The 65-page report names more than 15 commanders and officials from both the government Sudan People’s Liberation Army (SPLA) and the rebel SPLA-in Opposition and their allies who have used child soldiers. The report is based on interviews with 101 child soldiers who were either forcibly recruited... or joined forces to protect themselves and their communities. They said they lived for months without enough food, far away from family, and were thrown into terrifying gun battles in which they were injured and saw friends killed. Children also expressed deep regret that they had lost time they should have spent in school.
more
The Handbook is primarily addressed to child protection coordination teams, which may include coordinators, co-leads and information managers, the guidance is equally valid for all members of the child protection coordination group, including national and international nongovernmental organizations ...(NGOs), government representatives and other members, who seek to achieve an effective and coordinated response
more
From Individual to Collective healing: A trainer’s manual
Currently there is no publicly available source of consolidated information on attacks on health care in emergencies. This report is a first attempt to consolidate and analyse the data that is available from open sources. While the data are not comprehensive, the findings shed light on the severity ...and frequency of the problem.
more
This guidance highlights tangible, evidence-based priority actions in health and WASH programs to achieve the Global Targets for nutrition. Throughout the guidance the importance of cross-sectoral collaboration within and outside the Red Cross Red Crescent Movement to holistically address nutrition ...is emphasised.
more
Despite the stated centrality of protection in humanitarian action and a growing attention to protection activities, the evaluation of protection has received relatively little attention. This pilot guide seeks to fill this gap, providing insights and guidance to those evaluating protection in the c...ontext of humanitarian action
more
Gender-based violence, including rape is a problem throughout the world, occurring in every society, country and region. Refugees and internally displaced people are particularly at risk of this violation during every phase of an emergency situation. The systematic use of sexual violence as a method... of warfare is well documented and constitutes a grave breach of international humanitarian law.
The Arabic Version can be downloaded here: http://reliefweb.int/report/syrian-arab-republic/guidelines-health-staff-caring-gender-based-violence-survivors-including
more
Section One
summarizes UNHCR’s mandate of international protecdtion and the aim and principles of emergency
response;
Section Two
deals with emergency management;
Section Three
covers the vital sectors and problem areas in refugee emergencies, including health, food, sanitation
and water, a...s well as key field activities underpinning the operations such as logistics, community
services and registration. The chapters in this section start with a summary so that readers, who
might not need the full level of detail in each of these chapters, can understand the basic principles of
the subject quickly;
Section Four
gives guidance on the support to field operations, primarily administration and staffing;
The Appendices
include a “Toolbox” which gathers, in one location, the standards, indicators and useful references
used throughout the handbook;
more
BioMed Central; BMC International Health and Human Rights (2016) 16:20; DOI 10.1186/s12914-016-0094-y
Conceived as part of the CWS-A/P project on regional security and risk management, this book presents a
collection of testimonies from aid workers in some of the most insecure and volatile environments in the world.
The participants recount a broad array of security incidents, such as kidnappings,... suicide bombings, mob
violence, road ambushes, and point-blank range shootings. Their narrative provides valuable information on
how organizations can manage security risks and streamline safety policies.
more