5 steps to protect your data in case of computer theft
Here’s how to protect your information and yourself, critical for human rights defenders, in case of physical computer theft.
Here’s how to protect your information and yourself, critical for human rights defenders, in case of physical computer theft.
This publication gives human rights organisations an overview of their environment, their most common assets and needs. These will guide their action and lead to intelligence. It provides a scanning package with resources on where to start searching on the Web. It shows how Web information management tools can provide an automated support for information monitoring. Finally, it illustrates how a professional project framework for information scanning activities draws the way to get good practices and avoid common information management pitfalls.