Women in Colombia have less access to ICTsgiven the multiple roles they have to assume asmothers, wives, workers and citizens, which canmake it difficult for them to find the time to learnnew skills. Another reason is the level of income andeconomic resources needed to buy ICT tools whenthe family could have other priorities, such as buyinga new household appliance (e.g. a refrigerator)or fulfilling basic family needs.The Ministry of ICT has promoted several initiativesin order to encourage the use of ICTs amongwomen, which mainly involve training in how to usea computer, surf the internet, use office applicationsand take advantage of the online resources offeredby different ministries.Violence against women in the contextof ICTsAccording to the National Public Policy for GenderEquality in Colombia, violence is the main humanrights violation against women and has become “aproblem of justice, public health, and public securityneeding a holistic approach, engaging all groupsof society in order to change the cultural patternswhich would enable the eradication of all forms ofviolence against women.” 6One of the most important initiatives regardingthis issue was called Women You Have Rights, WeAre with You, launched in March 2011 and developedin accordance with Law 1257 of 2008, whichaims to diminish all forms of violence against women.The initiative was carried out by the Colombiangovernment’s Inter-Institutional CommunicationsCommittee, set up to tackle violence against women.This committee was promoted by the Ministry ofICT and included members of governmental agenciesand international cooperation agencies. Theinitiative ended at the beginning of 2012.The national policy for responsible use of ICTssupported by the Ministry of ICT and the Vive Digitalplan is called En TIC Confio (In ICTs I Trust). Thispolicy 7 aims to teach and raise awareness of theopportunities and risks that the internet entails, particularlyfor children and young people. This initiativeneeds a gender perspective, considering that womenare more at risk and given that the hostile, misogynistand discriminatory acts they have had to endurein real life are translated into the virtual world.The UN Women office in Colombia leads andtakes part in several campaigns and strategiesin order to eradicate violence against women. In6 www.equidadmujer.gov.co/Documents/Lineamientos-politicapublica-equidad-de-genero.pdf7 http://www.enticconfio.gov.co/September 2012 it officially joined the SecretaryGeneral’s UNiTE to End Violence against Womencampaign. 8Although cases of violence against women usingICTs have become more visible and recognised,there are no specific initiatives for the preventionof this violence. The Colombian Institute for FamilyWelfare 9 is responsible for tackling issues to protectchildren under the age of 18, while the national policedeals with ICT crimes. The State Prosecutor’sOffice has a department in charge of handling ICTcrimes. However, often women do not report theseoffences for lack of trust in these institutions. Organisationsdefending human rights may be evenmore distrustful given the information they have accessto and the lack of confidence in untrustworthycivil servants.In Colombia, Law 1257 of 2008 is recognised asa crucial law to defend the rights of women to a lifefree of violence. Although this law does not includeviolence against women using ICTs, civil society organisationsfollowing this issue are beginning toconsider its relevance across the board.The project Women’s Rights in Digital Spaces,coordinated by the Association for ProgressiveCommunications, 10 supported by the Dutch Ministryfor Foreign Affairs (DGIS) Funding Leadership andOpportunities for Women (FLOW) Fund and coordinatedin Colombia by Colnodo, 11 is completing amap of cases of violence against women involvingICTs, from which we have identified the most commonacts of aggression: 12• Young women are at risk of being approachedby paedophiles who use false profiles in socialnetworks to gain the confidence of their victimsand convince them to send intimate picturesof themselves so that they can later use theseimages to blackmail them. Often these aggressionsend up in sexual abuse and sometimesin homicides. The victims’ parents have denouncedsome of these cases and the aggressorshave been captured. However, it is difficultto follow up on the cases and to know if the aggressorshave been prosecuted.• Women have been discriminated against becauseof their sexual orientation and because of theirwork in defence of the lesbian, gay, bisexual,transsexual and intersexual (LGBTI) community.8 http://www.un.org/es/women/endviolence/9 http://www.icbf.gov.co10 http://www.apc.org11 http://www.colnodo.apc.org12 http://www.dominemoslatecnologia.co/mapa/98 / Global Information Society Watch
• Women activists and human rights defendershave been victims of threats and aggression usingICTs. This situation has been reported and recordedby the Office of the United Nations HighCommissioner for Human Rights in Colombia. Ina 2010 report, the High Commissioner reported:“In 2009, our office in Colombia observed an increasein the number of death threats and intimidationsthrough emails and pamphlets againsthuman rights defenders, social and communityleaders and other marginalised groups” (DocumentA/HRC/13/72, paragraph 23). 13• Women activists and human rights defendersand NGO, network or movement members havebeen the victims of hackers, phone hacking andspyware or have had their computers stolen.These aggressions are committed to intimidateand threaten women but also to acquire confidentialinformation such as databases with informationabout the victims of the Colombianconflict, claims and court cases, among others.• Adult women have been recorded without theirconsent in sexual activities and later blackmailedor intimidated.• Young women have been incessantly harassedby their partners or ex-partners via mobilephones. There have been cases in which thepartner has installed spyware in the woman’spersonal computer. Unfortunately, most ofthese cases are not reported for lack of confidencein the authorities or because of fear.In addition to these violations, women are alsotypecast in a way that does not favour equitablegender relationships in a country with a strongmacho culture, and with a biased view of beauty,usually westernised.ConclusionsAlthough Colombia has progressed significantlytowards reducing the digital divide, it is necessaryto design and develop strategies to cross-fertilisegrowth in access and ownership of ICTs with a genderapproach, targeting women from the most disadvantagedbackgrounds, ethnic minorities, older women,women with disabilities and victims of armed conflict,so they can improve their quality of life andenjoy the opportunities that ICTs can provide.With the widespread use of ICTs, violence againstwomen in the virtual space has also increased. So farthere is no institution promoting any formal actionto make ICTs safe for women. To achieve a virtualspace free of violence, more advocacy work with thewomen’s movement and civil society organisationsis required in order to tackle the problem at a politicaland legislative level. However, there is currentlyno specific plan in place to tackle violence againstwomen online where government institutions andcivil society organisations can unite their efforts usingthe formal and legal tools available.Human rights and women’s organisationsrecognise the great potential that ICTs have forempowering women and – for women working forthe defence of human rights – their usefulness forcoordinating activities, improving communications,making their work known to the general public,fundraising, and communicating in emergencysituations or when the safety of women is at risk.However, ICTs have also been used to attack womeninvolved in the defence of human rights. Some ofthe most common modalities are threats, violationof the right to privacy and safety through socialnetworks, stealing computers to get private information,and the interception of communications,including phone hacking, sometimes by governmentintelligence agencies. These threats are usedto destabilise women, frightening them and preventingthem from speaking out.Most of these threats are carried out usingmobile phones, emails and messages distributedonline, which have a massive impact on women’sorganisations and their families. As one womanhuman rights defender explains: “This way ofthreatening is more omnipresent than when it isdirect and physical. Whoever sends a threat couldbe anywhere; he or she could be living next door ormany miles away.” 14Even though ICTs allow people to communicaterapidly or to warn someone about a risk or threat,human rights defenders maintain that they do notalways trust the security measures provided by thestate. They have found out that their personal mobilephones can be tracked and all their phone callsand movements monitored. Instead of feeling protectedthey feel controlled and surveilled. 1513 Quote from “Diagnostic on the use of ICTs and violence againstwomen who are human rights defenders in Colombia”, prepared byAna María Díaz, Human Rights and Humanitarian Law consultantfor Colnodo, as part of the Cyber Stewards Network, with the aidof a grant from the International Development Research Centre(IDRC), April and May 2013.14 Ibid.15 Ibid.99 / Global Information Society Watch
- Page 5 and 6:
Costa Rica . . . . . . . . . . . .
- Page 7:
IntroductionJoanne SandlerGender at
- Page 10 and 11:
excluded. 9 And while recent data n
- Page 12 and 13:
ox 1In February 2009, intimate pict
- Page 14 and 15:
egime, increasing surveillance of t
- Page 16 and 17:
Accessing infrastructureMariama Dee
- Page 18 and 19:
figure 2.Share of individuals with
- Page 20 and 21:
figure 4.Share of where internet wa
- Page 22 and 23:
figure 7.Main reasons why individua
- Page 24 and 25:
A digital postcard urging people to
- Page 26 and 27:
and set the scene for a new point o
- Page 28 and 29:
activity, exhorting citizens to exe
- Page 30 and 31:
to citizens. 30 The situated experi
- Page 32 and 33:
Sexuality and the internetBruno Zil
- Page 34 and 35:
ally exclusive. Commercial sex is a
- Page 36 and 37:
Sometimes, strangers they meet onli
- Page 38 and 39:
Violence against women onlineJan Mo
- Page 40 and 41:
elated forms of VAW have become par
- Page 42 and 43:
Men often feel that they own their
- Page 45 and 46:
ConclusionAs Daroczi, Shevchenko, R
- Page 47 and 48: Online disobedienceNadine MoawadAss
- Page 49 and 50: mapping platform for sexual harassm
- Page 51 and 52: 1800 1850 1900Maria Gaetana Agnesi(
- Page 53 and 54: TodaySusan KareCreated the icons an
- Page 55 and 56: Whose internet is it anyway?Shaping
- Page 57 and 58: academic groundwork is needed, both
- Page 59 and 60: empowered and disempowered by them.
- Page 61 and 62: Whose internet is it anyway?Shaping
- Page 63 and 64: Country reports
- Page 65 and 66: P is for PIN: “The website works
- Page 67 and 68: Crime of Trafficking, 9 which recei
- Page 69 and 70: Role of ICTs in the trafficking of
- Page 71 and 72: (1) If any person deliberately publ
- Page 73 and 74: BOLIVIAPreventing digital violence
- Page 75 and 76: Due to the popularity and widesprea
- Page 77 and 78: a position of privilege.” 7 It be
- Page 79 and 80: the councils that the spaces alone
- Page 81 and 82: gradually become the primary field
- Page 83 and 84: Sexuality in Communist Bulgaria”,
- Page 85 and 86: • Of the five MPCTs selected, two
- Page 87 and 88: • MPCT managers should regularly
- Page 89 and 90: protest movement that has gained si
- Page 91 and 92: to arise as to the evolving nature
- Page 93 and 94: CHINAMicroblogs: An alternative, if
- Page 95 and 96: domestic violence, and the exacting
- Page 97: colombiaWomen’s rights, gender an
- Page 101 and 102: CONGO, democratic republic ofOnline
- Page 103 and 104: CONGO, REPUBLIC OFWomen’s rights
- Page 105 and 106: The different uses of ICTs for wome
- Page 107 and 108: cook islandsBalancing leadership: A
- Page 109 and 110: and the Netherlands (38.7%). Of the
- Page 111 and 112: costa ricaThe ICT sector requires t
- Page 113 and 114: côte d’ivoireYasmina Ouégnin: A
- Page 115 and 116: family expenses according to their
- Page 117 and 118: was any kind of consultation before
- Page 119 and 120: violence and violence against women
- Page 121 and 122: Write Me In is a series of digital
- Page 123 and 124: Online protests over “virginity t
- Page 125 and 126: ethiopiaEmpowering women through IC
- Page 127 and 128: the exchange take as much as 80% of
- Page 129 and 130: indiaThe internet as a pathway for
- Page 131 and 132: Using ICTs in support of women’s
- Page 133 and 134: • Develop gender-sensitive techni
- Page 135 and 136: The skill of using modern technolog
- Page 137 and 138: However, non-official surveys indic
- Page 139 and 140: iraqICTs and the fight against fema
- Page 141 and 142: multimedia presentations in their v
- Page 143 and 144: Both these groups emerged from the
- Page 145 and 146: Action stepsPaestum 2013Just before
- Page 147 and 148: in 2009. The Dunn et al. study foun
- Page 149 and 150:
end of the ICT spectrum, reflecting
- Page 151 and 152:
japanDealing with the backlash: Pro
- Page 153 and 154:
Akiko and teacher Nomaki Masako (wh
- Page 155 and 156:
Access to ICTs helps in the fulfilm
- Page 157 and 158:
ut the case was ultimately dismisse
- Page 159 and 160:
kenyaWomen and cyber crime in Kenya
- Page 161 and 162:
huge online following. Known as an
- Page 163 and 164:
Action steps• Lobby to have onlin
- Page 165 and 166:
For example, although the abovement
- Page 167 and 168:
In addition to the cases mentioned
- Page 169 and 170:
Two years later, when facing a simi
- Page 171 and 172:
NEPALPerspectives of Nepali women i
- Page 173 and 174:
Table 2.Women in technical position
- Page 175 and 176:
NetherlandsInternet, information an
- Page 177 and 178:
procure a safe medical abortion. Th
- Page 179 and 180:
NEW ZEALANDProposed new laws and th
- Page 181 and 182:
world. The gender inequalities play
- Page 183 and 184:
NIGERIAThe use of ICTs to express p
- Page 185 and 186:
the issue in the public eye until p
- Page 187 and 188:
PAKISTANShaping ICTs in Pakistan us
- Page 189 and 190:
with Pakistan’s internet ranking
- Page 191 and 192:
PERUWomen against violence: Using t
- Page 193:
een delays in the judicial response
- Page 197 and 198:
infrastructure, clear processes and
- Page 199 and 200:
employment. While science courses a
- Page 201 and 202:
One of the protesting organisations
- Page 203 and 204:
county libraries have been trained
- Page 205 and 206:
trained to be accustomed to gatheri
- Page 207 and 208:
ConclusionThe government of Rwanda
- Page 209 and 210:
a threat to the South African publi
- Page 211 and 212:
spainShaping the internet: Women’
- Page 213 and 214:
and up to 23% to 25% in industrial
- Page 215 and 216:
Economic activityAt the end of the
- Page 217 and 218:
Action stepsSwitzerland has ratifie
- Page 219 and 220:
• Conducting social campaigns and
- Page 221 and 222:
gender equality in the new constitu
- Page 223 and 224:
inheritance rights. However, in man
- Page 225 and 226:
thailandThai cyber sexuality: Liber
- Page 227 and 228:
Table 1.Selected examples of online
- Page 229 and 230:
ugandaUsing ICTs to create awarenes
- Page 231 and 232:
united statesThe flame war on women
- Page 233 and 234:
Council that addresses online haras
- Page 235 and 236:
Because of this the DWU became cons
- Page 237 and 238:
venezuelaICT and gender violence in
- Page 239 and 240:
company PDVSA 41 (2), the National
- Page 241:
This image from Pakistan captures t