<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Humanitarian-Technology on SovereignSky</title><link>https://sovereignsky.no/topics/humanitarian-technology/</link><description>Recent content in Humanitarian-Technology on SovereignSky</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>Published by [Helpers.no](https://helpers.no)</copyright><lastBuildDate>Sun, 29 Mar 2026 03:15:28 +0200</lastBuildDate><atom:link href="https://sovereignsky.no/topics/humanitarian-technology/index.xml" rel="self" type="application/rss+xml"/><item><title>Digitisation and Sovereignty in Humanitarian Space</title><link>https://sovereignsky.no/publications/digitisation-sovereignty-humanitarian-space/</link><pubDate>Sun, 20 Mar 2022 00:00:00 +0000</pubDate><guid>https://sovereignsky.no/publications/digitisation-sovereignty-humanitarian-space/</guid><description>Through cases including WFP&amp;rsquo;s Palantir partnership, biometric registration standoffs in Yemen, and blockchain payment systems, researchers from six institutions with an ICRC practitioner examine how digital technology disrupts humanitarian space. The core finding: platform dependencies create vulnerabilities that may exceed physical security risks, while &amp;ldquo;decentralised&amp;rdquo; systems still operate within existing power structures.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sovereignsky.no/publications/digitisation-sovereignty-humanitarian-space/featured.png"/></item><item><title>Handbook on Data Protection in Humanitarian Action</title><link>https://sovereignsky.no/publications/icrc-data-protection-handbook/</link><pubDate>Mon, 15 Jan 2024 00:00:00 +0000</pubDate><guid>https://sovereignsky.no/publications/icrc-data-protection-handbook/</guid><description>This third edition (2024) provides the most thorough publicly available analysis of CLOUD Act, FISA 702, and PATRIOT Act implications for cloud-hosted sensitive data. The handbook documents that there are no humanitarian exemption clauses in these laws, and that organisations may never know their data was accessed due to non-disclosure obligations on providers. Mitigation strategies include encryption, Swiss-jurisdiction providers, and contractual notification requirements.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sovereignsky.no/publications/icrc-data-protection-handbook/featured.png"/></item><item><title>Refugee ID</title><link>https://sovereignsky.no/sovereignsky/refugee-id/</link><pubDate>Tue, 01 Mar 2022 00:00:00 +0000</pubDate><guid>https://sovereignsky.no/sovereignsky/refugee-id/</guid><description>QR-based wristband identification for humanitarian operations — built at the Polish-Ukrainian border to stop human trafficking</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sovereignsky.no/sovereignsky/refugee-id/featured.png"/></item><item><title>Humanitarian Security in an Age of Uncertainty: The Intersection of Digital and Physical Risks</title><link>https://sovereignsky.no/publications/gisf-digital-physical-security/</link><pubDate>Mon, 01 Jan 2024 00:00:00 +0000</pubDate><guid>https://sovereignsky.no/publications/gisf-digital-physical-security/</guid><description>The leading humanitarian security network documents how digital attacks translate to physical harm through disinformation endangering field staff, supply chain compromises, and shared infrastructure risks. The report adapts the traditional NGO security triangle (acceptance, protection, deterrence) to digital contexts and identifies critical gaps in staff training and resource equity between headquarters and field.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://sovereignsky.no/publications/gisf-digital-physical-security/featured.png"/></item></channel></rss>