Presentation is loading. Please wait.

Presentation is loading. Please wait.

Gender-based Violence Information Management System

Similar presentations


Presentation on theme: "Gender-based Violence Information Management System"— Presentation transcript:

1 Gender-based Violence Information Management System

2 GBVIMS Overview The GBVIMS was created by UNHCR, IRC and UNFPA
The GBVIMS global initiative is now governed by a Steering Committee that includes UNFPA, IRC, UNHCR, UNICEF and WHO IRC plays the role of ‘NGO Liaison’ on part of the Steering Committee GBVIMS Overview

3 GBVIMS purpose The GBVIMS was created to:
Address the prevailing issues in data management for service providers (initially, mostly about quality – later, more about ethics/safety) Help facilitate safe and ethical data sharing between agencies to help inform the humanitarian community’s response to GBV GBVIMS purpose

4 GBVIMS purpose The GBVIMS was developed for:
Service providers who deliver case management or health services to GBV survivors in a humanitarian context. Agencies responsible for coordinating the humanitarian response to GBV in humanitarian settings. What the GBVIMS Can Do Allows service providers and coordination mechanisms to better understand the GBV cases being reported Enables actors to safely & ethically share data GBVIMS purpose

5 Persistent Problems with GBV Data
Poor quality of data – comparing apples to oranges Manual analysis of data – prone to errors Casual approach to storing data Sharing client data without their informed consent or knowledge Sharing too much data (i.e. intake forms) Sharing identifying data Persistent Problems with GBV Data

6 Examples of good Practice
Service provision must be available to GBV survivors if data is to be gathered from them Survivor/incident data must be non-identifiable Survivor/incident data can only be shared with the informed consent of the client Client case files (i.e. intake or incident report forms) are only shared within the context of a referral and with the consent of the survivor Client data must be protected at all times and only shared with those who are authorized An agreement must be established in collaboration with service providers to determine how data will be shared, protected, used and for what purpose – before data is shared Examples of good Practice

7 The GBVIMS Can Help Ensure Your Organization Adheres to Good Practice (and Generates Great Data!)

8 NOT a case management tool – snapshot at the time of report
NOT to be used as a data collection outside of the scope of service provision(i.e. by researchers, surveyors or human rights monitors) Does NOT generate prevalence data What the gbvims is not

9 GBVIMS Tools Incident Classification Tool Intake and Consent Form
Incident Recorder (excel) Information Sharing Protocol GBVIMS Tools

10 1 3 2 1 2 4 3 4 Reports & Proposals GBVIMS Data Informs Program Design
Advocacy Intake and Consent Form: collects information from survivors and protects survivor’s control over their information. GBV Classification Tool: standardizes GBV incidents making data easy to compile, compare, and analyze. Incident Recorder: an excel database designed to gather corresponding information from the intake form. The incident recorder automatically generates data and allows for customized analysis. Information Sharing Protocol Template: regulates the sharing of GBV data with other actors such as coordinating agencies. 1 2 4 3 4

11 GBVIMS classification tool
Type of incident/violence: (Select only ONE)  Rape  Sexual Assault  Physical Assault  Forced Marriage  Denial of resources, opportunities or services  Psychological/ Emotional Abuse GBVIMS classification tool

12 GBVIMS classification tool
1. Did the reported incident involve penetration? If yes  classify the incident as “Rape”. If no  proceed to the next incident type. 2. Did the reported incident involve unwanted sexual contact? If yes  classify the incident as “Sexual Assault”. If no  proceed to the next incident type ETC. GBVIMS classification tool

13 A 41 year old widow’s home was claimed by her husband’s family upon his death. She was beaten until she collected a few belongings and left. Did the reported incident involve penetration? 1 Did the reported incident involve unwanted sexual contact? 2 If ‘No’ 3 Did the reported incident involve physical assault? If ‘No’ If ‘Yes’ If ‘Yes’ STOP If ‘Yes’ Rape Sexual Assault Physical Assault

14 Flow of Data Reports & Proposals GBVIMS Data Informs Program Design
Advocacy Flow of Data

15 The Intake Form ADMINISTRATIVE INFORMATION SURVIVOR INFORMATION
DETAILS OF THE INCIDENT PERPETRATOR INFORMATION PLANNED ACTION ASSESSMENT POINTS The Intake Form

16 Key Characteristics of the Intake Form
Primary data collection tool - Collects all data necessary for the optimal functioning of the Incident Recorder The order of the form and all categories match the data columns found in the Incident Recorder, making data entry as easy as possible Limited fill-in-the-blank entry, to save time on data entry and avoid errors (uses tick boxes) Systematized definitions and categories ensures a minimum data set collected by all providers; some fields are customizable Needs to be securely stored Not to be shared except in the context of a referral and with the consent of the survivor Key Characteristics of the Intake Form

17 Incident recorder Purpose of the Incident Recorder
Safely stores standardized data (comparing apples to apples) Facilitates data entry and analysis Enable sharing of quantifiable elements of anonymous incident data Create aggregate statistics to determine correlations between characteristics and circumstances of GBV incidents Incident recorder

18 Key Features of the Incident Recorder
Based in Microsoft Excel No learning new software programs If you have never used Excel before, you will only need to learn a few easy commands to use the Incident Recorder Easy to enter data Anonymizes data for safe sharing Is protected Key Features of the Incident Recorder

19 Here are a few examples of the data that can be pulled out of the incident recorder…

20

21 Information Sharing Protocol
Key to Letting Data Flow Protocols clarify and enforce: what data will be shared for what purpose who compiles the data who has access the compiled statistics and for what purpose All ethical and safety issues must be considered before sharing data – including consent Information Sharing Protocol

22 Available Resources Website: www.gbvims.org
Resources: User Guide, Rollout Guidelines, Facilitator’s Guide, and Data Analysis E-Learning Tool Minimum technical support available via the GBV Steering and Skype (gbvimshelp) Available Resources


Download ppt "Gender-based Violence Information Management System"

Similar presentations


Ads by Google