Digital Risks and Opportunities for Women in East Africa 

The digital world presents opportunities and risks to all people. Women in East Africa face unique risks and barriers to digital access compared to men. Even so, there are actions that can be taken to enhance the digital opportunities and safety for women. 

SCREENING AND BACKGROUND CHECK POLICY 

Our screening and background check policy helps us get insight into candidates’ backgrounds to ensure we hire reliable employees, verify candidates’ information for truth and accuracy, and screen candidates convicted of serious criminal behavior.

SAFEGUARDING AND PROTECTION POLICY 

Real Life Research Institute Africa Program (RLRI-AP) is committed to empowering individuals across Africa. We are committed to ensuring that during our work, all individuals will be treated with respect and dignity and protected from all forms of harm, including sexual violence. 

FINANCE POLICY 

Real Life Research Institute – Africa Program (hereinafter referred to as RLRI-AP) is a separate legal entity, distinct from the individuals authorized to manage its finances and accounts.

ANTI-RACISM POLICY 

The Real-Life Research Institute Africa Program (RLRI-AP) is committed to fostering a safe, inclusive, and racism-free environment.

ANTI-HARASSMENT AND DISCRIMINATION POLICY 

Real Life Research Institute Africa Program (RLRI-AP) is committed to creating a safe, flexible, and respectful work environment for everyone. All RLRI-AP representatives are expected to always treat others with dignity, courtesy, and respect. We will not tolerate bullying, harassment, discrimination, or exploitation.

ANTI-CORRUPTION AND WHISTLEBLOWING POLICY 

At Real Life Research Institute Africa Program (RLRI-AP), we acknowledge that fraud, bribery, and corruption can weaken trust with our stakeholders, including the communities we interact with, our donors, and program participants. Hence, we hold a zero-tolerance approach to fraud, bribery, and corruption. We shall take every measure possible to prevent, find, and respond to fraud, bribery, and corruption across our networks. 

ᖃᓄᐃᓕᐅᕐᓂᕆᕙᑦᑕᖏᑦ ᐊᑦᑕᓇᖏᑦᑐᒦᑦᑎᓪᓗᒋᑦ ᓄᓇᓖᑦ: ᐱᓪᓚᕆᑦᑐᒥᒃ ᖃᐅᔨᓴᕐᓂᖅ ᐊᐃᑉᐸᕇᓐᓄᑦ ᓴᖅᑭᑕᐅᓪᓗᓂ ᐊᕐᓇᐃᑦ/ᐊᖑᑏᑦ ᒪᓕᓪᓗᒋᑦ ᐃᖃᓗᓐᓂ.

ᒪᓕᑦᑐᒋᑦ ᐊᕐᓇᐃᑦ ᐊᒻᒪᓗ ᐊᕐᓇᐃᑦ/ᐊᖑᑏᑦ ᐊᔾᔨᒌᑎᑦᑎᓂᖅ ᑲᓇᑕᒥ, ᑭᓇᑐᐃᓐᓇᖅ (ᐊᖑᑏᑦ, ᐊᕐᓇᐃᑦ, ᐊᕐᓇᐅᖔᓕᕐᓂᕋᖅᑐᑦ/ᐊᖑᑕᐅᖔᓕᕐᓂᕋᖅᑐᑦ, ᐊᕐᓇᐃᑦ/ᐊᖑᑏᑦ ᖃᓄᐃᑦᑐᑐᐃᓐᓇᐃᓪᓗ ᑭᒃᑯᑐᐃᓐᓇᐃᑦ) ᐱᓂᕐᓗᑦᑕᐅᔪᓐᓇᖅᑐᑦ ᐊᕐᓇᐃᑦ/ᐊᖑᑏᑦ ᒪᓕᓪᓗᒋᑦ ᐋᓐᓂᖅᑕᐅᕙᑦᑐᑦ. ᓴᙱᓂᖅᐹᒃᑯᑦ ᐊᑑᑎᖃᕈᓐᓇᖅᑐᖅ ᐱᓕᕆᐊᕆᓂᐊᕐᓗᒍ ᐊᕐᓇᐃᑦ/ᐊᖑᑏᑦ ᐋᓐᓂᖅᑕᐅᑎᓪᓗᒋᑦ ᑕᑯᓴᐅᑎᑦᑎᓗᑕ ᐱᐅᔪᒃᑯᑦ ᑕᑯᓐᓇᒐᖃᑦᑎᐊᓗᑕᓗ. ᓯᕐᓈᖅᑎᐅᑉᐸᑕᓘᓐᓃᑦ, ᐊᑐᕐᓂᑰᑉᐸᑕ, ᓄᓇᓕᓐᓂ ᓯᕗᓕᖅᑏᑦ, ᐱᙳᐊᖅᑏᑦ, ᐃᓕᓴᐃᔩᑦ, ᐅᕝᕙᓘᓐᓃᑦ ᓄᓇᖃᖅᑳᖅᓯᒪᔪᑦ ᐃᓐᓇᕆᔭᐅᔪᑦ, ᐅᓂᒃᑳᖏᑦ ᓴᙱᔫᒻᒪᑕ ᐊᒻᒪᓗ ᑲᔪᓯᓂᖃᑦᑎᐊᕐᓃᑦ ᑕᑯᑎᑦᑎᔪᓐᓇᕐᒪᑕ ᒪᒃᑯᑦᑐᓂ ᓇᓕᒧᑦᑎᐊᕈᓐᓇᕐᒪ ᓯᕗᓂᔅᓴᖏᓐᓂᑦ ᐊᓂᒍᐃᔪᓐᓇᑦᑎᐊᕐᓂᖏᓐᓂᓪᓄ. ᑖᓐᓇ ᐊᑐᖅᑕᐅᓪᓗᓂ ᐃᓅᓯᕐᒨᖓᓪᓚᕆᑦᑐᓐᓄᑦ ᖃᐅᔨᓴᕐᕕᔾᔪᐊᕐᒧᑦ ᐋᖅᑭᔅᓱᐃᓚᐅᖅᑐᑦ ᐊᐃᑉᐸᕇᓄᑦ ᑲᑎᒪᕕᐅᔪᓐᓇᖅᑐᓂ ᐱᔾᔪᑎᖃᖅᑐᑎᒃ ᐊᕐᓇᐃᑦ/ᐊᖑᑏᑦ ᒪᓕᓪᓗᒋᑦ ᐋᓐᓂᖅᑕᐅᕙᑦᑐᓄᑦ ᐋᒡᒌᓯᐅᓚᐅᖅᑐᒥ […]