Organisation name
Framework template
1. Our Constituency
-
Who are the beneficiaries of your DSHCS? Detail activity, field, gender, age, etc. The more accurately your constituency is defined the better you will be able to identify their needs and increase the quality of the service provided. -
What is the geographical scope of your constituency? -
Are there other DSHCSs providing services to the same constituency in your region? In such case what unattended needs will your DSHCS cover?
2. Our Constituency's Needs
If you decide, e.g., to support indigenous communities from a certain region, you could make a SWOT analysis to characterise them. For example:
Helpful | Harmful | |
---|---|---|
Internal | Strengths They are very well organised and have access to a wide range of resources. |
Weaknesses Vertical structure centralises decision making. |
External | Opportunities Many International Cooperation Agencies are allocating funds to indigenous communities. |
Threats Increasing criminalisation of indigenous communities. |
Now try using the same table for your beneficiaries:
Helpful | Harmful | |
---|---|---|
Internal | Strengths Describe your constituency's strengths |
Weaknesses Describe your constituency's weaknesses |
External | Opportunities Describe your constituency's opportunities |
Threats Describe the threats affecting your constituency |
You can complement the SWOT framework with a PESTLE analysis of the context in which your constituency operates.
Constituency | Political | Economical | Socio-Cultural | Technological | Legal | Environmental |
---|---|---|---|---|---|---|
Indigenous communities from X region | ... | ... | ... | ... | ... | ... |
Our Threat Model
Threat Matrix
Likelihood / Impact | Low | Medium | High |
---|---|---|---|
Likely | ... | ... | ... |
Less Likely | ... | ... | ... |
Unlikely | ... | ... | ... |
Threat Inventory
Fill in a table for each threat identified in the threat matrix.
Title | |
---|---|
Description | Brief characterisation of the threat. |
What | Target | Adversary | How | Where |
---|---|---|---|---|
The impacts the threat would cause | What or who is the target | Who do you think is behind the threat? | The means by which the threat can come to fruition | What are the physical spaces the threat can manifest? |
... | ... | ... | ... | ... |
3. Our Mission
What are your helpline's goals? Your mission statement should define your constituency, the situation you want to help overcome and how you plan to do it, as well as what services your helpline will provide.
Organisation Name - Mission |
---|
Describe your mission here: ......... ......... ......... ......... |
4. Setting
-
Will you be part of a larger organisation or constitute an independent project? -
Will you be volunteer-based or hire a team? -
How will your DSHCS will be funded?
5. Core Services
Service type | Service | Requirements |
---|---|---|
Reactive | Equipment replacement | Access to funding. Maybe we can refurbish old equipment for emergencies. |
Preventative | In-Person Digital Security Training | Need to find trainers in the area where the trainings will happen |
... | ... | ... |
... | ... | ... |
... | ... | ... |
6. Communication with your Constituency
Decide How Your Constituency Can Get in Touch
Channel | Advantages | Disadvantages | Accessibility for our constituency | Are we going to use it? |
---|---|---|---|---|
Form in website | Easy to install. Can be encrypted | Risk of spam | Accessible | Yes |
Telephone | Everybody can access a phone to call us | SIM cards need to be registered with an ID. | Accessible | No |
... | ... | ... | ... | ... |
... | ... | ... | ... | ... |
... | ... | ... | ... | ... |
Declare Your Availability and Response Time
-
Operation hours: -
How will support requests outside of operational hours be attended to? -
How will the DSHCS prevent burnout of team members on call?
Decide How to Communicate with Your Constituency
-
Will operators have an individual pseudonym or will they use a collective one? -
Does one operator always lead the communication with the person involved in a case? And if it is shared, is the conversation always conducted under the same pseudonym or does it change with each operator? -
Will the DSHCS adopt an informal tone or will operators keep their distance?
7. Policies
Policy | Description | Development and implementation | Responsible | Due date |
---|---|---|---|---|
1. Information Management Policy | Procedures on how to manage and protect information. | Yes | ... | ... |
2. Incident Response Plan | Roadmap for implementing the DSHCS' incident response capability. | Yes | ... | ... |
3. Vetting Policy | Steps to verify new beneficiaries. | Yes | ... | ... |
4. Code of Practice | Description of what is expected of the operators' behaviour. | Yes, but in a second stage | ... | ... |
5. Standard Operating Procedures | Steps for responding to requests, making referrals, etc. | Yes | ... | ... |
6. Funding Policy | ... | ... | ... | ... |
7. ... | ... | ... | ... | ... |