Humanitarian Security Forum
  • ABOUT
  • FORUM
  • GLOSSARY
  • TRAINING
  • CONTACT
  • ACRONYMS
GLOSSARY OF HUMANITARIAN SECURITY TERMS
is an attempt to create single reference point for terminology as it is used now by different key stakeholders.
We also hope that this Glossary will be another step forward to standardizing terminology, so we can all speak the same language. 
Project is open for direct participation, and/or any suggestions you might have.
Picture
Have a definition or improvement to suggest for this Glossary?
​Please email: admin@hsforum.org
Picture
Picture
Picture
Picture
Picture
Picture
Picture
Picture
Picture
Picture
Picture
Picture
Picture
Picture
Picture
Picture
Picture
Picture
Picture
Picture
Picture
Picture
Picture
Picture
Picture
Picture
​A
 
Abandoned IED - [also called Remnant IED] is defined as a nonstandard device that has not been used, but is no longer in the control of any particular force. Due to the use of homemade explosives, fuses and other parts of abandoned IEDs are very hazardous and can be unstable. They could be exploded by any touch or also by change in the conditions of the surroundings. Also IEDs have been used to protect (abandoned) weapon and ammunition caches. (United Nations Mine Action Service (UNMAS). 2015. Mines, Explosive Remnants of War, and IED Safety Handbook. Available from: ​​http://www.mineaction.org/sites/default/files/publications/Handbook_English.pdf [Accessed 16 October, 2017])​
Abandoned ordnance (AO) - is ordnance that has not been used, but is no longer in the control of any particular force. AO could include mortar rounds, grenades, bombs, rockets, bullets, artillery rounds and so on. Sometimes abandoned ordnance may include small caches of weapons which have been lost in the course of fighting only to turn up later. (United Nations Mine Action Service (UNMAS). 2015. Mines, Explosive Remnants of War, and IED Safety Handbook. Available from: http://www.mineaction.org/sites/default/files/publications/Handbook_English.pdf  [Accessed 16 October, 2017])​
Abduction - (1) the taking of a person against his or her will. Distinct from ‘kidnapping’, which implies a demand made (e.g. a ransom) for the victim’s return. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])
(2) a person or group is forcibly taken against his/her/their will illegally but no demands are made. The abductors may intend to cause harm or force the abductees to do something for their benefit. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​
Abuse of power [by authorities] - The use of legislated, executive, or otherwise authorised powers by government officials for illegitimate private gain. An illegal act by an office-holder constitutes abuse of power only if the act is directly related to their official duties. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
Acceptance - (1) acceptance is founded on effective relationships and cultivating and maintaining consent from beneficiaries, local authorities, belligerents and other stakeholders. This in turn is a means of reducing or removing potential threats in order to access vulnerable populations and undertake programme activities. (Fast, Larissa, and Michael O'Neill. 2010. A closer look at acceptance. Humanitarian Exchange Magazine 47:3-6. Available from: http://odihpn.org/magazine/a-closer-look-at-acceptance/ [Accessed 24 September, 2017])​
(2) Building a safe operating environment through consent, approval and cooperation from individuals, communities and local authorities. (Bickley, S. (2017) Security Risk Management: a basic guide for smaller NGOs. European Interagency Security Forum (EISF).)
(3) Acceptance Reduces or removes the threat by gaining acceptance for our presence and work. (International Federation of Red Cross and Red Crescent Societies. 2007. The International Federation’s guide to a safer mission. Available from: http://www.ifrc.org/Global/Documents/Secretariat/201402/Stay-Safe-manual-EN.pdf [Accessed 16 October, 2017]
Acceptance approach - an approach to security that attempts to negate a threat through building relationships with local communities and relevant stakeholders in the operational area, and obtaining their acceptance and consent for the organisation’s presence and its work. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])
Access denied - Acts that a) prevent an organisation from reaching beneficiaries or potential beneficiaries for needs assessments or direct service provision or acts that b) prevent beneficiaries from reaching services provided by an organisation. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
Accidents - random events that result in harm, damage or loss to an organisation, its staff or programmes. In contrast, ‘incidents’ are motivated by the will of individual(s) to cause harm to persons or entities, to seize assets or to disrupt the delivery of aid, either by direct targeting of that agency or agency personnel, or otherwise.  (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])​
Administrative liability for criminal acts - responsibility attaching to an organisation for criminal acts or omissions punishable by administrative sanctions (Italian concept). Kemp, E. & Merkelbach, M. (2011). Can you get sued? Legal liability of international humanitarian aid agencies toward their staff. Security Management Initiative. Available from: http://dutyofcareinternational.co.uk/wp-content/uploads/2017/01/Can-you-get-sued.pdf [Accessed 30 November, 2017])​
Alert - Advisory that hazard is approaching but is less imminent than implied by warning message. See also "warning". (UN Department of Humanitarian Affairs. 1992. Internationally agreed glossary of basic terms related to Disaster Management. (DHA/93/36) Available from: https://reliefweb.int/report/world/internationally-agreed-glossary-basic-terms-related-disaster-management [Accessed 27 September, 2017])​
​Ambush - (1) a sudden attack made from a concealed position. Often used in the context of road/vehicle attacks. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])
(2) a sudden attack against a person or vehicle made from a concealed position, attackers’ intentions may be to rob, threaten, or kill their target.​ (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​​​​​​​
Analysis - the process of turning unorganised facts, figures, objects, etc., into meaningful information which can be used for different purposes, such as informing decision-making. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])​
Analytical skills - the ability to visualise, articulate, conceptualise or solve both complex and uncomplicated problems, including the ability to apply logical thinking to break complex problems into their component parts. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])​
Anti-personnel mine - A landmine designed to injure or kill one or more persons. Antipersonnel mines are usually detonated when they are stepped on or when a tripwire is disturbed, but they can also be set off by the passage of time or by controlled means. Anti-personnel mines can be secured against removal and could also be found in combination with anti-vehicle mines. (United Nations Mine Action Service (UNMAS). 2015. Mines, Explosive Remnants of War, and IED Safety Handbook. Available from: http://www.mineaction.org/sites/default/files/publications/Handbook_English.pdf [Accessed 16 Oct, 2017])​
Anti-vehicle mine - Often referred to as anti-tank mines, anti-vehicle mines are landmines designed to disable or destroy vehicles, including tanks. Like anti-personnel mines, anti-vehicle mines can be detonated by pressure (though normally much greater weight is needed) or remote control, as well as by magnetic influence or through the disturbance of a tilt rod (a type of vertical tripwire). Anti-vehicle mines can be secured against removal and could also be found in combination with anti-personnel mines. (United Nations Mine Action Service (UNMAS). 2015. Mines, Explosive Remnants of War, and IED Safety Handbook. Available from: http://www.mineaction.org/sites/default/files/publications/Handbook_English.pdf [Accessed 16 October, 2017])​
Armed robbery - (1) the unlawful taking of the property of another individual or group by the use of violence or intimidation with a dangerous or deadly weapon. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​​​​​​​
(2) A robbery at gunpoint or in which the perpetrators of the robbery carried firearms that affected employees or property.
(redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
Arrest - The seizure of a person whether or not by physical force by someone acting under legal authority of the state body or officials (police, secret services, etc.) in connection with a crime or offence (which may or may not have actually be committed by the seized individual) and where the person is not free to leave. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​​​​​​​
Arson - Any fire damaging property or endangering employees that is caused intentionally. Arson includes, but is not limited to, the use of incendiary devices, the intentional sabotage of electrical systems or gas lines/tanks, and the use of an accelerant to destroy the property.​(redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
Assault - any attempted or successful physical attack or use of violence against a person to cause harm or do bodily injury to the victim. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​​​​​​​
B
 
Battlefield survival - measures to lessen the risk of death or injury when under fire, or in an area which is under fire from any sort of weapon. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​
Biometrics - (1) [infortmation technologies] Biometrics use physical characteristics of the users to determine access. (On-line Glossary of Terms. SANS Institute. Available from:  https://www.sans.org/security-resources/glossary-of-terms/ [Accessed 26 October, 2017])​
Blackmail - Threats, extortion or the manipulation of someone to compel them to do something; includes obtaining something, especially money, through force or threats. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
Booby trap - (1) an improvised or custom-made explosive usually attached to or concealed under ordinary objects, which acts as a mine to deter or harm people approaching the booby trap area. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])
(2) 
An explosive or non-explosive device, deliberately placed to cause casualties when an apparently harmless object is disturbed or a normally safe act is performed, like opening a door or turning on a television. All booby traps that use explosives are considered improvised explosive devices (IEDs). (United Nations Mine Action Service (UNMAS). 2015. Mines, Explosive Remnants of War, and IED Safety Handbook. Available from: http://www.mineaction.org/sites/default/files/publications/Handbook_English.pdf [Accessed 16 October, 2017])​
Botnet - A botnet is a large number of compromised computers that are used to create and send spam or viruses or flood a network with messages as a denial of service attack. (On-line Glossary of Terms. SANS Institute. Available from:  https://www.sans.org/security-resources/glossary-of-terms/ [Accessed 26 October, 2017])​
Bounding Mine - An anti-personnel mine which is set off by a tripwire or pressure and then explodes in the air at a predetermined height, scattering fragments in all directions. (United Nations Mine Action Service (UNMAS). 2015. Mines, Explosive Remnants of War, and IED Safety Handbook. Available from: http://www.mineaction.org/sites/default/files/publications/Handbook_English.pdf [Accessed 16 October, 2017])​
Break-in - The act of unlawfully gaining entrance into aid agency premises or vehicles, with the intention of theft. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
Burglary - Break in to a staff residence, usually with the intention of theft. Use if individuals were sleeping or otherwise unaware of the break-in. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
C
 
Car-jacking - (1) the stealing of a car by armed force, while the driver is in the car. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​
(2) [Carjacking/ Hijacking] - any incident in which a vehicle containing an employee(s) or owned by the organisation is forcibly seized. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
Chatham House Rule - When a meeting, or part thereof, is held under the Chatham House Rule, participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed. Available from: https://www.chathamhouse.org/about/chatham-house-rule [Accessed 19 November, 2017])​​
Checkpoint - [incident report] A non-border or frontier checkpoint erected in areas under military, paramilitary, or armed group control to monitor or control the movement of people and materials that impact the delivery of aid. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
Chemical accident - Accidental release occurring during the production, transportation or handling of hazardous chemical substances. (UN Department of Humanitarian Affairs. 1992. Internationally agreed glossary of basic terms related to Disaster Management. (DHA/93/36) Available from: https://reliefweb.int/report/world/internationally-agreed-glossary-basic-terms-related-disaster-management [Accessed 27 September, 2017])​
Civil–military coordination - (1) the interface between military actors (including peace operations) and civilian actors deployed in the field, particularly those from the humanitarian and development community. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf  [Accessed 24 September, 2017])​​
(2) The essential dialogue and interaction between civilian and military actors in humanitarian emergencies that is necessary to protect and promote humanitarian principles, avoid competition, minimize inconsistency, and when appropriate pursue common goals. Basic strategies range from coexistence to cooperation. Coordination is a shared responsibility facilitated by liaison and common training. (Civil-Military Guidelines and Reference for Complex Emergencies. UN IASC. 2008. Available from:  http://ochaonline.un.org/cmcs/guidelines [Accessed 6 December, 2017])​​​​​​​
Civil defence - The system of measures, usually run by a governmental agency, to protect the civilian population in wartime, to respond to disasters, and to prevent and mitigate the consequences of major emergencies in peacetime. (UN Department of Humanitarian Affairs. 1992. Internationally agreed glossary of basic terms related to Disaster Management. (DHA/93/36) Available from: 
​
https://reliefweb.int/report/world/internationally-agreed-glossary-basic-terms-related-disaster-management [Accessed 27 September, 2017])​
Clan - a social grouping of people united by kinship, defined by perceived descent from a common ancestor. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​
Communications tree - an arrangement to spread information rapidly, such as a security alert, whereby one person or agency informs a predetermined list of others, who in turn then inform those on their lists, and so on. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf                    [Accessed 24 September, 2017])​​
Complex Emergency - a humanitarian crisis in a country, region, or society where there is a total or considerable breakdown of authority resulting from internal or external conflict and which requires an international response that goes beyond the mandate or capacity of any single agency and/or the ongoing UN country programme. (Civil-Military Guidelines and Reference for Complex Emergencies. UN IASC. 2008. Available from:  http://ochaonline.un.org/cmcs/guidelines [Accessed 6 December, 2017])​​​​​​​
Compound mentality - the tendency of an organisation to discuss and analyse the external environment from within the protective confines of its ‘compound’, with little reference to or interaction with actors in the external environment. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​
Concentration Point - A structure where staff can be concentrated in times of crisis. The structure should have adequate sleeping area, sanitation facilities and emergency supplies for the planned use. United Nations Field Security Handbook. 2006. Available from:  http://psm.du.edu/media/documents/international_regulation/united_nations/other/un_field_security_handbook.pdf [Accessed 26 October, 2017])​
Confidential [information] - has significant value for the organisation, and unauthorised disclosure or dissemination of it could result in severe reputational damage or adverse impact on the organisation’s operations. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
Confidentiality - the need to ensure that information is disclosed only to those who are authorized to view it. (On-line Glossary of Terms. SANS Institute. Available from:  https://www.sans.org/security-resources/glossary-of-terms/ [Accessed 26 October, 2017])​
Contingency planning - a management tool used to ensure adequate preparation for a variety of potential emergency situations. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​
Convoy - a group of vehicles (or ships) travelling together in an organised manner for mutual support and protective purposes. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​
Counter-surveillance - watching whether you are being watched. A strategy to detect whether your movements or facilities are being studied by people with malicious intent, e.g. for kidnapping, bombing or armed robbery. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​
Criminal liability - individual or (in some countries) corporate responsibility for an act or omission under criminal laws. Kemp, E. & Merkelbach, M. (2011). Can you get sued? Legal liability of international humanitarian aid agencies toward their staff. Security Management Initiative. Available from: http://dutyofcareinternational.co.uk/wp-content/uploads/2017/01/Can-you-get-sued.pdf [Accessed 30 November, 2017])​
Crisis - (1) an event that requires a response greater than that possible through routine management or procedures. The response may require additional input from specialist and/or higher-level management (likely at headquarters level). Many organisations will categorise as ‘critical’ an incident that must be managed as a crisis situation. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])​
(2) An event that significantly disrupts normal operations, has caused or is likely to cause severe distress, or has severe consequences for individuals, staff or organisations, and requires extraordinary measures to restore order and normality, thus demanding immediate action from senior management. (Bickley, S. (2017) Security Risk Management: a basic guide for smaller NGOs. European Interagency Security Forum (EISF).)
Crisis Management Team - (1) A team that manages a crisis situation (i.e. a critical incident) at headquarters or regional level. (Bickley, S. (2017) Security Risk Management: a basic guide for smaller NGOs. European Interagency Security Forum (EISF).)
Critical incident - (1) a security incident that significantly disrupts an organisation’s capacity to operate; typically life is lost or threatened, or the incident involves mortal danger. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​
(2) An event or series of events that seriously threatens the welfare of personnel, potentially resulting in death, life-threatening injury or illness and triggers an organisation’s crisis management response. A critical incident may also be an event that has a serious impact on programmes, organisation assets or reputation. Bickley, S. (2017) Security Risk Management: a basic guide for smaller NGOs. European Interagency Security Forum.
(3) A situation that, threatens, or has impacted on, the safety / security of Federation personnel, assets or operations to the extent that there is the potential to be a significant disruption or even incapacity to continue to operate. (International Federation of Red Cross and Red Crescent Societies. 2007. Stay safe: The International Federation’s guide for security managers.)
(4) a breach of the safety or security of organization staff, dependants, third party individuals in the course of the organization’s work, or an organization’s property which disrupts normal, routine operations and which requires a response other than routine management or procedures. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​
(5) an incident that disrupts normal, routine operations. A critical incident can result in death, life-threatening injury or illness and triggers an organisation’s crisis management response. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])​
Critical incident management team (CIMT) - a group created for the purpose of managing the organisational response to crisis situations. Typically will involve staff members who have been pre-identified and trained, and who are familiar with the critical incident management procedures and protocols of their organisation.​ (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​
Cyber attack -Deliberate exploitation of computer systems, technology-dependent enterprises and networks resulting in disruptive consequences that can compromise data and lead to cybercrimes. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
D
 
Danger habituation - a usually unconscious adjustment of one’s threshold of acceptable risk resulting from constant exposure to danger; the result is a reduction of one’s objective assessment of risk, possibly leading to increased risk-taking behaviour. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: 
​
www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​
Data - facts and statistics collected together for reference or analysis; information in a raw or unorganised form that refers to, or is represented by, conditions, ideas, or objects. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])​
Defense In-Depth - is the approach of using multiple layers of security to guard against failure of a single security component. (On-line Glossary of Terms. SANS Institute. Available from:  https://www.sans.org/security-resources/glossary-of-terms/ [Accessed 26 October, 2017])​
Detention - (1) the holding of a person by someone acting under authority (e.g. police, border guards) where the person is not free to leave. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​
(2) a person or group is held against his/her/their will by another individual or group which does not intend to harm the detainee(s) and has not set any clear precondition for release. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​
(3) [incident report] Keeping a staff member in custody prior to official charges or without any official charges; includes temporary detention for hours or days. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
Deterrence - (1) Reducing the risk by containing the threat with a counter threat (for example, armed protection, diplomatic/political leverage, temporary suspension). Bickley, S. (2017) Security Risk Management: a basic guide for smaller NGOs. European Interagency Security Forum (EISF).
(2) Counter threats with legal, political or economic sanctions and/or armed actions that may have severe implications and impact on those presenting the threat. (International Federation of Red Cross and Red Crescent Societies. 2007. The International Federation’s guide to a safer mission. Available from: http://www.ifrc.org/Global/Documents/Secretariat/201402/Stay-Safe-manual-EN.pdf [Accessed 16 October, 2017])
Deterrence approach - an approach to security that attempts to deter a threat by posing a counter-threat, in its most extreme form through the use of armed protection. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​
Direct threat - where the organization and/or specific staff are the intended target of the potential act/threat. ​(Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​
Disaster - A serious disruption of the functioning of society, causing widespread human, material or environmental losses which exceed the ability of affected society to cope using only its own resources. Disasters are often classified according to their cause (natural or manmade). (UN Department of Humanitarian Affairs. 1992. Internationally agreed glossary of basic terms related to Disaster Management. (DHA/93/36) Available from: https://reliefweb.int/report/world/internationally-agreed-glossary-basic-terms-related-disaster-management [Accessed 27 September, 2017])​
Duty of care - (1) There are two types of Duty of Care: moral and legal. [...] Legal Duty of Care is an obligation imposed on an individual or organisation by law requiring that they adhere to a standard of reasonable care while performing acts (or omissions) that present a reasonably foreseeable risk of harm to others. A key terminological difference in an international context is that the civil law systems tend to refer to ‘legal responsibility’ rather than the ‘duty of care’, which is an Anglo-Saxon concept used mainly in the common law world. (Kemp, E. & Merkelbach, M. (2016). Duty of Care: A review of the Dennis v Norwegian Refugee Council ruling and its implications. European Interagency Security Forum (EISF).)
(2) The legal and moral obligation of an organisation to take all possible and reasonable measures to reduce the risk of harm to those working for, or on behalf of, the organisation.
(Bickley, S. (2017) Security Risk Management: a basic guide for smaller NGOs. European Interagency Security Forum (EISF).)
E
 
Emergency - A sudden and usually unforeseen event that calls for immediate measures to minimize its adverse consequences. (UN Department of Humanitarian Affairs. 1992. Internationally agreed glossary of basic terms related to Disaster Management. (DHA/93/36) Available from: https://reliefweb.int/report/world/internationally-agreed-glossary-basic-terms-related-disaster-management [Accessed 27 September, 2017])​
Emergency medical system (EMS) - The aggregate of resources and personnel required to deliver medical care to those with an unpredicted, immediate health need outside established medical facilities. (UN Department of Humanitarian Affairs. 1992. Internationally agreed glossary of basic terms related to Disaster Management. (DHA/93/36) Available from: https://reliefweb.int/report/world/internationally-agreed-glossary-basic-terms-related-disaster-management [Accessed 27 September, 2017])​
Encryption - Cryptographic transformation of data (called "plaintext") into a form (called "cipher text") that conceals the data's original meaning to prevent it from being known or used. (On-line Glossary of Terms. SANS Institute. Available from:  https://www.sans.org/security-resources/glossary-of-terms/ [Accessed 26 October, 2017])​
Evacuation - (1) the withdrawal of staff across an international border. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​
(2) the withdrawal of staff across an international border when the maximum level of acceptable risk has been surpassed, usually because of an imminent danger to operations. Evacuation also involves program suspension. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​
(3) Movement of internationally recruited staff members and/or dependants outside the country of assignment during Phase V. (United Nations Field Security Handbook. 2006. Available from: http://psm.du.edu/media/documents/international_regulation/united_nations/other/un_field_security_handbook.pdf [Accessed 26 October, 2017])​
Event - an occurrence or change of a particular set of circumstances. (Within this handbook, an ‘event’ is used interchangeably with ‘incident’.) (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: 
​
https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])​
Explosive remnants of war (ERW) - All ordnance that remains after armed conflict and which have an explosive potential. This includes unexploded ordnance, abandoned ordnance, booby traps, IEDs, and in some circumstances abandoned or destroyed military vehicles and equipment. In international legal parlance, explosive remnants of war (ERW) do not normally include landmines, as landmines and ERW are dealt with under two distinct international conventions: the Anti-Personnel Mine-Ban Treaty and the Convention on Certain Conventional Weapons (Protocol V). (United Nations Mine Action Service (UNMAS). 2015. Mines, Explosive Remnants of War, and IED Safety Handbook. Available from: http://www.mineaction.org/sites/default/files/publications/Handbook_English.pdf [Accessed 16 October, 2017])​
Exposure - extent to which an organization and/or stakeholder is subject to an event. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Expulsion - Act of forcing a staff member or organisation to leave a country or territory. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
Extortion - (1) the use of coercion or intimidation to obtain money, property or patronage. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​
(2) demanding money, goods or services from a person by threat. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​​​​​​​
F
 
Fault-based liability - responsibility for loss or damage by act or omission requiring proof of intentional or negligent conduct. Kemp, E. & Merkelbach, M. (2011). Can you get sued? Legal liability of international humanitarian aid agencies toward their staff. Security Management Initiative. Available from: http://dutyofcareinternational.co.uk/wp-content/uploads/2017/01/Can-you-get-sued.pdf [Accessed 30 November, 2017])​
Field Vehicles - Those vehicles appropriate for heavy duty in a crisis or high-risk environment. Typically high-quality, 4x4, four door utility type vehicles, fitted with appropriate communications and specialised equipment as appropriate.  (United Nations Field Security Handbook. 2006. Available from: http://psm.du.edu/media/documents/international_regulation/united_nations/other/un_field_security_handbook.pdf [Accessed 26 October, 2017])​
Fine - Money that must be paid by the organisation as a punishment for not obeying a rule or law. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
Firewail - Walls which are intended to be fire barriers. (UN Department of Humanitarian Affairs. 1992. Internationally agreed glossary of basic terms related to Disaster Management. (DHA/93/36) Available from: https://reliefweb.int/report/world/internationally-agreed-glossary-basic-terms-related-disaster-management [Accessed 27 September, 2017])​
Firewall - A logical or physical discontinuity in a network to prevent unauthorized access to data or resources. (On-line Glossary of Terms. SANS Institute. Available from:  https://www.sans.org/security-resources/glossary-of-terms/ [Accessed 26 October, 2017])​
First aid - The immediate but temporary care given on site to the victims of an accident or sudden illness in order to avert complications, lessen suffering, and sustain life until competent services or a physician can be obtained. (UN Department of Humanitarian Affairs. 1992. Internationally agreed glossary of basic terms related to Disaster Management. (DHA/93/36) Available from: 
​https://reliefweb.int/report/world/internationally-agreed-glossary-basic-terms-related-disaster-management [Accessed 27 September, 2017])​
Forced closure - Order by government or other authorities to halt operations in a country or territory; includes closure affecting only one or multiple programmes. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
Fraud - Wrongful or criminal deception intended to result in financial or personal gain. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
G
 
Gender-based violence (GBV) - violence directed against a person on the basis of gender. It includes acts that inflict physical, mental or sexual harm or suffering, threats of such acts, coercion or other deprivations of liberty. While both sexes and all ages can be victims of gender-based violence, because of their subordinate status women and girls are the primary victims. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​
Gender-sensitive security assessment - to ensure that while doing an assessment you consider the security and safety related needs, experiences, issues, and priorities of women and men with reference to historical and existing context, such as specific threats, vulnerabilities, status, stereotypes and the overall risks examined. (Persaud, C. 2012. Gender and Security Guidelines for Mainstreaming Gender in Security Risk Management. EISF Briefing Paper. Av. from: https://www.eisf.eu/library/gender-and-security-guidelines-for-mainstreaming-gender-in-security-risk-management/ [Accessed 16 Oct, 2017])​
Gender-sensitive security risk management - within this framework gender considerations are an integral part of decision-making throughout the overarching philosophy, application of approaches and use of resources that frame organisational security management. The framework recognises the different inequalities, specific security needs, experiences, issues and priorities of women, men (and LGBTI). Acting on this awareness, the agency aims to adequately reduce the level of risk and achieve equitable levels of security for their male and female personnel. (Persaud, C. 2012. Gender and Security Guidelines for Mainstreaming Gender in Security Risk Management. EISF Briefing Paper. Available from: https://www.eisf.eu/library/gender-and-security-guidelines-for-mainstreaming-gender-in-security-risk-management/ [Accessed 16 October, 2017])​
Gender-specific risk - likelihood and potential impact of a threat that is specific to women, men, boys and girls, by virtue of their gender. (Persaud, C. 2012. Gender and Security Guidelines for Mainstreaming Gender in Security Risk Management. EISF Briefing Paper. Available from: https://www.eisf.eu/library/gender-and-security-guidelines-for-mainstreaming-gender-in-security-risk-management/ [Accessed 16 October, 2017])​
Gender-specific vulnerability - a vulnerability whereby the determining factor, level and exposure to a threat is directly attributed to gender.
(Persaud, C. 2012. Gender and Security Guidelines for Mainstreaming Gender in Security Risk Management. EISF Briefing Paper. Available from: https://www.eisf.eu/library/gender-and-security-guidelines-for-mainstreaming-gender-in-security-risk-management/ [Accessed 16 October, 2017])​
Gender responsive mitigation strategy - creating an enabling working environment and conditions through gender sensitive assessments (situational analysis and risk, threat and vulnerability analysis) that inform standard operating procedures and contingency planning by considering gender-sensitive security strategies, staff selection, codes of conduct, programme development and policy. The mitigation strategy will thereby be aimed at reducing the level of risk for the particular safety and security of their female and male staff, in a specific context. (Persaud, C. 2012. Gender and Security Guidelines for Mainstreaming Gender in Security Risk Management. EISF Briefing Paper. Available from: https://www.eisf.eu/library/gender-and-security-guidelines-for-mainstreaming-gender-in-security-risk-management/ [Accessed 16 October, 2017])​
Gendered security mainstreaming - consists of strategically assessing and including gender-specific considerations to make women’s and men’s concerns and experiences an integral dimension of the design, implementation, monitoring and evaluation of security policies, guidelines and procedures, as well as incorporating these considerations in the safe implementation of programmes in the existing operational context. (Persaud, C. 2012. Gender and Security Guidelines for Mainstreaming Gender in Security Risk Management. EISF Briefing Paper. Available from: https://www.eisf.eu/library/gender-and-security-guidelines-for-mainstreaming-gender-in-security-risk-management/ [Accessed 16 October, 2017])​
H
 
Harassment - (1) abusive conduct, verbal or physical, directed at a person, which causes distress or discomfort. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​
(2) any unwanted and offensive conduct (verbal or physical) directed at a person with the intent of causing distress; the conduct is directed at a person for some reason, often due to a person’s race, religion, nationality, gender, or to interfere with his/her/their work or activities. Harassment may be a one-time event but often consists of persistent attacks. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​​​​​​​
Hazard - A threatening event, or the probability of occurrence of a potentially damaging phenomenon within a given time period and area. (UN Department of Humanitarian Affairs. 1992. Internationally agreed glossary of basic terms related to Disaster Management. (DHA/93/36) Available from: https://reliefweb.int/report/world/internationally-agreed-glossary-basic-terms-related-disaster-management [Accessed 27 September, 2017])​
Hazardous material - A substance or material which has been determined by an appropriate authority to be capable of posing an unreasonable risk to health, safety and property. (UN Department of Humanitarian Affairs. 1992. Internationally agreed glossary of basic terms related to Disaster Management. (DHA/93/36) Available from: https://reliefweb.int/report/world/internationally-agreed-glossary-basic-terms-related-disaster-management [Accessed 27 September, 2017])​
Hibernation - (1) the process of sheltering in place until danger passes or further assistance is rendered. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017]) 
(2) 
Staff staying behind in one or more fortified sites (so-called safe houses) in a crisis zone because the extraordinary event is assumed to be temporary, or relocation is impossible or perceived too dangerous to undertake. (International Federation of Red Cross and Red Crescent Societies. 2007. Stay safe: The International Federation’s guide for security managers.)
(3) staying in a relatively secure structure and location while keeping a low profile in the midst of a danger zone because relocation/evacuation is not possible and program operations cannot continue. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​
Hijacking - [Carjacking/Hijacking] any incident in which a vehicle containing an employee(s) or owned by the organisation is forcibly seized. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
​Horizontal information flow - the sharing of information laterally between organisations, and between organisations and stakeholders. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])​
Hostage situation - (1) where a person or group is held in a siege situation in a known location. Similar to a kidnapping scenario, their safety and subsequent release is usually dependent on the fulfilment of certain conditions. These conditions may include: the publicising of a political cause; the exchange of hostages for political prisoners; or the evasion of prosecution by criminals when their activity has been discovered by the authorities. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​
(2) where a person or group is held with his/her/their safety and subsequent release dependent on the fulfillment of certain conditions (usually political goals) defined by the captors. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​​​​​​​
Hostile Environment Training - one of several types of training that comes predominantly from a military approach and terminology for personal security training for severe security risk situations survival and hard technical avoidance. (Christine Persaud. 2014. How to Create Effective Security Training for NGOs. Project by EISF and InterAction. Available from: 
​https://www.interaction.org/sites/default/files/InterAction%20and%20EISF%20Security%20Training%20Project%202014.pdf  [Accessed 10 September, 2017])​
Humanitarian Actor - Humanitarian actors are civilians, whether national or international, UN or non-UN, governmental or nongovernmental, which have a commitment to humanitarian principles and are engaged in humanitarian activities. (Civil-Military Guidelines and Reference for Complex Emergencies. UN IASC. 2008. Available from:  http://ochaonline.un.org/cmcs/guidelines [Accessed 6 December, 2017])​​​​​​​
I
 
Imprisonment - Holding of a staff member in a known official or unknown location, such as a prison, often following formal charges. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
Improvised explosive device (IED) - (1) a bomb which can be placed more or less anywhere, for instance on a roadside or in a vehicle, bag, parcel, letter or clothing.  (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​
(2) 
is defined as a nonstandard device, usually fabricated from readily available material. It incorporates explosives or other (CBRN-) agents and has destructive, lethal or noxious properties. High quality, series production, technology transfer and further development make IEDs into a serious hazard. (United Nations Mine Action Service (UNMAS). 2015. Mines, Explosive Remnants of War, and IED Safety Handbook. Available from: http://www.mineaction.org/sites/default/files/publications/Handbook_English.pdf [Accessed 16 October, 2017])​
Incident - (1) any event(s) in which staff safety or security is compromised; any dependant or other third party is injured or harmed in the course of the organisation’s activities; property or belongings of the organisation are stolen, damaged or put at risk; where there is interference with the delivery of aid and/or the independent work of the aid agency is compromised, including reputational damage. Incidents can further be categorised as: Critical Incidents, [...] Near misses, [...] Accidents. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])​
(2) any event(s) or near miss(es) of an event(s) where (i) staff safety or security is compromised, (ii) there is a threat (violent or otherwise) to staff or staff are injured or killed; (iii) any dependant or other third party is injured or harmed in the course of the organization’s activities, or (iv) organization property or belongings are stolen, damaged, or put at risk. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​
(3) [information technologies] an adverse network event in an information system or network or the threat of the occurrence of such an event.(On-line Glossary of Terms. SANS Institute. Available from:  https://www.sans.org/security-resources/glossary-of-terms/ [Accessed 26 October, 2017])​
Incident analysis - deeper and more critical inquiry into the structural and contextual factors that allowed a security incident to happen; questioning the effectiveness of security management, and asking whether or to what degree the agency or one or more of its staff members could have been perceived to be ‘provoking’ anger or aggression. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​
Incident inquiry - the collection of situational and circumstantial information about an incident beyond the basic facts stated in the incident report. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​
Incident mapping - the visualisation, usually on a map but potentially also in a timeframe, of when and where and what type of incidents happened in an attempt to find patterns and identify high-risk areas and high-risk times. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​
Indirect Threat - where the organization and/or specific staff are not the intended target of a threat, but may nevertheless be indirectly affected.​ ​(Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​
Information management - umbrella term used to describe policies and guidelines designed to: regulate the types of information organisations collect, store and communicate; reduce the risks to beneficiaries, staff and organisations inherent in these processes; and ensure that information can be accessed by the right people in a timely manner. (Ayre, R. 2010. The Information Management Challenge: A Briefing on Information Security for Humanitarian Non-Governmental Organisations in the Field. EISF.)
Information Security - Preservation of confidentiality, integrity and availability of information. Note: In addition, other properties, such as authenticity, accountability, non-repudiation and reliability can also be involved. (ISO/IEC 27000:2009 (E). (2009). Information technology - Security techniques - Information security management systems - Overview and vocabulary.)
Internal Use [information] - The dissemination of the information to the relevant stakeholders ensures good organisational functioning and internal responses within the organisation. Its release will not cause any damage to the organisation or its staff, but is nonetheless considered undesirable. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
Intrusion - Wrongful or unauthorised entry into aid agency premises, vehicles or staff residences by criminals or civilians (but not state authorities). (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
J
 
Jurisdiction - the geographic area over which a legal authority extends/ the authority to hear and determine causes of action. Kemp, E. & Merkelbach, M. (2011). Can you get sued? Legal liability of international humanitarian aid agencies toward their staff. Security Management Initiative. Available from: http://dutyofcareinternational.co.uk/wp-content/uploads/2017/01/Can-you-get-sued.pdf [Accessed 30 November, 2017])​
K
 
Kidnapping - (1) the forcible capture and detention of someone with the explicit purpose of obtaining something (money, materials or certain actions) in return for their life and release. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])
(2) situation where a person or group is taken and then threatened with harm with the aim of coercing money, goods, or services from either the individuals or those associated with them (including employers, friends, relatives) in exchange for the safe release of those kidnapped. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​​​​​​​
L
 
Legal responsibility - being responsible for an act or omission as required by law. Kemp, E. & Merkelbach, M. (2011). Can you get sued? Legal liability of international humanitarian aid agencies toward their staff. Security Management Initiative. Available from: http://dutyofcareinternational.co.uk/wp-content/uploads/2017/01/Can-you-get-sued.pdf [Accessed 30 November, 2017])​
Level of risk - magnitude of a risk or combination of risks, expressed in terms of the combination of consequences and their likelihood. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Liability - being responsible for loss or damage by act or omission as required by law and the obligation to repair and/or compensate for any loss or damage caused by that act or omission and/or other sanction imposed by a court. Kemp, E. & Merkelbach, M. (2011). Can you get sued? Legal liability of international humanitarian aid agencies toward their staff. Security Management Initiative. Available from: http://dutyofcareinternational.co.uk/wp-content/uploads/2017/01/Can-you-get-sued.pdf [Accessed 30 November, 2017])​
Likelihood - chance of something happening. Note 1 to entry: In risk management terminology, the word “likelihood” is used to refer to the chance of something happening, whether defined, measured or determined objectively or subjectively, qualitatively or quantitatively, and described using general terms or mathematically [such as a probability or a frequency over a given time period].  (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Looting - Theft during unrest, violence, riots or other upheavals.​ (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
M
 
Medevac - medical evacuation. The transfer of a patient by road, sea or air for the purpose of obtaining medical treatment in another location. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
Military Actor - Military actors refer to official military forces, i.e., military forces of a state or regional-/inter-governmental organisation that are subject to a hierarchical chain of command, be they armed or unarmed, governmental or inter-governmental. This may include a wide spectrum of actors such as the local or national military, multi-national forces, UN peacekeeping troops, international military observers, foreign occupying forces, regional troops or other officially organized troops. (Civil-Military Guidelines and Reference for Complex Emergencies. UN IASC. 2008. Available from:  http://ochaonline.un.org/cmcs/guidelines [Accessed 6 December, 2017])​​​​​​​
Mine Action - Activities that address the threat of landmines, ERW and remnant IEDs to civilian populations. Mine action usually includes five mutually supporting activities, including: [1] Risk education and awareness raising; [2] Advocacy to ban landmines and other weapons that have indiscriminate effects; [3] Assistance to victims of landmines, ERW and remnant IEDs; [4] Mine clearance and explosive ordnance disposal; and [5] The destruction of stockpiled landmines. Mine action does not generally include the removal or destruction of improvised explosive devices. More often such threats are dealt with by security forces, such as the police. (United Nations Mine Action Service (UNMAS). 2015. Mines, Explosive Remnants of War, and IED Safety Handbook. Available from: 
​http://www.mineaction.org/sites/default/files/publications/Handbook_English.pdf [Accessed 16 October, 2017])​
​Mine action centre - A centre that coordinates and regulates mine action activities within a country. A government or the United Nations usually runs such centres. (United Nations Mine Action Service (UNMAS). 2015. Mines, Explosive Remnants of War, and IED Safety Handbook. Available from: http://www.mineaction.org/sites/default/files/publications/Handbook_English.pdf [Accessed 16 October, 2017])​
Mine marking - The organized marking of minefields. Standard, easily recognizable mine warning signs are placed around the perimeter of the minefield to alert people to the presence of mines. ​(United Nations Mine Action Service (UNMAS). 2015. Mines, Explosive Remnants of War, and IED Safety Handbook. Available from: http://www.mineaction.org/sites/default/files/publications/Handbook_English.pdf [Accessed 16 October, 2017])​
Mob - an aggressive group of people with destructive or violent intent. Neighbourhood watch - a more or less formalised scheme among neighbours to keep an eye open for suspicious people and crime. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
Monitoring [in context of Risk Management] - continual checking, supervising, critically observing or determining the status in order to identify change from the performance level required or expected. Note 1 to entry: Monitoring can be applied to a risk management framework, risk management process, risk or control.​ (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
N
 
Near misses - events that almost result in harm, damage or loss to the organisation, its staff or programmes or had the potential to result in serious injury, death or kidnapping and only caused minor injury, damage or loss. Can also be referred to as a ‘near hit’ or ‘close call’. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])​
O
 
P
 
Personal Security - building deeper awareness and abilities for individuals to better assess and guide their prevention and response strategies depending on the fluidity of possible security scenarios in violent and complex security risk environments. (Christine Persaud. 2014. How to Create Effective Security Training for NGOs. Project by EISF and InterAction. Available from: 
​https://www.interaction.org/sites/default/files/InterAction%20and%20EISF%20Security%20Training%20Project%202014.pdf [Accessed 10 September, 2017])​
Personnel - staff, volunteers, and any other individual coming under the organisation’s umbrella, including consultants, partners, visitors, etc. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])​
Piracy - Attacking and robbing ships at sea or boats on rivers.​ (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
Post-traumatic stress disorder (PTSD) - a psychological condition that may affect people who have suffered severe emotional trauma; may cause sleep disturbances, flashbacks, anxiety, tiredness and depression. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
Private security provider/contractor/company - a private entity providing remunerated security services to individuals or organisations. These services can range from ‘soft’ security (e.g. consultancy, training and logistical support) to ‘hard’ security (e.g. guarding services, armed protection) to crisis and risk management, training of armed forces and even operational command and combat. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
Prodding - a key technique used in extraction from a suspected minefield, whereby the soil is carefully examined for possible mines before a foot is set on it. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​
Property entry search - Search of a premise by external authorities. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
Protection - (1) used here as distinct from ‘safety’ and ‘security’ to refer to the protection of civilians and non-combatants who are not aid agency staff. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010.  Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
(2) Reducing the vulnerability of the organisation to a possible threat, for example, by building walls or hiring guards. Bickley, S. (2017) Security Risk Management: a basic guide for smaller NGOs. European Interagency Security Forum (EISF).
(3) Protection Reduces the risk by reducing vulnerability, not the threat, by using protective procedures and equipment to ‘harden the target’. (International Federation of Red Cross and Red Crescent Societies. 2007. The International Federation’s guide to a safer mission. Available from: http://www.ifrc.org/Global/Documents/Secretariat/201402/Stay-Safe-manual-EN.pdf [Accessed 16 October, 2017])
Protection approach - an approach to security that emphasises the use of protective procedures and devices to reduce vulnerability to existing threats; does not affect the level of threat. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​
Psychological First Aid (PFA) - a humane, supportive response to a fellow human being who is suffering and who may need support. (World Health Organization, War Trauma Foundation and World Vision International (2011). Psychological first aid: Guide for field workers. WHO: Geneva. Available from: http://www.who.int/mental_health/publications/guide_field_workers/en/ [Accessed 24 November, 2017])​​​​​
Public [information] - The dissemination of the information through the news, media and other channels would not pose any risk to the organisation or its staff, and its release is considered desirable or non-objectionable at least. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
​Back to top
Q
 
R
 
Radio Room - More accurately defined as a communications centre, the ‘radio room’ is to be equipped and fitted with those means of communications appropriate for the country security plan and may include, email, satellite telephone, facsimile, VHF/UHF radio base stations, HF base stations, landline telephone, Telex or other system. An identified alternate site should also be identified so that a rapid change can be instigated if necessary. (United Nations Field Security Handbook. 2006. Available from: http://psm.du.edu/media/documents/international_regulation/united_nations/other/un_field_security_handbook.pdf [Accessed 26 October, 2017])​
Relocation - (1) the withdrawal of staff from an area of operations to a safer location, usually within the same country. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
(2) Internal [Relocation] - The physical withdrawal of staff and/or their eligible dependants, family members, spouses and authorized visitors and assets from a crisis spot to a safer location within the same country. External [Relocation] - The physical withdrawal of internationally recruited staff and their eligible dependants, family members, spouses and authorized visitors from a crisis spot across an international border. (International Federation of Red Cross and Red Crescent Societies. 2007. Stay safe: The International Federation’s guide for security managers. Available from: http://www.ifrc.org/Global/Documents/Secretariat/201402/Stay-Safe-management-EN.pdf [Accessed 16 October, 2017])
(3)  the physical withdrawal of staff and possibly assets from one area where conditions are insecure, to another area where it is safe within the same country. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​
(4) Relocation: Movements of staff members and/or dependants within the country of assignment or outside the country in Phases III and IV. 
(United Nations Field Security Handbook. 2006. Available from: http://psm.du.edu/media/documents/international_regulation/united_nations/other/un_field_security_handbook.pdf [Accessed 26 October, 2017])​
​Residual risk - risk remaining after risk treatment. Note 1 to entry: Residual risk can contain unidentified risk. Note 2 to entry: Residual risk can also be known as “retained risk”.  (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Resilience - adaptive capacity of an organization in a complex and changing environment. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Restricted [information] - Disclosure or dissemination of this information is not intended, as it may impact people’s lives, cause some negative publicity or limited reputational damage or potential fnancial losses to the organisation. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
Review [in context of Risk Management] - activity undertaken to determine the suitability, adequacy and effectiveness of the subject matter to achieve established objectives. Note 1 to entry: Review can be applied to a risk management framework, risk management process, risk or control. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk​ - (1) the likelihood and potential impact of encountering a threat. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010.  Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
(2) the uncertainty of the likelihood and impact of encountering a threat while pursuing objectives. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​
(3) effect of uncertainty on objectives. [...] Risk is often expressed in terms of a combination of the consequences of an event (including changes in circumstances) and the associated likelihood of occurrence. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk acceptance - informed decision to take a particular risk. Note 1 to entry: Risk acceptance can occur without risk treatment or during the process of risk treatment. Note 2 to entry: Accepted risks are subject to monitoring and review. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk aggregation - combination of a number of risks into one risk to develop a more complete understanding of the overall risk. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk analysis - process to comprehend the nature of risk and to determine the level of risk Note 1 to entry: Risk analysis provides the basis for risk evaluation and decisions about risk treatment. Note 2 to entry: Risk analysis includes risk estimation.  (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk appetite - amount and type of risk (1.1) that an organization is willing to pursue or retain. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk assessment - overall process of risk identification, risk analysis and risk evaluation. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk assessment/analysis​ - an attempt to consider risk more systematically in terms of the threats in the environment, particular vulnerabilities and security measures to reduce the threat or reduce your vulnerability. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
Risk attitude - The organisation’s approach to assessing and eventually pursuing, retaining, taking or turning away from risk. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk avoidance - informed decision not to be involved in, or to withdraw from, an activity in order not to be exposed to a particular risk.
Note 1 to entry: Risk avoidance can be based on the result of risk evaluation and/or legal and regulatory obligations.
 (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk criteria - terms of reference against which the significance of a risk is evaluated. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
[Risk] Control -  measure that is modifying risk Note 1 to entry: Controls include any process, policy, device, practice, or other actions which modify risk. Note 2 to entry: Controls may not always exert the intended or assumed modifying effect. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk description - risk description structured statement of risk usually containing four elements: sources, events, causes and consequences. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk financing - form of risk treatment involving contingent arrangements for the provision of funds to meet or modify the financial consequences should they occur. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk identification - process of finding, recognizing and describing risks [...] Risk identification involves the identification of risk sources, events, their causes and their potential consequences. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk management - (1) The coordinated activities that direct and control an organisation with regard to risk. Bickley, S. (2017) Security Risk Management: a basic guide for smaller NGOs. European Interagency Security Forum (EISF).
(2) coordinated activities to direct and control an organization with regard to risk. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk management audit - systematic, independent and documented process for obtaining evidence and evaluating it objectively in order to determine the extent to which the risk management framework, or any selected part of it, is adequate and effective.​ (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk management framework - set of components that provide the foundations and organizational arrangements for designing, implementing, monitoring, reviewing and continually improving risk management throughout the organization. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk management policy - statement of the overall intentions and direction of an organization related to risk management. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
​Risk management plan - scheme within the risk management framework specifying the approach, the management components and resources to be applied to the management of risk. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk management process - systematic application of management policies, procedures and practices to the activities of communicating, consulting, establishing the context, and identifying, analyzing, evaluating, treating, monitoring and reviewing risk. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk matrix - tool for ranking and displaying risks by defining ranges for consequence and likelihood. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk profile - description of any set of risks. Note 1 to entry: The set of risks can contain those that relate to the whole organization, part of the organization, or as otherwise defined. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk reduction - the purpose of your security management, by reducing the threat or reducing vulnerability. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
Risk register - risk register record of information about identified risks. Note 1 to entry: The term “risk log” is sometimes used instead of “risk register”. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk reporting - form of communication intended to inform particular internal or external stakeholders by providing information regarding the current state of risk and its management. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk sharing - form of risk treatment involving the agreed distribution of risk with other parties. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk tolerance - organization's or stakeholder's readiness to bear the risk after risk treatment in order to achieve its objectives. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Risk treatment - process to modify risk. Note 1 to entry: Risk treatment can involve: avoiding the risk by deciding not to start or continue with; the activity that gives rise to the risk; taking or increasing risk in order to pursue an opportunity; removing the risk source; changing the likelihood; changing the consequences; sharing the risk with another party or parties [including contracts and risk financing; and retaining the risk by informed decision. Note 2 to entry: Risk treatments that deal with negative consequences are sometimes referred to as “risk mitigation”, “risk elimination”, “risk prevention” and “risk reduction”. Note 3 to entry: Risk treatment can create new risks or modify existing risks. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Roadblock - a barricade or other obstruction set up to restrict or prevent movement along a road, with the primary purpose of attacking or robbing passing vehicles. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​​​​​​​
Robbery - the unlawful taking of the property of another individual or group by the use of violence or intimidation. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​​​​​​​
Rules of engagement - guidelines to soldiers or armed guards regarding the conditions under which they can use force, and stipulating how much force may be used. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​
S
 
Safety - (1) freedom from risk or harm as a result of unintentional acts (accidents, natural phenomenon or illness). (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
(2) Freedom from risk or harm resulting from unintentional or accidental acts, events or hazards. Bickley, S. (2017) Security Risk Management: a basic guide for smaller NGOs. European Interagency Security Forum (EISF).
(3) a level of non-violent threats that is as low as reasonably practical to enable staff to access vulnerable populations for humanitarian purposes. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​
Safety and Security - Safety and Security is defined as policies, measures and incidents relating to safety and security of humanitarian aid workers in the field. Safety and security of civilians is covered under “Protection and Human Rights.” (ReliefWeb. Humanitarian Terms. Available from: https://reliefweb.int/taxonomy-descriptions [Accessed 15 October, 2017])​​​​​​
Scenario planning - forward planning about how a situation may evolve in the future, and how threats might develop; reviewing the assumptions in plans and thinking about what to do if they do not hold. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
Search and rescue - The process of locating and recovering disaster victims and the application of first aid and basic medical assistance as may be required. (UN Department of Humanitarian Affairs. 1992. Internationally agreed glossary of basic terms related to Disaster Management. (DHA/93/36) Available from: https://reliefweb.int/report/world/internationally-agreed-glossary-basic-terms-related-disaster-management [Accessed 27 September, 2017])​
Secondary hazards - Those hazards that occur as a result of another hazard or disaster, i.e., fires or landslides following earthquakes, epidemics following famines, food shortages following drought or floods. (UN Department of Humanitarian Affairs. 1992. Internationally agreed glossary of basic terms related to Disaster Management. (DHA/93/36) Available from: https://reliefweb.int/report/world/internationally-agreed-glossary-basic-terms-related-disaster-management [Accessed 27 September, 2017])​
Security - (1) freedom from risk or harm resulting from violence or other intentional acts. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
(2) Freedom from risk or harm resulting from intentional acts of violence, aggression and/or criminal acts against agency staff, assets or property. (Bickley, S. (2017) Security Risk Management: a basic guide for smaller NGOs. European Interagency Security Forum (EISF).)
(3) ​a level of violent threats that is as low as reasonably practical to enable staff to access vulnerable populations for humanitarian purposes. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​
Security (alert) phases - a summary classification of various possible levels of risk and insecurity in the environment, each of which requires a specific set of mandatory security procedures. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​
Security audit - An internal or external evidence-based review of an organisation’s security risk management framework and its implementation, which assesses the effectiveness of the security risk management framework in enabling the delivery of the organisation’s objectives, and whether the organisation is meeting its duty of care responsibilities to staff. (Bickley, S. (2017) Security Risk Management: a basic guide for smaller NGOs. European Interagency Security Forum (EISF).)
Security auditing - an evaluation of the strengths and weaknesses in an organisation’s security management and infrastructure in order to assess its effectiveness and identify areas for improvement. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​
 Security Coordination - Those policies, procedures, and practices designed to improve staff security through inter-agency collaboration, especially through developing common security standards, sharing security resources, and sharing security-related information. (Designing Security Methods for Improving Security Managing Practices and Security among Humanitarian Organizations. V. Bolletino, ATHA, 2007)
Security culture - The ‘culture’ of an organisation can be simply defined as ‘the way we do things around here’. Every organisation has a culture towards security, safety and risks in general. (Bickley, S. (2017) Security Risk Management: a basic guide for smaller NGOs. EISF.)
Security incident - (1) Any situation or event that has caused, or could result in, harm to staff, associate personnel or a third party, significant disruption to programmes and activities, or substantial damage or loss to the organisation’s property or its reputation. (Bickley, S. (2017) Security Risk Management: a basic guide for smaller NGOs. European Interagency Security Forum (EISF).
(2) Any situation, occasion, or incident in which: (a) The safety or well-being of those coming under the Federations security management is compromised or put at risk in any way, (b)Those coming under the Federations security management are injured or threatened with harm of any kind, (c) Any third party is injured or harmed in the course of the Federation’s or other under the Federation’s security management activities, or is put at risk of injury or harm. (d)Federation property and property of those coming under the Federations security management, property of third party working on Federation/PNS programs or operations, or the private belongings of Federation personnel are damaged, stolen or put at risk. (International Federation of Red Cross and Red Crescent Societies. 2007. Stay safe: The International Federation’s guide for security managers. Available from: http://www.ifrc.org/Global/Documents/Secretariat/201402/Stay-Safe-management-EN.pdf [Accessed 16 Oct, 2017])
Security incident information - data and information linked to a specific security event or a sequence of events. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])​
Security incident information management - the collection, reporting, recording, analysis, sharing and use of information (including data) linked to a security incident with the overarching aim of obtaining unhindered access for the delivery of aid by improving organisational security risk management. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])​
Security Management - Those practices adopted by humanitarian organizations to ensure the security of their personnel, property, and programs, including, though not limited to, staff security training, risk assessment methods, incident reporting, improving security equipment, and crisis management procedures. (Designing Security Methods for Improving Security Managing Practices and Security among Humanitarian Organizations. V. Bolletino, ATHA, 2007)
Security plan - Key country-level documents that outline the security and safety measures and procedures in place, and the responsibilities and resources required to implement them. (Bickley, S. (2017) Security Risk Management: a basic guide for smaller NGOs. EISF.)
Security policy - A global document that provides a clear statement of the organisation’s approach to security and safety risks, the key principles underpinning this approach, and the roles and responsibilities all staff members have in managing these risks. (Bickley, S. (2017) Security Risk Management: a basic guide for smaller NGOs. European Interagency Security Forum (EISF).​
[Security] Risk assessment - A process through which the organisation identifies the different security and safety threats that could affect staff, assets and programmes, and analyses risks according to the likelihood and impact to determine the degree of risk involved. Bickley, S. (2017) Security Risk Management: a basic guide for smaller NGOs. European Interagency Security Forum (EISF).
Security Risk Management - the culture, processes and structures that are directed towards maximising benefits or advantages and minimising disadvantages in security, consistent with achieving business objectives. Guidelines for NGO Professional Safety & Security Risk Management. Irish Aid. Available from: https://www.irishaid.ie/media/irishaid/allwebsitemedia/20newsandpublications/irish-aid-guidelines-for-ngo-professional-safety-and-security-risk-management.pdf [Accessed 20 November, 2017])​
Security risk management framework - a set of policies, protocols, plans, mechanisms and responsibilities that supports the reduction of security risks to staff, programmes and an organization. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])​
Security strategy - the overarching philosophy, application of approaches and use of resources that frame organisational security management. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
Sexual abuse - actual or threatened physical intrusion of a sexual nature, whether by force or under unequal or coercive conditions.​ (Special Measures For Protection From Sexual Exploitation And Sexual Abuse. Secretary-General’s Bulletin. 2003. ST/SGB/2003/13. Available from: http://undocs.org/ST/SGB/2003/13 [Accessed 6 December 2017])
Sexual aggression - the act or threat of rape, sexual assault and intimidation, sexual harassment or unwanted touching. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
Sexual exploitation - ​any actual or attempted abuse of a position of vulnerability, differential power, or trust, for sexual purposes, including, but not limited to, profiting monetarily, socially or politically from the sexual exploitation of another. (Special Measures For Protection From Sexual Exploitation And Sexual Abuse. Secretary-General’s Bulletin. 2003. ST/SGB/2003/13. Available from: http://undocs.org/ST/SGB/2003/13 [Accessed 6 December 2017])
Sexual violence - any sexual act, attempt to obtain a sexual act, unwanted sexual comments or advances, or acts to traffic a person’s sexuality, using coercion, threats of harm or physical force, by any person regardless of relationship to the victim, in any setting, including but not limited to home and work. Sexual violence takes many forms, including rape, sexual slavery and/or trafficking, forced pregnancy, sexual harassment, sexual exploitation and/or abuse, and forced abortion. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])​
Small arms - weapons used for self-protection and close or short-range combat. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​
Social reference - a recommendation or personal guarantee about a potential recruit from someone who has not necessarily had any professional involvement with the recruit but knows their standing and reputation within a community. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​
​Soft Skills - personal attributes that enable someone to interact effectively and harmoniously with other people; subjective talents people possess in a job, including good listening and speaking capabilities, pleasant manner, positive attitude, integrity and social skills. (Christine Persaud. 2014. How to Create Effective Security Training for NGOs. Project by EISF and InterAction. Available from: https://www.interaction.org/sites/default/files/InterAction%20and%20EISF%20Security%20Training%20Project%202014.pdf [Accessed 10 September, 2017])​
Spam - Electronic junk mail or junk newsgroup postings. (On-line Glossary of Terms. SANS Institute. Available from:  https://www.sans.org/security-resources/glossary-of-terms/ [Accessed 26 October, 2017])​ 
Spoof - [information technologies] Attempt by an unauthorized entity to gain access to a system by posing as an authorized user. (On-line Glossary of Terms. SANS Institute. Available from:  https://www.sans.org/security-resources/glossary-of-terms/ [Accessed 26 October, 2017])​ 
Stakeholder - person or organization that can affect, be affected by, or perceive themselves to be affected by a decision or activity. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
Standard operating procedures - formally established procedures for carrying out particular operations or dealing with particular situations, specifically regarding how to prevent an incident happening, survive an incident or follow up on an incident as part of the agency’s crisis management planning. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​
Stress - a state of emotional strain or severe or prolonged worry. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
Strict liability - responsibility for loss or damage by act or omission without proof of intentional or negligent conduct. Kemp, E. & Merkelbach, M. (2011). Can you get sued? Legal liability of international humanitarian aid agencies toward their staff. Security Management Initiative. Available from: http://dutyofcareinternational.co.uk/wp-content/uploads/2017/01/Can-you-get-sued.pdf [Accessed 30 November, 2017])​
T
 
Terrain awareness - being attentive to the physical and social environment, where potential dangers may come from and help or cover might be found. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
Terrorism - acts intended to inflict dramatic and deadly injury on civilians and to create an atmosphere of fear, generally in furtherance of a political or ideological objective. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​
Theft - taking and appropriating property without the consent of its owner or any lawful authority. (Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​​​​​​​
Threat - (1) a danger in the operating environment. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
(2) Any safety- or security-related or other form of challenge to the organisation, its staff, assets, reputation or programme that exists in the context where the organisation operates. (Bickley, S. (2017) Security Risk Management: a basic guide for smaller NGOs. EISF.)
(3) A security threat is a potential act or danger in the operational environment that may cause injury or harm to staff and assets. (International Federation of Red Cross and Red Crescent Societies. 2007. Stay safe: The International Federation’s guide for security managers. Available from: http://www.ifrc.org/Global/Documents/Secretariat/201402/Stay-Safe-management-EN.pdf [Accessed 16 October, 2017])
(4) a danger (or potential act) in the operating environment that may result in harm or injury to staff, loss of or damage to agency property or to an agency program. ​(Dick A. (2010) Creating Common NGO Security Terminology: A Comparative Study. Security Management Initiative. Available from:  https://www.eisf.eu/library/creating-common-ngo-security-terminology-a-comparative-study/ [Accessed 26 October, 2017])​
Threat assessment/analysis - the attempt to examine more systematically the nature, origin, frequency and geographical concentration of threats. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
Threat mapping - visualising and illustrating threats on a geographical map. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​
Threshold of acceptable risk - the point beyond which the risk is considered too high to continue operating; influenced by the probability that an incident will occur, and the seriousness of the impact if it occurs. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
Tort - a wrongful act or an infringement of a right (other than under contract) leading to legal liability. Kemp, E. & Merkelbach, M. (2011). Can you get sued? Legal liability of international humanitarian aid agencies toward their staff. Security Management Initiative. Available from: http://dutyofcareinternational.co.uk/wp-content/uploads/2017/01/Can-you-get-sued.pdf [Accessed 30 November, 2017])​
Trainer - a person who trains or teaches (a person or animal) a particular skill or type of behavior through sustained practice and instruction. (Christine Persaud. 2014. How to Create Effective Security Training for NGOs. Project by EISF and InterAction. Available from: https://www.interaction.org/sites/default/files/InterAction%20and%20EISF%20Security%20Training%20Project%202014.pdf [Accessed 10 September, 2017])​
Triangulation - cross-checking information or details by comparing different sources. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
Tripwire - A thin, non-reflective metal or coloured wire, which can be used as a mechanism to trigger an anti-personnel mine or a booby trap. A tripwire is usually stretched low above the ground so that any passer-by will “trip” over it, thus setting off the explosive.  (United Nations Mine Action Service (UNMAS). 2015. Mines, Explosive Remnants of War, and IED Safety Handbook. Available  from: http://www.mineaction.org/sites/default/files/publications/Handbook_English.pdf [Accessed 16 October, 2017])​
Typology of incidents - the classification of incidents according to general types. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])​
U
 
Unexploded ordnance (UXO) - (1) any type of munition (bullet, hand grenade, mortar shell, etc.) that has been fused (prepared for firing) but not used, or that has been fired but has not gone off and is considered unstable and dangerous. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
(2)
 Explosive munitions that have not yet been set off. Unexploded ordnance (UXO) may already have been fired, dropped, or launched, but has failed to detonate as intended. (United Nations Mine Action Service (UNMAS). 2015. Mines, Explosive Remnants of War, and IED Safety Handbook. Available from: http://www.mineaction.org/sites/default/files/publications/Handbook_English.pdf [Accessed 16 October, 2017])​
User - [information technologies] A person, organization entity, or automated process that accesses a system, whether authorized to do so or not. (On-line Glossary of Terms. SANS Institute. Available from:  https://www.sans.org/security-resources/glossary-of-terms/ [Accessed 26 October, 2017])​
​V
 
Vehicle accident - An accident involving an organisation’s vehicle. Vehicle refers to any form of transportation, including, but not limited to, cars, trucks, buses, motorcycles, etc. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])
Vertical information flow - information travelling up and down within an organisation’s structure. When a stakeholder in a region collects incident reports and sends them to headquarters for more detailed analysis, it is an ascending information flow. As information is analysed and conclusions are drawn, they may be disseminated in a descending direction to field staff. (redrUK, EISF, Insecurity Insight, Aid in Danger. 2017. Security Incident Information Management Handbook. Available from: https://www.redr.org.uk/getmedia/0b2d6c98-4b60-49d2-a976-d3069ac9625e/SIIM-Handbook-Sept2017.pdf [Accessed 14 October, 2017])​
Virus - [information technologies] A hidden, self-replicating section of computer software, usually malicious logic, that propagates by infecting - i.e., inserting a copy of itself into and becoming part of - another program. A virus cannot run by itself; it requires that its host program be run to make the virus active. (On-line Glossary of Terms. SANS Institute. Available from:  https://www.sans.org/security-resources/glossary-of-terms/ [Accessed 26 October, 2017])​
Vulnerability - (1) The organisation’s exposure to a threat. It will vary depending on the nature of the organisation, how it works, what programmes it undertakes, the characteristics of its staff, and its ability to manage risks. (Bickley, S. (2017) Security Risk Management: a basic guide for smaller NGOs. European Interagency Security Forum (EISF).)
(2) Vulnerability is the extent to which staff or assets are exposed to a threat. (International Federation of Red Cross and Red Crescent Societies. 2007. Stay safe: The International Federation’s guide for security managers.)
(3) intrinsic properties of something resulting in susceptibility to a risk source that can lead to an event with a consequence. (ISO/Guide 73:2009 (2015) Risk Management - Vocabulary. Available from:  https://www.iso.org/obp/ui/#iso:std:iso:guide:73:ed-1:v1:en [Accessed 26 October, 2017])​
W
 
Warning - Dissemination of message signalling imminent hazard which may include advice on protective measures. See also "alert" (UN Department of Humanitarian Affairs. 1992. Internationally agreed glossary of basic terms related to Disaster Management. (DHA/93/36) Available from: https://reliefweb.int/report/world/internationally-agreed-glossary-basic-terms-related-disaster-management [Accessed 27 September, 2017])​
Warden/warden system - one or more focal points, typically with responsibility for a set of people in a defined geographical area; the warden is an important node in the communications tree and will also ensure that all those under his or her responsibility follow agreed security procedures. (van Brabant, K. GPR8 – Operational Security Management in Violent Environments, Revised Edition. 2010. Overseas Development Institute (ODI). Available from: www.odihpn.org/wp-content/uploads/2010/11/GPR_8_revised2.pdf [Accessed 24 September, 2017])​​​​​​
Web of Trust - [information technologies] A web of trust is the trust that naturally evolves as a user starts to trust other's signatures, and the signatures that they trust. (On-line Glossary of Terms. SANS Institute. Available from:  https://www.sans.org/security-resources/glossary-of-terms/ [Accessed 26 October, 2017])​
Worm - A computer program that can run independently, can propagate a complete working version of itself onto other hosts on a network, and may consume computer resources destructively. (On-line Glossary of Terms. SANS Institute. Available from:  https://www.sans.org/security-resources/glossary-of-terms/ [Accessed 26 October, 2017])​
X
 
Y
 
Z
 
Zero-day attack [computers] - A zero-day (or zero-hour or day zero) attack or threat is a computer threat that tries to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer. (On-line Glossary of Terms. SANS Institute. Available from:  https://www.sans.org/security-resources/glossary-of-terms/ [Accessed 26 October, 2017])​
Zombies - A zombie computer (often shortened as zombie) is a computer connected to the Internet that has been compromised by a hacker, a computer virus, or a trojan horse. Generally, a compromised machine is only one of many in a botnet, and will be used to perform malicious tasks of one sort or another under remote direction. (On-line Glossary of Terms. SANS Institute. Available from:  https://www.sans.org/security-resources/glossary-of-terms/ [Accessed 26 October, 2017])​
Have a definition to suggest for this Glossary? Please email: admin@hsforum.org
Humanitarian Security Forum © COPYRIGHT 2017.
​ALL RIGHTS RESERVED.
  • ABOUT
  • FORUM
  • GLOSSARY
  • TRAINING
  • CONTACT
  • ACRONYMS