protecting

Protecting Children - B.S.A.'s Top Priority

Every adult leader must complete an extensive Youth Protection Training program. ...




protecting

IBM Research Announces Breakthrough in Protecting Personal Data using the Cloud

Today on Data Privacy Day, IBM is announcing an innovative cloud-based technology for developers to help consumers better protect their personal data online such as their date of birth, home address and credit card numbers. As cybersecurity threats and identity theft continue to threaten both consumers and businesses, IBM scientists have been developing a clever cryptographic algorithm which enables transactions to occur without involuntarily sharing any personal data.




protecting

Fury as swan shot in head four times while protecting nest in ‘cruel and horrible’ attack



A SWAN was shot in the head four times while trying to protect her nest in a shocking case of animal cruelty at a park in Merseyside.




protecting

Protecting health workers needs this Olympic champion, says LEO McKINSTRY



IN ITS unprecedented scale and potential for devastation, the coronavirus pandemic represents the biggest peacetime challenge ever faced by a British government. On every front, from the NHS to the economy, ministers have gargantuan responsibilities.




protecting

Undercurrents: Episode 32 - Protecting Health Workers in Conflict




protecting

Undercurrents: Episode 34 - Protecting Children in Conflict




protecting

Protecting the Environment in Areas Affected by Armed Conflict




protecting

Protecting the Environment in Areas Affected by Armed Conflict

Members Event

15 October 2019 - 6:00pm to 7:00pm

Chatham House | 10 St James's Square | London | SW1Y 4LE

Event participants

Dr Marja Lehto, Special Rapporteur, International Law Commission, UN
Doug Weir, Research and Policy Director, The Conflict and Environment Observatory
Chair: Elizabeth Wilmshurst CMG, Distinguished Fellow, International Law Programme, Chatham House
 

In 2011, the UN’s International Law Commission first included the ‘protection of the environment in relation to armed conflicts’ in its programme of work. Earlier this year, the Drafting Committee provisionally endorsed 28 legal principles intended to mitigate environmental degradation before, during and after conflicts. These addressed issues ranging from the pillage of natural resources to corporate environmental conduct and the environmental stress caused by population displacement.
 
Special Rapporteur Dr Marja Lehto and a panel of experts will discuss some of the environmental issues arising from armed conflict and how these can be tackled. What are the International Law Commission’s recommendations and to what extent are stakeholders engaging with the work? In what sense are parties to the conflict, including governments, rebel groups and civil society, accountable for environmental devastation?

And, looking beyond the environmental consequences of war, what is the role of climate change in driving insecurity and triggering conflict in the first place?

Members Events Team




protecting

CBD News: Towards a Strategic Partnership with Civil Aviation for Protecting Life on Earth.




protecting

CBD Press Release: The Role of Indigenous and Local Communities in Protecting Life on Earth.




protecting

CBD Communiqué: Engaging North America People in Protecting Life on Earth.




protecting

CBD Communiqué: President of Tunisia Gives a Voice to the Youth for Protecting Life on Earth and Their Future.




protecting

CBD Communiqué: Establishment of Canadian "Friends of the CBD" Association to Support Canada's Efforts in Protecting Biodiversity.




protecting

CBD Communiqué: UNEP Goodwill Ambassador Gisele Bündchen Stresses the Importance of Protecting Earth's Natural Resources in Support of the International Year of Biodiversity.




protecting

CBD News: Message of the CBD Executive Secretary, Braulio Ferreira de Souza Dias, on the occasion of the World Tourism Day, 27 September 2013 - "Tourism and Water: Protecting our Common Future"




protecting

CBD News: A report launched today shows that Asian consumers have an increasing awareness of the planet's biodiversity and want to see companies protecting it.




protecting

Geneva Launch: Protecting Civilians — When is ‘Incidental Harm’ Excessive?

Research Event

14 December 2018 - 10:00am to 11:30am

Graduate Institute | Chemin Eugène-Rigot 2 | 1202 Geneva | Switzerland

Event participants

Emanuela-Chiara Gillard, Associate Fellow, International Law Programme, Chatham House
Ezequiel Heffes, Thematic Legal Adviser, Geneva Call
Sigrid Redse Johansen, Judge Advocate General, The Norwegian Armed Forces
Chair: Elizabeth Wilmshurst, Distinguished Fellow, Chatham House
Further speakers to be announced. 

PLEASE NOTE THIS EVENT IS BEING HELD IN GENEVA.

There have been large numbers of civilian deaths in the armed conflicts in Yemen and Syria. Is international humanitarian law being ignored? 

This meeting coincides with the launch of a Chatham House research paper on the incidental harm side of the proportionality assessment which belligerents are legally required to make. The panel at the meeting will consider the types of harm that fall within the scope of proportionality assessments, what constitutes ‘excessive’ harm and measures that belligerents can take to give effect to the rule on  proportionality.

This event will be followed by a reception.

Department/project

Chanu Peiris

Programme Manager, International Law
+44 (0)20 7314 3686




protecting

London Launch: Protecting Civilians — When is ‘Incidental Harm’ Excessive?

Research Event

14 January 2019 - 5:30pm to 7:00pm

Chatham House, London

Event participants

Emanuela-Chiara Gillard, Associate Fellow, International Law Programme, Chatham House
Ezequiel Heffes, Thematic Legal Adviser, Geneva Call
Sigrid Redse Johansen, Judge Advocate General, Norwegian Armed Forces
Andrew Murdoch, Legal Director, UK Foreign & Commonwealth Office
Chair: Elizabeth Wilmshurst, Distinguished Fellow, International Law Programme, Chatham House

There have been large numbers of civilian deaths in the armed conflicts in Yemen and Syria. Is international humanitarian law being ignored?

This meeting marks the London launch of a Chatham House research paper on the incidental harm side of the proportionality assessment which belligerents are legally required to make. The panel at the meeting will consider the types of harm that fall within the scope of proportionality assessments, what constitutes ‘excessive’ harm and measures that belligerents can take to give effect to the rule on proportionality.

This event will be followed by a reception.

Chanu Peiris

Programme Manager, International Law
+44 (0)20 7314 3686




protecting

Sieges, the Law and Protecting Civilians

27 June 2019

Siege warfare has been employed throughout the ages and remains dramatically relevant today. Questions of the compatibility of this practice with international humanitarian law (IHL) arise when besieged areas contain civilians as well as enemy forces. This briefing addresses those rules of IHL that are particularly relevant to sieges. 

Emanuela-Chiara Gillard

Associate Fellow, International Law Programme

2019-06-27-Syrian-Family.jpg

A Syrian family gather to eat a plate of corn and cabbage in Saqba, in the besieged rebel-held Eastern Ghouta area near Damascus on 6 November 2017. Photo: Getty Images

Summary

  • Although sieges may conjure up images of medieval warfare, they are still used by armed forces today, in international and non-international armed conflicts.
  • International law does not define sieges, but their essence is the isolation of enemy forces from reinforcements and supplies. Sieges typically combine two elements: ‘encirclement’ of an area for the purpose of isolating it, and bombardment.
  • Questions of the compatibility of sieges with modern rules of international humanitarian law (IHL) arise when besieged areas contain civilians as well as enemy forces.
  • Sieges are not prohibited as such by either IHL or other areas of public international law.
  • Three sets of rules of IHL are relevant to sieges. The first comprises the rules regulating the conduct of hostilities. The second is the prohibition of starvation of civilians as a method of warfare, along with the rules regulating humanitarian relief operations. The third comprises the rules on evacuation of civilians.
  • The application of IHL to sieges is unsettled in some respects. This briefing does not purport to resolve all the difficulties or address all the issues in detail.
  • While it may go too far to say that it is now impossible to conduct a siege that complies with IHL, the significant vulnerability of civilians caught up in sieges puts particular emphasis on the need for both besieging and besieged forces to comply scrupulously with the legal provisions for the protection of civilians and to conclude agreements for their evacuation.





protecting

Protecting the Cloud: Securing access to public cloud accounts

How Sophos Cloud Optix helps you secure access to your AWS, Azure and Google Cloud Platform accounts.




protecting

Protecting the Cloud: Securing user remote access to AWS

How to create secure access to services hosted in AWS with Sophos XG Firewall.




protecting

Protecting Children in Conflict: See Me Safe Symposium

Invitation Only Research Event

7 May 2019 - 10:00am to 5:00pm

Chatham House, London

Today there are 420 million children, or one-fifth of children worldwide, who live in conflict zones and are at risk of being killed or injured and denied access to education, healthcare and humanitarian assistance. From Myanmar and Syria, to South Sudan and Yemen, the impact of conflict on children and their families is devastating. With conflicts becoming more protracted and urbanized, and the undermining of international rules and norms, the risk to civilians is rapidly increasing. 
 
The impact of the crisis in civilian protection is not only devastating children’s lives and risking a lost generation, it threatens global stability and prosperity, contributing to the degradation of the international rules-based system and its institutions and undermining the ability to hold perpetrators accountable and prevent these atrocities from happening.
 
This symposium will bring together practitioners, policymakers, business leaders, philanthropists and academics for a day of panel discussions on the protection of children in conflict. The aim of the event is to generate an informed debate and to deepen engagement with issues around protecting children in conflict as well as to inspire support to help rebuild children’s lives.
 
This event will be followed by a reception from 17:00-18:30.
 
Attendance is by invitation only.
 
Celebrating its centenary in 2020, Chatham House is partnering with Save the Children on this core area of their work, in their anniversary year.

Nilza Amaral

Project Manager, International Security Programme




protecting

How federal government departments are protecting Australians' data against cyber hack

Cyber Security Minister Dan Tehan says the government can't rule out vulnerabilities to cyber threats.




protecting

Protecting the Heart in Obesity: Role of ACE2 and Its Partners

Rhian M. Touyz
Jan 1, 2016; 65:19-21
Commentaries




protecting

Sieges, the Law and Protecting Civilians

27 June 2019

Siege warfare has been employed throughout the ages and remains dramatically relevant today. Questions of the compatibility of this practice with international humanitarian law (IHL) arise when besieged areas contain civilians as well as enemy forces. This briefing addresses those rules of IHL that are particularly relevant to sieges. 

Emanuela-Chiara Gillard

Associate Fellow, International Law Programme

2019-06-27-Syrian-Family.jpg

A Syrian family gather to eat a plate of corn and cabbage in Saqba, in the besieged rebel-held Eastern Ghouta area near Damascus on 6 November 2017. Photo: Getty Images

Summary

  • Although sieges may conjure up images of medieval warfare, they are still used by armed forces today, in international and non-international armed conflicts.
  • International law does not define sieges, but their essence is the isolation of enemy forces from reinforcements and supplies. Sieges typically combine two elements: ‘encirclement’ of an area for the purpose of isolating it, and bombardment.
  • Questions of the compatibility of sieges with modern rules of international humanitarian law (IHL) arise when besieged areas contain civilians as well as enemy forces.
  • Sieges are not prohibited as such by either IHL or other areas of public international law.
  • Three sets of rules of IHL are relevant to sieges. The first comprises the rules regulating the conduct of hostilities. The second is the prohibition of starvation of civilians as a method of warfare, along with the rules regulating humanitarian relief operations. The third comprises the rules on evacuation of civilians.
  • The application of IHL to sieges is unsettled in some respects. This briefing does not purport to resolve all the difficulties or address all the issues in detail.
  • While it may go too far to say that it is now impossible to conduct a siege that complies with IHL, the significant vulnerability of civilians caught up in sieges puts particular emphasis on the need for both besieging and besieged forces to comply scrupulously with the legal provisions for the protection of civilians and to conclude agreements for their evacuation.




protecting

Peter Phillips | Protecting our people is priority in the COVID-19 fight

The national priority at this time must be the protection of the Jamaican people against the onset of COVID-19. This has to be done by striking the balance between implementing protective public-health measures and providing a supporting economic...




protecting

On the Wrong Path? Protecting the European Union’s External Border in the Western Balkans

With thousands more migrants potentially traveling through the Western Balkans this year, this MPI Europe webinar explores the implications of the buttressed EU border on the bloc’s neighbors, including the issues of outsourcing migration control, EU support for addressing irregular migration in neighboring countries, and considerations for EU policymakers.




protecting

On the Wrong Path? Protecting the European Union’s External Border in the Western Balkans

With thousands migrants potentially traveling through the Western Balkans this year, this MPI Europe webinar explores the implications of the buttressed EU border on the bloc’s neighbors, the migrants transiting these routes, and the local communities. Experts also explored how the European Union can support efforts to address irregular migration in neighboring countries, and what are the tradeoffs and considerations that policymakers must weigh. 




protecting

Peacock protecting duck nest in patio area of Oregon bar

Employees at an Oregon restaurant said a peacock has taken on the role of protector for a mother duck and the eggs she laid in the closed patio area.




protecting

ADA urges CDC to provide ‘immediate guidance’ on protecting dental patients, staff from COVID-19 during emergency treatments

The American Dental Association is urging the Centers for Disease Control and Prevention to provide immediate guidance on the best way to protect dental patients and staff from the transmission of COVID-19 during emergency and urgent care situations.




protecting

Protecting the DREAM: The Potential Impact of Different Legislative Scenarios for Unauthorized Youth

With the Trump administration having announced the end of the DACA program, Congress is facing growing calls to protect unauthorized immigrants who came to the U.S. as children. This fact sheet examines DREAM Act bills introduced in Congress as of mid-2017, offering estimates of who might earn conditional legal status—and ultimately legal permanent residence—based on educational, professional, and other requirements in the legislation.




protecting

Bill Protecting Ohio E-School Heads to Governor

A bill shielding what is now Ohio's largest online school and its sponsor from the negative consequences of accepting thousands of former Electronic Classroom of Tomorrow students is headed to Gov. John Kasich for his signature.




protecting

Child Protection Systems Royal Commission progress report September 2019 : safe and well, supporting families, protecting children / Department for Child Protection.




protecting

Safe and well : supporting families, protecting children : the Government of South Australia's strategy for keeping families and children safe and well / Department for Child Protection.

'"Safe and well" outlines the actions the Government of South Australia is taking to support families at risk of entering the child protection system, protect children from harm when they come into care, and invest in young people to leave care with opportunities for a bright future.




protecting

Codex Alimentarius: protecting health, facilitating trade

Eradicating world hunger can only be achieved if food is safe, nutritious and of good quality. Eating unsafe food increases the chances of contracting diseases and can be, in some cases, deadly. Unsafe food can also lead to rejections causing food to be wasted, which then impacts on food security. One thing is certain: there can be no food security [...]




protecting

Protecting the right to a childhood

Many of us look back on our childhoods with warm feelings. But for more than 150 million girls and boys between the ages of 5 and 17 around the world, childhood means something else: poverty, a lack of education and working long hours in dangerous conditions.  




protecting

Op-ed: Protecting the Health of our Young People by Raising the Minimum Sales Age of Tobacco Products from 18 to 21

Protecting the Health of our Young People, and our State’s Future, by Raising the Minimum Sales Age of Tobacco Products from 18 to 21 Op-ed by Karyl T. Rattay, MD, MS, Director, Division of Public Health, Delaware Department of Health and Social Services It’s a fact that most smokers start using tobacco as youth: Eighty-nine […]




protecting

Protecting Yourself from Malware with Better Password Security

4

In Week 1 of National Cybersecurity Awareness Month (NCSAM) we looked at spoofed emails, cybercriminals' preferred method of spreading malware. Today, in an effort to provide you with the best information out there to keep you safe online, we're hitting you with a double dose of cybersafety news.

Let's take look at the topics for Week 2 and 3 of National Cybersecurity Awareness Month: malware and password security. They're separate but related issues in the world of Internet crime prevention, and a better understanding of each is key to protecting your property and personal information in today's digital world.

Malware

Malware is an umbrella term used to describe software that is intended to damage or disable computers and computer systems. If you'd like, you can take a moment and watch this video on malware from Norton Security. But the best way to begin protecting yourself against this stuff is to learn about all the different types of malware that can affect your computer. There are tons, so we'll just go over the broader categories for now.

Viruses: Malicious bits of code that replicate by copying themselves to another program, computer boot sector, or document and change how a computer works. Viruses are typically attached to an executable file or program and spread once a user opens that file and executes it.

Worms: They're like viruses, but are different in terms of the way they're spread. Worms typically exploit a vulnerability or a weakness that allows an attacker to reduce a system's information assurance. Missed that last Windows update? You might be more vulnerable to worms.

Trojans: These look like legitimate pieces of software and are activated after a user executes them. Unlike a virus or a worm, a trojan does not replicate a copy of itself. Instead, it lurks silently in the background, compromising users' sensitive personal data.

Ransomware: This refers to a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking or threatening to erase the users' files unless a ransom is paid. You may recall the WannaCry attack that affected users across the globe this summer, only to be thwarted by the accidental discovery of a "kill switch" that saved people from the malicious software.

Spyware: This malware collects your personal information (such as credit card numbers) and often passes this information along to third parties online without you knowing.

You can check out more descriptions and examples of the types of malware that exist today at MalwareFox, a malware detection and removal software program.

Tips for Protecting Yourself Against Malware

Staying malware-free doesn't require an engineering degree. You can greatly reduce, if not completely eliminate, your chances of falling victim to malware by following these easy tips.

  • Keep your operating system current.
  • Keep your software up to date, particularly the software you use to browse the Internet.
  • Install antivirus and security software and schedule weekly scans. At TechSoup, we're protected by Symantec Endpoint Protection. At home, there are dozens of solutions you can use to protect yourself (PCMag lists many here).
  • Mind where you click. Think twice before you download torrent videos or free Microsoft Office templates from some random website.
  • Avoid public, nonpassword, nonencrypted Wi-Fi connections when you can. Use a VPN when you cannot.

Spread the Word

Let people know that TechSoup is helping you become more #CyberAware by sharing a message on your social media channels. If you tag @TechSoup on Twitter, we'll retweet the first two tweets. Remember, we're all in this together.

Password Security

Now that we've covered the nasty stuff that can make your life miserable if it ends up on your computer, let's go over some password security tips to help prevent malware from getting there in the first place. Using best practices when it comes to protecting your passwords is a proven way to protect your personal and financial information. Curious how knowledgeable you already are? Watch this video and take this quiz to enter a drawing for a $25 Amazon gift card!

First, let's go over some facts.

  • Passwords are the first line of defense to protect your personal and financial information.
  • A weak password can allow viruses to gain access to your computer and spread through TechSoup's or your family's network.
  • It's estimated that 73 percent of users have the same password for multiple sites and 33 percent use the same password every time. (Source: Digicert, May 2014)
  • Despite a small sample size of 1,110 U.S. adults, a recent YouGov survey still found that 28 percent of adults use the same passwords for most of their online accounts. (Source: Business Insider, October 2017).

Best Practices for Effective Password Protection

One great way to better protect yourself is by opting for a passphrase, which is much more difficult to crack than a single-word password. Here are some guidelines to creating one.

  • Pick a famous quote or saying and use the first letter of each word.
  • Add a number that you can remember.
  • Capitalize one letter.
  • Make it unique by adding the first letter of your company's name to the beginning or end of the passphrase.
  • Make it between 16 and 24 characters.

You should never write your password down, but if you must, never store user IDs and passwords together. Finally — even though it might seem unwieldy — you should always use a different password for each site that requires one. In today's world, everything is connected. A savvy hacker can easily breach your bank account, email, and medical records in one fell swoop if you're using the same password for all three.

Additional Cybersecurity Resources

In case you missed it, take a look at last week's post on recognizing suspicious emails.

Need a little inspiration? Find out how TechSoup and Symantec are making a difference in the lives of at-risk teens.

Get more security tips from the National Cyber Security Alliance. National Cyber Security Alliance Month — observed every October — was created as a collaborative effort between government and industry to ensure that all Americans have the resources they need to stay safer and more secure online. Find out how you can get involved.




protecting

Protecting Workers and Communities During the Clean Energy Transition

When I worked at the New York Attorney General's Office, we sued coal-fired power plants because their air pollution was making people sick. But in some towns, I saw that the reliance on coal really had people in a bind. The coal plant was making them sick, but it was also a major tax generator for the town. If the plant closed, the town might have to lay off teachers and cops, in addition to losing the plant jobs.




protecting

Protecting Intellectual Property during Lockdown

On 24 March 2020, the Companies and Intellectual Property Commission’s IP Registry suspended all internal and external-facing operations due to the national lockdown. The Registry will only resume operations two weeks after the national lockdo...




protecting

Protecting your IP when contracting with third parties – IP development and exploitation agreements – webinar

In this webinar for education institutions we will consider: - contract principles - early questions to consider: • what is the purpose of collaboration? • what IP may be generated? • who owns background IP? ...




protecting

Protecting companies from Coronavirus crime and fraud

Protecting companies from Coronavirus crime and fraud Whilst our communities, including the business community, are pulling together like never before to protect the country and the National Health Service from the Coronavirus outbreak, fraudsters a...




protecting

Coronavirus - Protecting your company and brand - Global

...




protecting

Protecting your interests - A guide to taking security in 21 countries worldwide

Companies trade in an increasingly global market. Despite this, the process of taking security in support of financial obligations remains essentially a question of the national law in the country where the assets over which security is granted are ...




protecting

Hungary: 'Yes to Protecting Women, No to Gender Ideology, Illegal Migration'

Hungary's parliament has passed a...




protecting

Protecting confidential information in an AI-led and augmented reality

Across the banking sector, the Bank of England and the Financial Conduct Authority predict that firms’ utilisation of artificial intelligence (AI) solutions will triple in the next three years (BoE and FCA Joint Report on Machine Learning in U...




protecting

The Boardwalk For Birds: Protecting Lake Victoria’s Dunga Beach Wetland

At around 11am on a Saturday, Luke Okomo arrives at Dunga Beach, on the outskirts of Kenya’s Kisumu City, and heads straight to what is known as the ‘Dunga Papyrus Boardwalk’. He pays Sh200 ($2), the daily fee for local tourists and students, and then joins a group of five visitors already taking a tour […]

The post The Boardwalk For Birds: Protecting Lake Victoria’s Dunga Beach Wetland appeared first on Inter Press Service.




protecting

Analysis: How important are face masks in protecting us from COVID-19?

1




protecting

Climate Change and Disasters: Protecting Townships in Bhutan

A major focus of the Phuentsholing Township Development Project is to provide a safer space in which the town can grow by helping develop a new urban center with raised ground levels in an area sheltered by the embankments.