Community Update

Digital Empowerment Toolkit Now Available!

At World Pulse, we recognize the need for ongoing learning—for you and for your community! Our toolkits aim to provide the resources you need to advance your social change work.

We are excited to introduce our Digital Empowerment Trainers’ Toolkit, a dynamic resource to help you bring the benefits of connecting online to women in your community. Check it out today! »

Join Us for EncourageXchange Africa 2011: Securely Exchanging Information Through Technology

Event Date: 
June 24, 2011 - 09:00 - June 25, 2011 - 05:30

JOIN US IN Dar es Salaam, Tanzania, AFRICA
Securely Exchanging Information through Technology
June 24-25, 2011

In an interactive format over two days, this workshop will provide an explanation of, and solutions for, threats that are most often faced when using information and communication technologies for advocacy work.

How much does it Cost?
The event is FREE and Breakfast and Lunch will be provided by the organizers for the 2 days of the event. All travel, transportation, and accommodation expenses must be covered by the participant.

Where is the Workshop taking place?
Dar Es Salaam, Tanzania, AFRICA. Exact details provided upon acceptance of participant application.

Training Background:
Advocates, Journalists, and NGO leaders are increasingly concerned about their digital security. While computers and the Internet can be extremely powerful tools for advocacy, they also present new risks. This training workshop aims to minimize these risks by enabling participants to improve aspects of operational security, including the ability to effectively secure and exchange content using enhanced communication methods, thereby minimizing interference from external threats.

What will I learn?
By the end of the training, attendees will:
1. Understand what security threats exist when using the Internet and mobile technologies
2. Be able to set-up a secure communications platform toensure data security and mitigate risks
3. Understand how to use off-the-shelf technologies to help mitigate threats
4. Know how to bypass security threats to ensure effectiveness of advocacy work
5. Know how to avoid the most typical security risks nonprofits face when managing their communications networks
6. Know where to turn for advice and assistance

Who should attend:
Advocacy groups who use mobile phones and social media
Independent journalists
◦ Conventional
◦ Alternative media journalists
◦ Bloggers
Human Rights groups
Non-profit managers of local organizations with approximately 0-20 employees
Members of non-technical advocacy groups

Application process:
Register at:
Upon registration you will receive a brief survey application form which must be completed for consideration into the program. The survey can be found here:
Notification of acceptance of enrollment into the program will take place within 1 week of receipt of survey application.
Inquiries can be made to

TBA upon confirmation of participation
Dar es Salaam


Magazine »

Read global coverage through women's eyes

Inside Congo's Growing Sisterhood

Inside Congo's Growing Sisterhood

Community »

Connect with women on the ground worldwide

Face to Face with the U.S. Special Envoy to DRC

Face to Face with the U.S. Special Envoy to DRC

Campaigns »

Be heard at influential forums

WWW: Women Weave the Web

WWW: Women Weave the Web

Programs »

Help us train women citizen journalists

World Pulse Voices of Our Future

World Pulse Voices of Our Future

Blog »

Read the latest from World Pulse headquarters

Highlights of the 2014 World Pulse LIVE Tour

Highlights of the 2014 World Pulse LIVE Tour

Partners »

Join forces with our wide network of partners

Nobel Women's Initiative

Nobel Women's Initiative