3. Threats & Challenges (example)
Terrorism
Heightened threat
of attacks against
authorities, and
foreign interests.
Abduction/
Kidnapping
Increase in kidnap
for ransom
incidents in South
East Region.
Armed Conflict
Regular clashes between
Gov and armed groups
in the South Eastern
Region.
RTA
RTAs are very
common incidents,
particularly on
major highways.
Crime
High levels of crime
in urban areas,
particularly in the
capital. Street crime a
risk in downtown
area. Increase in
office break-ins.
Harassment
Harassment and
bribery is common
in many aspects of
dealing with
authorities, and
security forces.
Sexual Violence
Sexual harassment towards
women is very common,
and although not widely
reported, sexual assault
risks are prevalent in all
areas of the country.
Earthquakes
Several active fault lines
cross the country and
earthquakes, usually minor
ones, occur frequently The
last serious quake affecting
the capital was August
2016.
Flooding
Flooding is a common
hazard. During the
rainy season there is
widespread flooding
throughout the county.
Violent Protests/
Civil Unrest
Political protests frequently
result in road blockades,
widespread unrest, and
violent clashes
4. Risks
Risk (possibility of suffering harm, loss, or injury) is a result of potential
threats(acts or events that will cause harm) in the operating environment and
our vulnerability(extent to which we are exposed) to them.
5. Vulnerability
What factors make us vulnerable to specific threats?
• Office/residence locations
• Building structures
• Project locations
• Travel routes
• Transport options
• Type of activities
• Working conditions
• Image/perception of organisation
• Resources
• Staff profile
• Staff awareness & capacity
6. Determine Risk
•The likelihood of a specific
threat occurring
•The potential impact should
it occur
Together, this analysis helps
us determine the risk that a
particular threat poses to us.
Notas do Editor
* Include maps that shows the security and safety situation in the operating area. For example:
Areas and locations affected by violence and insecurity, crime, or environmental hazards.
Any movement restrictions, or obstructions to humanitarian access.
The key actors and groups involved in the violence and insecurity.
*Adapt overview of threats and challenges to those most prevalent within the operating context.
Additional open source icons (OCHA) can be downloaded and included depending on the threats (https://www.dropbox.com/sh/tez260wz22f7q85/AAAZ9QyFQC4wsyqUpwHfXJlla/Humanitarian%20Icons%20PNG?dl=0&subfolder_nav_tracking=1)
* If internal training, adjust vulnerability factors to those relevant for your organisation and its activities, within the specific operating context.