{"id":1317,"date":"2026-03-23T12:08:57","date_gmt":"2026-03-23T12:08:57","guid":{"rendered":"https:\/\/safenarratives.org\/?page_id=1317"},"modified":"2026-03-26T11:33:34","modified_gmt":"2026-03-26T11:33:34","slug":"elementor-1317","status":"publish","type":"page","link":"https:\/\/safenarratives.org\/index.php\/en\/elementor-1317\/","title":{"rendered":"FAQ"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1317\" class=\"elementor elementor-1317\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f6cce0b e-flex e-con-boxed e-con e-parent\" data-id=\"f6cce0b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-921f13e e-con-full e-flex e-con e-child\" data-id=\"921f13e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c424fd8 elementor-widget elementor-widget-image\" data-id=\"c424fd8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/safenarratives.org\/wp-content\/uploads\/2026\/03\/Untitled-design-15-300x300.png\" class=\"attachment-medium size-medium wp-image-699\" alt=\"\" srcset=\"https:\/\/safenarratives.org\/wp-content\/uploads\/2026\/03\/Untitled-design-15-300x300.png 300w, https:\/\/safenarratives.org\/wp-content\/uploads\/2026\/03\/Untitled-design-15-1024x1024.png 1024w, https:\/\/safenarratives.org\/wp-content\/uploads\/2026\/03\/Untitled-design-15-150x150.png 150w, https:\/\/safenarratives.org\/wp-content\/uploads\/2026\/03\/Untitled-design-15-768x768.png 768w, https:\/\/safenarratives.org\/wp-content\/uploads\/2026\/03\/Untitled-design-15-1536x1536.png 1536w, https:\/\/safenarratives.org\/wp-content\/uploads\/2026\/03\/Untitled-design-15-2048x2048.png 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2982c89 e-con-full e-flex e-con e-child\" data-id=\"2982c89\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-20cce2c elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"20cce2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2 data-elementor-setting-key=\"title\" style=\"color: #3875DD;font-family: 'Montserrat', sans-serif;font-weight: 900;font-size: 45px;text-align: left;margin: 0\">\n    <strong>Frequently asked questions<\/strong>\n<\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ae856ba e-grid e-con-boxed e-con e-parent\" data-id=\"ae856ba\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8691ba elementor-widget elementor-widget-n-accordion\" data-id=\"e8691ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2430\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2430\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Why S.A.F.E. Narratives? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2430\" class=\"elementor-element elementor-element-7e8f7c0 e-con-full e-flex e-con e-child\" data-id=\"7e8f7c0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2430\" class=\"elementor-element elementor-element-dd27b77 e-flex e-con-boxed e-con e-child\" data-id=\"dd27b77\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c01eb6a elementor-widget elementor-widget-text-editor\" data-id=\"c01eb6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Civil society in Romania operates in an increasingly hostile digital environment, yet the organizations most vulnerable to cyber threats are precisely those with the fewest resources to defend themselves against them. Journalists, human rights activists, and NGOs representing the most marginalized communities\u2014Roma, LGBTQ+ individuals, and people with disabilities\u2014face coordinated digital attacks, hate speech, and harassment, while operating on minimal budgets and with little or no technical support. Nara\u021biuni S.A.F.E. was founded to fill this gap: we facilitate access to secure infrastructure, digital education, and direct support, specifically targeting those who represent the most discriminated-against communities in Romania\u2014because freedom of expression and the protection of fundamental rights cannot be separated from digital security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2431\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2431\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> How can S.A.F.E. Narratives help me? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2431\" class=\"elementor-element elementor-element-c59784a e-con-full e-flex e-con e-child\" data-id=\"c59784a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2431\" class=\"elementor-element elementor-element-012684c e-flex e-con-boxed e-con e-child\" data-id=\"012684c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7180a0b elementor-widget elementor-widget-text-editor\" data-id=\"7180a0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">If you are an independent journalist, activist, member of a civic organization, or belong to a marginalized community and are facing digital risks\u2014or simply want to improve your digital security\u2014you can request assistance by e-mailing us or completing the <strong><a href=\"https:\/\/safenarratives.org\/index.php\/en\/elementor-1296\/\">request form<\/a> <\/strong>available on our website. It takes approximately 3\u20135 minutes and helps us understand your specific context and needs.<\/p><h3 data-path-to-node=\"1\">Types of Assistance Provided<\/h3><p data-path-to-node=\"2\">Our services cover three main categories:<\/p><ul data-path-to-node=\"3\"><li><p data-path-to-node=\"3,0,0\"><b data-path-to-node=\"3,0,0\" data-index-in-node=\"0\">Training and Education:<\/b> Introductory digital security sessions, training on recognizing and avoiding phishing attacks, and guidance during digital crisis situations.<\/p><\/li><li><p data-path-to-node=\"3,1,0\"><b data-path-to-node=\"3,1,0\" data-index-in-node=\"0\">Infrastructure and Technical Configuration:<\/b> Setting up secure email accounts, two-factor authentication (2FA), password managers, encrypted cloud storage, secure data hosting, professional domains, and safe migration of existing data.<\/p><\/li><li><p data-path-to-node=\"3,2,0\"><b data-path-to-node=\"3,2,0\" data-index-in-node=\"0\">Intervention and Recovery:<\/b> Emergency assistance following digital incidents, recovery of compromised accounts, and security hardening measures post-incident.<\/p><\/li><\/ul><h3 data-path-to-node=\"4\">Who Can Request Assistance<\/h3><p data-path-to-node=\"5\">Our services are intended for independent and affiliated journalists, non-governmental organizations (especially those representing discriminated minorities), informal groups, and individuals belonging to marginalized communities.<\/p><hr data-path-to-node=\"6\" \/><h3 data-path-to-node=\"7\">Important Limitations<\/h3><p data-path-to-node=\"8\"><b data-path-to-node=\"8\" data-index-in-node=\"0\">Nara\u021biuni S.A.F.E.<\/b> is in its first year of operation. Our capacity to respond to requests is currently limited, and response times may vary. We cannot guarantee immediate assistance in all cases, and some services may only be available partially or progressively as the organization develops. We prioritize high-risk cases and organizations representing vulnerable communities.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2432\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2432\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Are the services provided by S.A.F.E. Narratives free of charge? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2432\" class=\"elementor-element elementor-element-40916c2 e-flex e-con-boxed e-con e-child\" data-id=\"40916c2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2432\" class=\"elementor-element elementor-element-8edd41d e-con-full e-flex e-con e-child\" data-id=\"8edd41d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6bbd797 elementor-widget elementor-widget-text-editor\" data-id=\"6bbd797\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Yes, <b data-path-to-node=\"0\" data-index-in-node=\"5\">S.A.F.E. Narratives<\/b> services are free of charge. We are a non-profit organization funded through donations, grants, and partnerships, and our mission is to ensure access to digital security for those who lack the resources to obtain it otherwise.<\/p><p data-path-to-node=\"1\">As we are in our first year of operation, our capacity is limited; therefore, we prioritize high-risk cases and organizations representing vulnerable communities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2433\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2433\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What are digital rights? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2433\" class=\"elementor-element elementor-element-454d3ff e-con-full e-flex e-con e-child\" data-id=\"454d3ff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2433\" class=\"elementor-element elementor-element-83e4f0a e-flex e-con-boxed e-con e-child\" data-id=\"83e4f0a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d5121e2 elementor-widget elementor-widget-text-editor\" data-id=\"d5121e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Digital rights are fundamental human rights applied to the digital sphere\u2014specifically, the safeguards that protect individuals&#8217; freedom, dignity, and safety when using the internet and digital technology. These are not &#8220;new&#8221; rights, but rather established rights already enshrined in international and European law, whose application and protection must also be ensured in the online environment.<\/p><p data-path-to-node=\"2\">At the UN level, <b data-path-to-node=\"2\" data-index-in-node=\"17\">Human Rights Council Resolution 32\/13 (2016)<\/b> established that &#8220;the same rights that people have offline must also be protected online&#8221;\u2014particularly freedom of expression, the right to privacy, and the right to access information, as set forth in the <b data-path-to-node=\"2\" data-index-in-node=\"267\">Universal Declaration of Human Rights (Arts. 12, 19)<\/b> and the <b data-path-to-node=\"2\" data-index-in-node=\"328\">International Covenant on Civil and Political Rights (Arts. 17, 19)<\/b>. The UN also recognizes that internet access itself is a necessary condition for exercising these rights.<\/p><p data-path-to-node=\"4\">Within the EU, the <b data-path-to-node=\"4\" data-index-in-node=\"19\">Charter of Fundamental Rights of the European Union<\/b> explicitly guarantees the right to the protection of personal data (<b data-path-to-node=\"4\" data-index-in-node=\"139\">Art. 8<\/b>) as a distinct right from the right to privacy (<b data-path-to-node=\"4\" data-index-in-node=\"194\">Art. 7<\/b>), representing a higher standard than the UN framework. The <b data-path-to-node=\"4\" data-index-in-node=\"261\">General Data Protection Regulation (GDPR)<\/b> translates this right into concrete legislation applicable to all EU citizens. Furthermore, the <b data-path-to-node=\"4\" data-index-in-node=\"399\">European Declaration on Digital Rights and Principles (2023)<\/b> introduces principles such as equitable access to technology, online protection for children, digital sustainability, and the right not to be subject to discriminatory algorithms.<\/p><hr data-path-to-node=\"5\" \/><h4 data-path-to-node=\"6\">Digital Rights in Practice Include:<\/h4><ul data-path-to-node=\"7\"><li><p data-path-to-node=\"7,0,0\"><b data-path-to-node=\"7,0,0\" data-index-in-node=\"0\">The right to privacy<\/b> and the protection of personal data online.<\/p><\/li><li><p data-path-to-node=\"7,1,0\"><b data-path-to-node=\"7,1,0\" data-index-in-node=\"0\">The right to freedom of expression<\/b> and access to information on the internet.<\/p><\/li><li><p data-path-to-node=\"7,2,0\"><b data-path-to-node=\"7,2,0\" data-index-in-node=\"0\">The right to digital security<\/b> and protection against unlawful surveillance.<\/p><\/li><li><p data-path-to-node=\"7,3,0\"><b data-path-to-node=\"7,3,0\" data-index-in-node=\"0\">The right to equitable access<\/b> to digital infrastructure and the internet.<\/p><\/li><li><p data-path-to-node=\"7,4,0\"><b data-path-to-node=\"7,4,0\" data-index-in-node=\"0\">The right to non-discrimination<\/b> by automated systems or algorithms.<\/p><\/li><li><p data-path-to-node=\"7,5,0\"><b data-path-to-node=\"7,5,0\" data-index-in-node=\"0\">The right to effective remedies<\/b> in the event of online rights violations.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2434\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2434\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What is digital security? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2434\" class=\"elementor-element elementor-element-42724f5 e-flex e-con-boxed e-con e-child\" data-id=\"42724f5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2434\" class=\"elementor-element elementor-element-a3d221b e-con-full e-flex e-con e-child\" data-id=\"a3d221b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-72e0bd9 elementor-widget elementor-widget-text-editor\" data-id=\"72e0bd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Digital security represents the set of practices, tools, and behaviors through which we protect our information, communications, and identity in the online environment. It covers the protection of personal and professional devices and accounts, as well as the safety of the data we store, transmit, or publish online.<\/p><p>At an individual level, digital security involves concrete actions: using strong passwords, enabling two-factor authentication (2FA), recognizing phishing attempts, or using encrypted communication apps.<\/p><p>At an organizational level, it includes data management policies, secure technical infrastructure, and team readiness to respond to digital incidents.<\/p><p>For journalists, activists, and civic organizations, digital security carries an additional dimension: it protects not just data, but also sources, vulnerable beneficiaries, and the freedom to operate without surveillance or interference. In this context, a security breach is more than just a technical incident\u2014it can have direct consequences on the physical safety of individuals.<\/p><p>International organizations such as the UN and the Council of Europe recognize digital security as a necessary condition for exercising fundamental rights online, particularly freedom of expression and the right to privacy.<\/p><p dir=\"ltr\"><i><em>Source: Electronic Frontier Foundation \u2014 <\/em><\/i><a dir=\"ltr\" href=\"https:\/\/ssd.eff.org\/\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/ssd.eff.org&amp;source=gmail&amp;ust=1774002595870000&amp;usg=AOvVaw2Ta-1Z59R_VLjxTIBD8FF9\"><i><em>Surveillance Self-Defense<\/em><\/i><\/a><i><em>; Access Now \u2014 <\/em><\/i><a dir=\"ltr\" href=\"https:\/\/www.accessnow.org\/help\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.accessnow.org\/help&amp;source=gmail&amp;ust=1774002595870000&amp;usg=AOvVaw308tALGmKJuKxxHDswKWzq\"><i><em>Digital Security Helpline<\/em><\/i><\/a><i><em>; Council of Europe \u2014 <\/em><\/i><a dir=\"ltr\" href=\"https:\/\/www.coe.int\/en\/web\/cybercrime\/cybersecurity\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.coe.int\/en\/web\/cybercrime\/cybersecurity&amp;source=gmail&amp;ust=1774002595870000&amp;usg=AOvVaw3FdvOwJJYrBkS1JNJhQpgV\"><i><em>Cybersecurity and Human Rights<\/em><\/i><\/a><i><em>; ONU \u2014 Human Rights Council Resolution 32\/13 (2016).<\/em><\/i><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2435\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2435\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> How can I protect my data online? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2435\" class=\"elementor-element elementor-element-62621e0 e-flex e-con-boxed e-con e-child\" data-id=\"62621e0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2435\" class=\"elementor-element elementor-element-823ed59 e-con-full e-flex e-con e-child\" data-id=\"823ed59\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fbc48c2 elementor-widget elementor-widget-text-editor\" data-id=\"fbc48c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Online data protection starts with a few essential practices: use unique and complex passwords for each account, enable two-factor authentication (2FA), and store sensitive documents in encrypted solutions. For confidential communications, choose apps with end-to-end encryption, such as Signal. Update your devices and apps regularly\u2014many attacks exploit known vulnerabilities that are fixed through updates.<\/p><p>Be wary of phishing attempts: emails or messages asking for your login credentials, even if they appear to come from known sources, are one of the most common ways accounts are compromised.<\/p><p>If you work with sensitive data\u2014sources, vulnerable beneficiaries, confidential documents\u2014the level of protection must match the risk. In this case, we recommend filling out <a href=\"https:\/\/safenarratives.org\/index.php\/en\/elementor-1296\/\"><strong>our assessment form<\/strong><\/a> for a personalized assessment.<\/p><p dir=\"ltr\"><i><em>Sources: Electronic Frontier Foundation \u2014<\/em><\/i><i> <\/i><a dir=\"ltr\" href=\"https:\/\/ssd.eff.org\/\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/ssd.eff.org&amp;source=gmail&amp;ust=1774002595870000&amp;usg=AOvVaw2Ta-1Z59R_VLjxTIBD8FF9\"><i><em>Surveillance Self-Defense<\/em><\/i><\/a><i><em>; Access Now \u2014<\/em><\/i><i>\u00a0<\/i><a dir=\"ltr\" href=\"https:\/\/www.accessnow.org\/help\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.accessnow.org\/help&amp;source=gmail&amp;ust=1774002595870000&amp;usg=AOvVaw308tALGmKJuKxxHDswKWzq\"><i><em>Digital Security Helpline<\/em><\/i><\/a><i><em>; National Supervisory Authority for Personal Data Processing <\/em><\/i><i><em>\u00a0\u2014<\/em><\/i><i> <\/i><a dir=\"ltr\" href=\"https:\/\/www.dataprotection.ro\/\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.dataprotection.ro&amp;source=gmail&amp;ust=1774002595870000&amp;usg=AOvVaw2IHHOwIlpeMtFxAA3uBNEz\"><i><em>www.dataprotection.ro<\/em><\/i><\/a><i><em>.<\/em><\/i><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-542912c e-flex e-con-boxed e-con e-parent\" data-id=\"542912c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-13c7040 elementor-widget elementor-widget-spacer\" data-id=\"13c7040\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d8f2f2a e-flex e-con-boxed e-con e-parent\" data-id=\"d8f2f2a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b7977af elementor-widget elementor-widget-text-editor\" data-id=\"b7977af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Can&#8217;t find the answer to your question? Send us an email at contact@safenarratives.org.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Frequently asked questions Why S.A.F.E. Narratives? Civil society in Romania operates in an increasingly hostile digital environment, yet the organizations most vulnerable to cyber threats are precisely those with the fewest resources to defend themselves against them. Journalists, human rights activists, and NGOs representing the most marginalized communities\u2014Roma, LGBTQ+ individuals, and people with disabilities\u2014face coordinated [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1317","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/safenarratives.org\/index.php\/wp-json\/wp\/v2\/pages\/1317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/safenarratives.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/safenarratives.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/safenarratives.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/safenarratives.org\/index.php\/wp-json\/wp\/v2\/comments?post=1317"}],"version-history":[{"count":28,"href":"https:\/\/safenarratives.org\/index.php\/wp-json\/wp\/v2\/pages\/1317\/revisions"}],"predecessor-version":[{"id":1570,"href":"https:\/\/safenarratives.org\/index.php\/wp-json\/wp\/v2\/pages\/1317\/revisions\/1570"}],"wp:attachment":[{"href":"https:\/\/safenarratives.org\/index.php\/wp-json\/wp\/v2\/media?parent=1317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}