armed groups as well. So this is a challenge. And so the challenge come with some decisions so we publish only you might and services is with Alema about which you might and services to publish which you might and services which organization to what and not. And it has to be privacy and security by design by privacy and security by design is basically you need to make risk assessment for each new phase of development so data protection impact assessment which is about the privacy. Security risk assessment is more technical security of the tool and the legal risk assessment in order to prevent, for example, legal risk of law enforcement agency, getting access to the data of people you need to protect. So there are also specific field and legal risk assessment before new deployment, and you have also to prioritize again to a certain extent because guys not limit security and privacy in the decision they're going to take. Finally, if I want to be more concrete about the measures that we needed to take in order to protect the data and limit the risk. Information has to be verified by ICRC and but partners before publishing because you don't want we want to that people have access only to trusted and reliable information about services that need content would be monitored by the ICRC at this to a certain extent of the messages that they send and the messages are restricted to preformatted text, such I'm face. I'm safe because we want really to avoid people using the free content and having a misuse of the app. All the data stored on ICRC service in Geneva so it's not we are not using any commercial cloud including for the data related to the maps. In fact, to benefit from ICRC legal protection but also for the personal data to be accessible only by ICRC staff is quite important. It means that you need a lot of also funds I mean to be secure foundations I mean within the organizations and having a step by step approach you know starting with pilots being careful where you start you know the pilot with doing assessments. And seeing what works what works less and well and doing improvement before we need making the decision to scale up and having also communication materials promote we need cyber hygiene the best practices. So this is basically where we stand right now and if you want to know more we have a site where we can get access to it's only available in Switzerland because we have headquarters here in southern Africa where we have the pilot. And I also recommend to have a look at the handbook on data protection you might an action when you have a lot of information about responsible use of technologies. For you might an organization. Thank you. Thank you, Roman. Thank you very exciting. I am. I am inclined to ask you a ton of questions but today I'm a facilitator so I can't do that. You have prepared some questions for our audience. So we want our audience now to have a minute per question that is being asked so we're going to now see the first question. On the screen. We want you to click on the link. And so we want you to give concrete examples of dilemma where you have to make hard decisions and find the right balance between security constraints. We have multiple choice so you can pick and we want you to click on the link and that is available in the chat and start answering and you have a minute to do so. And I can see already some people are answering. Don't be influenced by the answers that are coming in. Pick your own. Use your free minds to do so. You have now 45 seconds left and we still have only a few of you and we have over 200 participants. So I'm expecting a spike. Look at that. People are answering the questions. Fantastic. So we've gotten some responses from you and Romain will reflect on these answers when we open the floor for Q&A. So we have a second question for you. So maybe we can go to the second question now. Now that you're well versed on answering quickly. Let's go to the second one. All right. So how do you mitigate the risk of digital services increasing equalities between people who are at ease with technology and those with low digital literacy? So very important access question. I can see that people have started voting. You have a minute and a half to reflect on the answers. Okay. We got your votes. Romain, I will give you the floor to reflect on some of those answers and what you make out of the vote that we got. Colleagues who are on the call note that the results will be shared in the chat, but also the same link that you're using now to answer the questions. You can click on it and you'll be able to field questions to our D Romain. And we'll check them out. Romain and I can have a look at your questions. So click on the link while Romain reflects on the results and actually the results are also in the chat. So you can have a look at also the results of the survey in our chat. So with that, Romain, over to you for a few minutes and also we will open the floor for a minute and then we'll open the floor for questions. Thank you. Can you get back to the first question? It's easier if I see it on the screen. Let's do that. Let's go to the first question with the results. Okay. That's great. No, that's really interesting. So we saw clusters of votes around protection of personal and sensitive data and making the tool, including by development and design. And this is quite an interesting one because when we started to develop RedSafe, some of my colleagues told me that people should register because we'd be facilitated when they get RedSafe. Once you register, you create an account from the start. You don't have to create later on. But we decided not to do so because if we're asking the people to register first, they would give quite a lot of personal information that maybe we don't need to have in order to provide the services. And registering itself is a complicated act. It's not so simple because you have to create an account. You might need to have a two-factor authentication and so on. So we decided that to access information as a, to access the map of services and to access to alerts, you don't need to register. You just get, you know, you download RedSafe, you get access without providing any information. So I mean to access it to anybody else. Now, the second stage was a bit of tension also be to the protection of personal and sensitive data and the inclusion. Because, of course, if you need to protect your documents and your contact that's saving the world, you need to register. You need to create an account and you need a two-factor authentication. And having creating a two-factor authentication account is a complicated is complicated for most of the people. So the way we try to mitigate that risk and work the right balance between these two elements was really providing setting up Kiosk for people who would get assistance. They will get connectivity for free. We have four Kiosk and Zimbabwe as will be helped by volunteers in order to create an account to them. I think it's also something important to say that digital services should not replace all services you're going to bring to people. So you still need always to have people being face-to-face, you know, and asking questions and that's all the services you're delivering are not digital. Because you know that for some people it will not be possible. They will not have the right equipment and they will not be providing this connectivity to get access to these services. Another problem that we have is that when you create going to be very specific, when you need to create, for example, an account, as a second factor authentication, most of the websites ask for an email because you can recover your accounts through an email. But if you're looking at inclusions, we find out by interviewing a lot of people. A lot of people don't have emails simply as they don't. So if your second factor authentication, you impose an email, you will exclude a lot of people. So we decided to let them choose between the telephone numbers in order to get an SMS as a second factor of authentication or getting an email. And that's a way, I mean, you base your decisions on interviews, on trying to be inclusive, but at the same time trying to find the right balance between the need to protect the data for which you need, for example, to factor authentication to create an account. And at the same time, for the second factor authentication to take into account what people really use and having these interviews and having this feedback from the field. Thank you, Romain. Can you reflect for 20 seconds on the second question? We have some questions that arise. So I'm going to pick one and ask them to you. And then we need to really move to our next question. So go ahead, Romain. So this is quite similar to the first reflection I have. I think it was very important from day one, not only to promote a digital tool based on interview, but really to provide the face to face support to the people. So for example, in Zimbabwe, we decided to have again Kiosk, manned by volunteers of Zimbabwe and Red Crescent in order to, you know, to assist people who are not at ease with technology. They could help them to scan the document and to import it into RedSafe as a goal. So basically, this is the way you need to go if you want to provide also not only technology for the savvy ones, but also with the one with low digital literacy. And not to believe that everybody is able, I mean, to use this technology because you're really surprised by the elements and the finding that we had. Thank you, Romain. And I'm taking one question from the floor. We only have six questions. So six of you actually inputted the questions I expect in in the next round we get more to ask those questions online. We got one question saying how did ICRC develop these tools considering levels of literacy and or people with disabilities. A quick answer and then we go to our next presenter over to you, Romain. Before we decided to develop it because we wanted to avoid having a top down decision, you know, this is what we think the people need and we're going to develop that. So it took a year of interviews, you know, of meeting communities of different variety of communities. We went to, we went to Columbia, we went to Kenya, went to a lot of different places before, you know, deciding this is we think I mean the way. And we were a bit co designing I mean certain functionality with the people so we didn't have an app at that time we were asking people how do you, what kind of terms would they use for example to even I mean simple term like downloaded because it makes sense for people digital role those people understand what it means trying to find the simple terms that people understand it based on this field interview so it takes a lot of time. Before you decide to develop it and then you tested, and then you see how people react to it and then you have to improve it so. So you will not do the right thing at the first decision you need iterations going back and back and improve things. Thank you domain, the user centric being essential to our work, putting our, the people we serve at the center of our work is important. Thank you for your time today domain, I will book you for a herbal tea, when time permits a lot to discuss. And with that, we go to our next presenter, our colleague Jane from IRC over to you, you have 10 minutes speak slowly and then we will have 10 minutes for other sets of questions and Q&A. Over to you Jane. Thank you. Thank you, remain and hoping for that. My name is Jane Mugeni I am the senior technical advisor protection and rule of law at the International Rescue Committee IRC. Today I'm going to be talking about social media protection risk analysis, which is something we have worked on on the back of the work that we did on protection analysis that protection analytical framework in conjunction with the DRC and the global protection cluster. Could you move to the next slide. So why does it matter to do a social media protection risk analysis. And before we get to the why does it matter. What, what is it what is the social media. In terms of humanitarian work. We are using it a lot at the moment. So we have like social networking forums like Facebook and Twitter. We have content hosting sites like YouTube. We have Reddit instant messaging WhatsApp, and more and more in humanitarian settings we are finding we as humanitarians are using social media a lot, but also our clients and affected populations are actually relying on social media as a means of you know to find their loved ones to mark themselves safe as as was highlighted in you know in the in the by the previous presenter presenter, and more and more we are finding the growth of users in social media is increasing at a rate of 1 million users per day so it's not an area that we can ignore and just say, you know that social media, you know it's fluffy we cannot work with that. People are relying on it it's a source of news it's a way of keeping people safe. And if it's of using social media. For example, you can deliver a bigger program faster, you know with one text on WhatsApp you can reach you know several thousands of people. You can get to people who you could traditionally not have been able to reach if they are you know in far off cut off areas, you can get to them. But it does also have its challenges. Social media can fuel conflict. It can lead to human rights violations. For example, we have seen in certain countries surveillance of social media platforms and people for example being denied visa or entry just based on something they put on their social media their Twitter account or their Facebook account. And also in terms of humanitarian work, it can create new barriers for especially women and girls persons with disabilities. How do you ensure inclusion, or it can actually create more barriers or exacerbate barriers that are already existing in the humanitarian work that we do. In Myanmar for example the Human Rights Commission found Facebook played a critical role in the Rohingya crisis, and we are seeing it as well in even developed countries with Brexit and the US elections. So as I said at the beginning social media is big, and it's playing a big role in how risks and online and offline violence plays out in reality. Next slide. So what is social media path. I'll go back and talk a little bit about the protection analytical framework, which I say it was developed jointly by IRC and ERC in collaboration with the global protection cluster. It has been endorsed as an approach to protection analysis. And the resources can be found under PIM and then the GPC website. On the path specifically looking at the structure of the path. So in your analysis, you're kind of looking at, you know, your context, you're looking at the threats on the population, how are those threats affecting the population, and what are the capacities. So what the path actually does, it just allows you to be able to get information that you need to undertake an analysis. And then it allows you to think through how you're going to organize your data in order to support an integrated and independent analysis of the issues. So it is an analysis in itself is just an action it's supposed to enable you to move towards a response. So you get your information you organize it and then you are able to then design an intervention based on what your analysis is telling you. Next slide. So for social media, similar to what you have with the path with the context, having, you know, threats, how they affect the population. So let's go for example with one of the threats you experienced with social media is online information and disinformation. Right, so you will identify the threat under the yellow tab. So how is this threat affecting the population. Let's go with an issue of vaccines. You find a lot of information misinformation online about vaccine. How are people responding to that. How is that in reality playing out. Does that mean for example, people don't show up when you know health teams come out to do vaccines. In that context, is it historically a challenge that people these poor uptake of vaccines. So in terms of that you'll be going through your vaccine program but using social media to understand how your program is playing out online and how that affects uptake of humanitarian services offline. Next slide. So talking about context to just go a little bit deeper in terms of the analysis itself. You need to do what information do you need to understand a context in terms of humanity in terms of social media. So when you're looking at social media, you will look at the online information, but you also need to look at the offline information. So, historically, what has that context looked like had looked like. So going by the Miami example. Historically, we knew there had been a conflict between the Rohingya and the government. And so that was the basis the grounding of that has conflicts and hazard history. What was the political and economic landscape. How are people, you know, accessing their services at do they exist. What is the institutional and legal framework. So in some countries, for example, you will find, maybe social media is banned, it's regulated it's restricted. Then you look at the media and information landscape is do people trust the media for example, if people don't trust the media they're probably it probably means they are relying on social media as a source of information so you will need to take that into consideration in your analysis. What is the Rohingya landscape. Is it easily available are people connected. Who is connected. What is the geographical areas that are connected. So as you're looking at this you will ask yourself these questions and arrange them in order to be able to understand within this context. What are the social media issues. Next slide. Two minutes. Okay, I'll try and speed up. So you will then look at the threats, the digital threats. And as I said, a lot of time, what you see online will play offline. And that's why you need to look at both the information you're seeing online, and how it's actually playing out online offline. Sometimes online you can just see maybe it's trolls and harassment, but what's actually happening offline is people are being arrested detained imprisoned. So you will have to look at the digital threats online, but mirror them to what is actually happening offline. Next slide. Next slide. How are these threats affecting the population. So for example, how are people in the US for example, one of the research that was found, I think it's the next, the previous slide, sorry. The digital threats that the, that's right. One of the things that was found following the previous US election was that the digital threats were actually very gendered they were very targeted at women. And the consequence of it was that it actually resulted in both low water turnout, especially of women. So when you look online and look at threats, it's important to then disaggregate who are these threats targeted at. Are they very gendered. Is it a certain age bracket that's targeted at, and then you will look at how that actually plays out. For example, in this case, it results in low water tunnel. How are people coping with these strategies. Is there someone countering those false narratives that are happening online in the offline world. Next slide. The capacity. What is the capacity of the population at people digitally literate. Do they understand data security do they understand you can be surveilled do they understand the online risks is their capacity of the government for example to counter those narratives and stop those things that are happening. In the, in the, in the online world. And then, following this once you arrange your information in that sense can you go to the next slide. One minute. Yeah, just let this is just a final slide on how to use it. How then do you use that information. You then you have four pathways to kind of use, use that information. You can design a program. So for example, if you're on in your world. It's maybe refugees and host communities who are in conflict, you can use that information to then design a peace building program for example. You can use it to develop evidence based advocacy so in this case for example you can go back to Facebook and say hey Facebook. What you're putting online, you need to baby take down this type of information you need to put better security features, and you can use that to make advocacy. You can use it for protection sensitive programming so for example you can look at how it's affecting participation of women. How can you ensure inclusion, how can you ensure safety, how can you make sure make sure your program if you're using social media is more safe. And then you can use the analysis to also develop social media protection strategy. The resources are available I think go to the next slide. We have the resources available as I said on the PIM website, PIM website as well as on the GPC. The social media protection analytical framework is currently in draft and if you would like more information I'm happy to share that. But yeah I would now pose there and open for any questions thank you. Jane, thank you very much. You have shared with us a few questions. Now that the crowd is well versed in answering the questions online. Let's go to the first question and this time you will really have 45 seconds to answer and then we will go to the second. Jane, please take note of the answers as we end because I'll ask you to reflect on the answers that we've got. When should I consider doing a social media protection analysis you have two options. If you can think of any others. Please use the link eventually to put them in the Q&A. We have 45 seconds to answer this question. Alright, let's go to as people have voted. Let's close this vote. We got a nuanced answer already from the crowd. I'll ask Jane to reflect on what that means for her. Let's go to the next one. What types of program interventions can be designed following social media protection analysis. Now you have three options. Alright, we still have a split vote across the three options. This is more for Jane to reflect on. Fantastic, presents Jane with a dilemma that she needs to answer to. Alright, I think people are voting. It's great. We're going to go to the next question. I think we have a third question if I'm not mistaken for Jane. Alright, so very simple. Can you give one example of a digital threat and how you mitigate this? Alright, Jane, you have noted the balance answers we've got across the crowd. Our colleagues will share now the link for you to ask questions and make comments in the link, which I am looking at. So I'm expecting some questions from you as Jane reflects on the answers that we got from the audience, which were quite balanced. So Jane over to you for a minute and a half of reflections on the answers that you got. So when should you consider to do a social media protection analysis? Really, the answer to this is kind of if you're just going to use social media at any point for anything, you should consider doing a social media protection risk analysis. That is because, you know, as humanitarians, we're now beginning to understand they can be serious risks and threats that the affected populations face as a result of social media. So it is important. I think the previous speaker spoke about conducting data impact assessments. It is important that when you're using any kind of technology that you're able to really assess what risks that technology can present and try and mitigate that risk before using that technology. What types of program interventions can be designed? I think really it can be any type of program depending on what your analysis tells you. It really comes down to your analysis. So if your analysis tells you you need to do a piece building program, there is an opportunity to do that, then you can do that. If your analysis is telling you there's a lot of misinformation and disinformation, which can then be addressed by, for example, countering those false narratives, you can run a program that counters false narratives. It really will come down to what your analysis tells you, and that's what you will use to design your intervention based on your online context and your offline context. I keep emphasizing that just because you have to really understand that sometimes the two don't talk to each other, and it's important to really try and merge in order to design an impactful intervention. In terms of digital threats, yes, online disinformation is an example of a digital threat misinformation. Misinformation is the second one there, which is basically a statement that is known to be, it's been defined, it's a statement misinformation is a statement that's known to be false, that is then, you know, propagated online. So we have a lot of threats, digital threats, so it can be online surveillance, rumors, trolling, hacking. It can manifest in several ways. So this is just an example of how digital threats play out online. Thank you. Jane, we actually have one question so far. And that was asked. So maybe we can showcase that question on the screen. So that was just one question so far. Yeah, these are, no. These are the previous ones. Let's go. And then the last one. Yeah. Yes. Jane, do you want to address this question. Is there a set of questions to identify digital risks. Yes, there is a set of questions. So within the path that we have developed the social media path. There is a list of questions. So when you go to context, it will, it will tell you, okay, these are the things you need to look at in a context, and then within that it will give you an example of questions that you need to ask in order to elicit a response for that. The same when you go to threats, when you go to context, the threats, how communities are responding. We will give you suggestions, as well as a list of questions on how to try and get a response in the contents that you're working. And yes, it can be made available. As I mentioned, we're still in draft, but we're happy for people to use this and give us feedback in order for us to, you know, tailor it fine tune and make it accessible and usable. Jane, Jane, I want to thank you for your time with us. We are running a bit late so I will have to thank you on behalf of everyone, and we go to our next group of friends from Ukraine, who are going to be the next presenters. So, over to you. Hello, dear colleagues. My name is Alexandra Makovskaya I'm representing the protection cluster team in Ukraine here at this session. And I am joined by Daria from the NGO right to protection and Oleh from the NGO. We will be sharing and presenting the experience of working with mobile application Dia, which is, which was created by the government of Ukraine to facilitate interaction between individuals and state institutions when it comes to access to documentation and access to various administrative services, as well as the system of provision of social benefits. A bit of the background, why the government took the decision to create this tool. Two factors. First is the overall agenda of the authorities to simplify access to different bureaucratic procedures and to make lives of citizens easier. The second aspect was the wave of first wave of displacement in 2014 and 15, which made it very obvious for both authorities civil society and humanitarian actors. Mobile are dependent on paper documents and access to paper archives in different in their areas of origin, and that restoring lost documentation is a big challenge. And this was one of the lessons learned of the first wave of displacement why there was a decision to develop mobile services for the population. The application itself was created in 2019. And as of now, there are over 18 million Ukrainians already using this application and the portal where they can upload various, where they can have access to their personal documentation, as well as different access different types of documents and services. This is a huge number. It's about a third of the overall population. There is the expectation that in in two years by 2024 about 100% of state public services that relate to documentation and different administrative services will be provided via the application. Currently, this state run services portal provides about 72 different services, offers 16 digital documents that are available to the population. And it's important to note that Ukraine has become the first country in the world to legally recognize the electronic version of the passport at the same level as the paper version of the passport. And why this is important to us as protection actors and as humanitarian actors in the situation of displacement of armed conflict where large number of population ends up living either in besieged areas or in areas affected by the conflict. Protection partners are facilitating access to to documentation and are facilitating access to those social benefits that the state can still provide. So when this new tool is being introduced by the national authorities, we by default need to be aware of it, need to monitor to which extent conflict affected population can use and access these services to facilitate awareness amongst them. And to highlight the challenges, particular challenges that are linked to displacement and to be able to advocate with authorities that these challenges are taken into account and addressed to make the use of the tool truly accessible to the whole population, including those most vulnerable who face particular challenges. in accessing the application. Today, colleagues from Right to Protection and from Rokada will share their particular experience of providing legal services and social services, as well as highlight some pros and cons of the of this digital tool. Over to you, Daria. Thank you, Alexandra. Dear colleagues, partners, my name is Daria Lisenko. As noted earlier, I'm a project manager and lawyer at the Territable Foundation Right to Protection. You are an implementing partner in Ukraine. The ACE year in a row of foundation has supported internally displaced persons, as well as other conflict effect population, providing monitoring advocacy, legal assistance, and other social services. It was before and after February 22, Tony's for sorry, the R2P experts are actively using the application to provide legal assistance to beneficiaries. They also teach clients in person using digital board legal advisor for ADP and digital literacy session how to use app correctly for various government services. Now, the most popular services in terms of legal assistance in Ukraine are electronic documents, such as e-document, digital passwords, including foreign driver lessons, COVID certificate, ADP certificate. A document in DIA, for example, make it possible to confirm the identity even in case where all documents have been lost. Not as my colleague said before, Ukraine become one of the first countries to recognize digital passwords on a pair with paper originals. At the same time, the right to protection in partnership with other human rights organization has achieved the recognition of Ukrainian digital passport in DIA app in the part of the European Union countries. It helps our beneficiaries to cross in particular the Polish border faster. Now, foreign passport driver license and vehicle registration certificate in DIA are available in English. As a result of such joint efforts of decision makers and civil society Ukrainians who were forced to fee because of a full scale Russian invasion are unable to access documents and services and exercise their rights abroad unimpededly. The right to protection legal experts also actively help IDPs to use the comprehensive service of IDP registration and receiving financial assistance. You can register as an IDP and get a certificate in any convenient place just with internet access. Our work is also under way to document the destruction of housing and obtain the status of unemployed clients with the help of DIA. This is one important services that should help create a register of destroyed housing and further ensure that victims receive compensation. Finally, providing legal assistance, we actually use it and teach how to use the email address service on the DIA portal. Such a digital tool help parents and with newborn children including those from the temporary occupied territories of Ukraine to remotely apply for a birth certificate. Registration of their place of residence, Ukrainian citizenship, state assistance, a birth, tax number, etc. Of course, work in this direction reduce the risks of the statelessness and improve the access of beneficiaries to public services in general. Nevertheless, our activities continue. Thank you for your time. And I will go to answer a question after presentation of my colleagues Oleg Pastoschak. Oleg, go ahead. Thank you. Thank you, Darya. Thank you, Alexandra. I hope you can hear me. Dear partners, dear colleagues, good afternoon to all of you. My name is Oleg Pastoschak. I am the protection coordinator of Rokada Charitable Foundation. In Kiev, Ukraine. Our foundation is an executive partner of UNHCR for almost 20 years. We used to work with asylum seekers and refugees until February this year. And now we have a huge, really huge project with the eternally displaced persons and affected population here in Ukraine. As well as our partners from Ukraine, Rokada actively used the application to identify persons and for registration to various types of state-state. I want to tell you about the most useful functions with which our beneficiaries use in their everyday lives. Of course, in addition to the basic documents and basic functions which were mentioned by my colleagues before. First of all, it's unemployment benefits. So Ukrainians can get unemployment status and register for benefits just in one minute, just with your phone in your hand. The same situation is with the pension ID. In Kiev, you can submit a request for an old age pension and all other types of pensions just with the phone in your hand. It is very comfortable for us because you can submit all types of state's assistance, including even the application for subsidies, for utilities at wintertime. So you can do it without even leaving your home, just sitting in your couch in your chair. Based on our work experience, I would like to share with you also the main advantages and disadvantages of the application. Let's start with the advantages, as I see. So they reduce the burden on the state social protection service. It is a huge problem for my country, for Ukraine at these dark times to get full state service. And DIA really helps to solve this problem because you can do it online. You don't need to go to some offices, to other buildings, you can stay at home. Secondly, reducing the human burden, including the risk associated with travel. As I mentioned before, Ukrainians can get, as me and my colleagues mentioned before, Ukrainians can get thousands of services without leaving their home. It is important because on days when leaving your home, your home can be a danger for your life or for your health. It is good when you can stay at home, stay safe and do your business online. The next point is computer or phone literacy. On one hand it is a plus because it is an advantage because people are learning some new skills, some new software. On the other hand, to fully use the app, you have to have some previous skills. You can't just give the phone to the little baby and she can't do anything because she has no skills. You have to know something before you use the application. We together with our partners, of course, we are working about computer literacy with our beneficiaries. What about disadvantages? First of all, of course, you have to get a smartphone. It can be a laptop or a computer, but at least you have to have a smartphone to use and to get all the documents. The second problem is and the biggest problem as for me, it's the internet connection. Without internet, you can't do anything and it is a big problem for the parts of my country and some cities where infrastructure was damaged. There are some problems with the light, with electricity or internet connection and it is a huge problem because no internet, you can't use the app. And of course, as always, we should always care about the data protection considerations. Of course, we know that DEA is protected by state, but we should always be aware of the hacker attack. That is all from my point. Thank you for your time and thank you for listening. Awesome. You folks were on time. You were three and you were on time. Perfect. We have been running against time, even though we tried. So you have posted a crowd, one question. So people are going to vote on that question. So let's have a question on the screen. People will have 45 seconds to vote on it. And then we'll see your reflections on the answers quickly before we go to our lovely colleague from the US government to end the session. So the question is how do partner respond to mitigate risks and shortcomings of electronic service provision and facilitate access to services. Super interesting question. Ukraine is cutting edge with your programming on this bond. Colleagues, we want you to help us answer this question. You have 45 seconds. Our crowd is providing quite a balanced set of answers to all our questions. It shows the complexity of the situation when it comes to the digital access opportunities and risks. All right. Let's go to our three panelists. What are your reflections on this? You know, I can see legal aid didn't get that much votes, but the rest seem to be getting quite a balanced response. Any reflections from our guests before we hand over to Catherine. Maybe to start digital literacy training came out as a very big solution and a step for the future. And it definitely is, both on individual level, something that both Rokada and Right to Protection are doing now, training people one by one how to make use of services, but also at community level, creating hubs in smaller towns, equipping some of them with the Internet so that people can use these services themselves. And if they don't necessarily have a smartphone, they can access that through computer. And given the size of the country and the size of conflict affected population because there are areas affected in the east and the south in the north. That's a quite formidable task that requires serious partnerships and engagement of multiple actors from the state itself and also to humanitarian actors. So monitoring is indeed very essential and that's something that's embedded in the work of protection partners at the moment, watching constantly who is left behind who cannot access services, and there have been several rounds of reports that have been taken a snapshot by DRC earlier this year, before the escalation in January, by Right to Protection this year in summer already after escalation, highlighting the problems. And Right to Protection was able to feed into the development of solutions because their feedback was taken into account during the development of the updated beta version that is being tested now, where IDPs can change their residents registration, which is very important in the current context. In the development of new digital solutions, I would give the floor here to colleagues, we would struggle with this one, precisely because this particular app is managed by the state. And so for us as humanitarian actors, we can only advise of certain shortcomings, we can propose solutions, but to develop an alternative to this would be quite a challenging task, especially if we speak about services that are to be provided by the government. Thank you. For the interest of time, I think colleagues have your contacts. They will be in touch. Super exciting. It will be interesting also to explore how systems are user centric and how the client's feedback on the use of services is taken into consideration as systems evolve and develop. So super cool. Thank you very much. You were on time. I would love to stay for hours with you, but we don't. We actually have five minutes left. And with that, I want to thank the crowd and give the floor to our dear colleague Catherine from PRM for her closing remarks. And she will be the one who will bid you also very well till next time. So Catherine, the floor is yours. Thank you so much for having me, and thank you to all of the fantastic speakers today. I just wanted to start by saying the US Department of States Bureau of population refugees and migration, fully supports the safe expansion and adoption of new digital tools and technologies to further protection outcomes, while also mitigating many of the potential risks of digital access that were mentioned today. We fund several of the organizations we heard from today, including UNHCR and ICRC, and their work on digital access and protection. And we're really enthusiastic about all of the work presented and shared today by IRC, by Raqqaida, the right to protection, and the Ukraine protection cluster as a whole. So on this list today, and from feedback from all of you, we saw a number of different ways highlighted where digital technologies can improve protection for conflict affected populations. But we also saw some of the associated risks. So we heard how cell phones and social media can enable families to keep in touch when they're separated. We know that this can make family reunifications easier than ever before. And we know that humanitarian implementers can leverage these technologies to more easily communicate with affected populations, making community participation and two-way feedback faster and more effective. It was great to hear from ICRC on their Red Safe Digital Humanitarian Platform and hear examples of how humanitarians are using digital technology to safely share information with affected communities. And their organizations are also increasingly using messaging technologies like WhatsApp as feedback and communication channels as well. However, at the same time, we're all very conscious of the need to acknowledge that social media and digital messaging apps can contribute to misinformation, disinformation, and hate speech, and increase in some cases protection risks. So it was great to hear today about the work that IRC and ICRC are doing to track and mitigate these threats online and to develop a framework to do so. We haven't talked as much about this today, but we also know that digital technologies can positively affect protection through the shift from paper data collection to password protected digital collection on tablets and mobile devices. We know that this can reduce risks for staff, for humanitarian staff, and reduce the risk of seizure of sensitive beneficiary data, less likely. Paper records, you know, are very vulnerable to loss, theft, and misuse. So while it can reduce the risk of misuse, we also know it can introduce new risks related to password or pin sharing, especially if populations are not digitally literate. Digital access can also enable safer storage and issuance of passports and other personal documents as described by our partners of our colleagues from the Ukraine Protection Cluster Partners, which leads to improvements in migration and birth registration. It can also facilitate access to government services and safety nets, creating cost savings and bureaucratic efficiencies. But as noted, we have to make sure that governments and humanitarian organizations are mindful of data protection requirements and challenges around cell phone access and digital literacy, especially in marginalized communities. So in closing together we need to work as a humanitarian community to leverage the advantages of digital access for protection, while also working to mitigate these risks. So thank you to our panelists for sharing information on their work today. Thank you to the organizers, and thank you to all of you, all of the participants here today for your active participation and contributions. We hope that everyone participating today can take away some new ideas for how to use digital technologies to improve protection outcomes and mitigate potential risks. With that, we'll go ahead and close the session. Please note that the zoom room will remain open for the next session, so you can remain on the line if desired. Thank you to everyone and have a wonderful rest of the day.