l

“Understanding is the first step to acceptance, and only with acceptance can there be recovery"

  • Turkana, Kenya
    Turkana, Kenya
  • Novosibirsk, Russia
    Novosibirsk, Russia
  • Garowe, Somalia
    Garowe, Somalia
  • Garowe, Somalia
    Garowe, Somalia
  • Tahouna, Libya
    Tahouna, Libya
  • Donetsk, Ukraine
    Donetsk, Ukraine
  • Tete, Mozambique
    Tete, Mozambique
  • Donetsk, Ukraine
    Donetsk, Ukraine
  • Mariupol, Ukraine
    Mariupol, Ukraine
  • Mariupol, Ukraine
    Mariupol, Ukraine
  • Mariupol, Ukraine
    Mariupol, Ukraine
  • Donetsk, Ukraine
    Donetsk, Ukraine
  • Mariupol, Ukraine
    Mariupol, Ukraine
  • Mariupol, Ukraine
    Mariupol, Ukraine
  • Garowe, Somalia
    Garowe, Somalia
  • Volodarskiy, Ukraine
    Volodarskiy, Ukraine
  • Mariupol, Ukraine
    Mariupol, Ukraine
  • Ukraine
    Ukraine
 
Never before has the Humanitarian Community been required to operate in such challenging and high risk environments as it is today.
 

About Acceptance International

Acceptance International (AI) is registered as a non-governmental organization that provides support to Humanitarian Organisations that are programming in challenging and hostile environments.


The organisation, as of 2019 operates as a Safety and Security consultancy providing remote online support, advisories and training to organisations and individuals in the field. 

We also provide mentoring and support to Headquarters and Country Offices globablly. 



Acceptance International supports the Humanitarian Community to program safely in today’s complex Humanitarian space. 

We aim to use the Acceptance approach to NGO Safety and Security Management as a primary means to provide practical Security support in the field. We recognise that an integral aspect of establishing and building Acceptance the effective implementation of Humanitarian Programs.


Acceptance International engages a team who contribute a range of complimentary experiences and skill sets.



Acceptance International Area of Expertise


Key concepts and principles of security management

Understanding the importance of managing security risks

Organisational security management

Interagency security management

Transferring security risks

Host country regulations and security management


Strategic and Operational Approaches to Security Management

risk assessment

Systematic risk assessment

Key Security definitions

Context analysis: knowing where we are

Programme analysis: know who we are and what we want to do

Conducting Threat assessments

Conducting Vulnerability assessments

Conducting Risk analysis


Security strategy

Developing a security strategy

Establishing, Building and Developing Acceptance as a Safety and Security Management system

The Protection approach of Safety and Security management

Deterrence and armed protection


Evacuation, hibernation, remote management Programming and return

Evacuation and relocation

Hibernation

Remote management programming

Returning, post incident or relocation


Incident reporting and critical incident management

The importance of incident reporting and monitoring

Critical incident management

Post-incident management

Supporting people in security management

Managing and mentoring Field-level security managers

Building and developing Personal competence

Building and developing Team competence

Differentiating threats and risks for different types of staff

Managing Human resources

Providing support on Stress and stress management


Managing communications security

Safe and effective use of Telecommunications

Protecting communications equipment

Information security

Dealing with the media


Managing specific risk and threat situations

Travel and movement security

Security on arrival in a new location

Vehicles and security on the road

Road travel: incident preparedness and incident response

Safe Travel by aircraft and boat

Provision of checklists for staff preparation


Site security

Site selection

Physical perimeter reinforcement

Site security management

Work in areas under terrorist threat

Counter-surveillance

Managing safe Distribution sites


Addressing and limiting exposure to crowds, mobs and looting

Situational monitoring and analysis

Preventive action

Protection from crowds, mobs and looting


Improvements to cash security

Reducing the use of cash

Discretion

Limiting exposure

Electronic money security

Cash programming


Mitigation of Sexual aggression

Definitions and scope

Risk reduction

Surviving sexual assault

Crisis management

Preparation and training


Detention, arrest and abduction

Appropriate Detention, arrest and abduction Terminology

Risk reduction strategies

Incident response and crisis management


Kidnapping and hostage situations

Appropriate Definitions related to Kidnapping and hostage situations

Risk reduction

Surviving a kidnapping or hostage situation

Critical incident management

Communicating and negotiating with the captors

Managing the aftermath of a kidnapping

Preparation and training


Combat-related threats and remnants of war

Answering Core questions related to combat-related threats and remnants of war

Shelling and bombing

Crossfire and sniper fire

Mines, booby traps and unexploded ordnance

Guidance on specifics related to White phosphorus

Provision of reminders related to Remnants of war

See our ABOUT US page for further information