Holistic security strategies and measures to address non-consensual intimate images

This article was jointly authored by Peace Oliver Amuge, Sandra Aceng and Patricia Nyasuna of the Women of Uganda Network (WOUGNET) and Rohini Lakshané of The Bachchao Project. It is based on a breakout session organised at the Global Digital Development Forum (GDDF), a virtual conference held on May 6, 2020.


Non-consensual intimate images (NCII), commonly known by the misnomer “revenge porn” are on the rise in Uganda and Sub-Saharan African countries like Zimbabwe. Patriarchal norms and attitudes in society paired with increasing Internet access — over 42% of Uganda’s population is now online — have spurred this new form of gender-based violence, commonly referred to as “technology-assisted violence against women and girls”. More violations and threats are now happening towards women in cyberspace. However, most cases go unreported on the extent to violence against women online and they are quite often overlooked or excluded from discussions about violence against women and girls (VAWG).

What is NCII?

NCII is defined as the distribution or circulation of sexually explicit images or videos that were initially shared with the expectation that they would remain private. NCII is a form of intimate private violence (IPV), breach of privacy, and a violation of freedom of sexual expression. It causes women to self-censor, which is an attempt to silence women and other groups from participating in the public spaces such as the internet. Images or videos are distributed in most cases by the former partner(s) as an act of revenge or a response to rejection. These photos or videos are in many cases stolen from the victim’s phone or laptop. Sometimes, these images are captured secretly in bathrooms, hotels, swimming pools, clothing stores, changing rooms, and public restrooms. These images or videos are then shared widely over social media platforms, pornographic websites, and instant messengers such as WhatsApp. Images/ videos are later used to stalk, threaten, blackmail, publicly shame, or extort money from victims or their families.

Read the rest of the article at: https://wougnet.org/news/holistic-security-strategies-and-measures-to-address-non-consensual-intimate-images-ncii

Archived at: http://web.archive.org/web/20200603124941/https://wougnet.org/news/holistic-security-strategies-and-measures-to-address-non-consensual-intimate-images-ncii

Slide deck:
Slides_Holistic_security_strategies_to_address_non-consensual_intimate_images_GDDF_2020