<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
<channel>
	<title><![CDATA[ Working with Private Security Providers]]></title>
	<link>https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/</link>
	<language>es-es</language>
	<description><![CDATA[
    
        Challenge Area
        Working with Private Security Providers
        
            Private security providers play an important role in protecting company personnel and assets, but their work is sensitive and can pose risks to human rights. 
            This section helps navigate topics like:
            
                How to vet private security providers including in the absence of public information
                How to prevent the excessive use of force
                How to ensure culturally appropriate security practices
            
        

        The good practices included in this Toolkit are not meant to be prescriptive. It is up to the user to evaluate whether they could be feasible, useful and appropriate to the local context in a specific situation on the ground.

    




    Local procurement




    Bids and contracts




    Private security within risk and impact assessment




    Training




    Labour standards




    Human rights abuses




    Relationship between public and private security




    Vetting (private security providers)




    Oversight and accountability




    Security equipment and use of force
]]></description>
	<copyright><![CDATA[Copyright 2026, Security and Human Rights Knowledge Hub]]></copyright>
	<pubDate>Wed, 08 Apr 2026 12:45:48 +0000</pubDate>
	<lastBuildDate>Wed, 08 Apr 2026 12:45:48 +0000</lastBuildDate>
	<generator>Elxis 5.6</generator>
	<ttl>360</ttl>
	<image>
		<url>https://www.securityhumanrightshub.org/media/images/logo_rss.png</url>
		<title><![CDATA[ Working with Private Security Providers]]></title>
		<link>https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/</link>
	</image>
	<item>
		<title><![CDATA[Security equipment and use of force]]></title>
		<description><![CDATA[<img style="margin:5px; float:left;" src="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" alt=" Working with Private Security Providers" /> <p>Note: These good practices are not meant to be prescriptive. It is up to the user to evaluate whether they could be feasible, useful and appropriate to the local context and specific situation on the ground.</p>]]></description>
		<link>https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/security-equipment-and-use-of-force.html</link>
		<guid isPermaLink="true">https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/security-equipment-and-use-of-force.html</guid>
		<pubDate>Fri, 15 Mar 2024 15:27:00 +0000</pubDate>
		<enclosure url="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" length="12035" type="image/jpeg" />
	</item>
	<item>
		<title><![CDATA[Vetting (private security providers)]]></title>
		<description><![CDATA[<img style="margin:5px; float:left;" src="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" alt=" Working with Private Security Providers" /> <p>Note: These good practices are not meant to be prescriptive. It is up to the user to evaluate whether they could be feasible, useful and appropriate to the local context and specific situation on the ground.</p>]]></description>
		<link>https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/vetting-private-security-providers.html</link>
		<guid isPermaLink="true">https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/vetting-private-security-providers.html</guid>
		<pubDate>Fri, 15 Mar 2024 15:26:00 +0000</pubDate>
		<enclosure url="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" length="12035" type="image/jpeg" />
	</item>
	<item>
		<title><![CDATA[Oversight and accountability]]></title>
		<description><![CDATA[<img style="margin:5px; float:left;" src="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" alt=" Working with Private Security Providers" /> <p>Note: These good practices are not meant to be prescriptive. It is up to the user to evaluate whether they could be feasible, useful and appropriate to the local context and specific situation on the ground.</p>]]></description>
		<link>https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/oversight-and-accountability.html</link>
		<guid isPermaLink="true">https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/oversight-and-accountability.html</guid>
		<pubDate>Fri, 15 Mar 2024 15:26:00 +0000</pubDate>
		<enclosure url="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" length="12035" type="image/jpeg" />
	</item>
	<item>
		<title><![CDATA[Relationship between public and private security]]></title>
		<description><![CDATA[<img style="margin:5px; float:left;" src="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" alt=" Working with Private Security Providers" /> <p>Note: These good practices are not meant to be prescriptive. It is up to the user to evaluate whether they could be feasible, useful and appropriate to the local context and specific situation on the ground.</p>]]></description>
		<link>https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/relationship-between-public-and-private-security.html</link>
		<guid isPermaLink="true">https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/relationship-between-public-and-private-security.html</guid>
		<pubDate>Fri, 15 Mar 2024 15:24:00 +0000</pubDate>
		<enclosure url="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" length="12035" type="image/jpeg" />
	</item>
	<item>
		<title><![CDATA[Human rights abuses]]></title>
		<description><![CDATA[<img style="margin:5px; float:left;" src="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" alt=" Working with Private Security Providers" /> <p>Note: These good practices are not meant to be prescriptive. It is up to the user to evaluate whether they could be feasible, useful and appropriate to the local context and specific situation on the ground.</p>]]></description>
		<link>https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/human-rights-abuses.html</link>
		<guid isPermaLink="true">https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/human-rights-abuses.html</guid>
		<pubDate>Fri, 15 Mar 2024 15:23:00 +0000</pubDate>
		<enclosure url="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" length="12035" type="image/jpeg" />
	</item>
	<item>
		<title><![CDATA[Labour standards]]></title>
		<description><![CDATA[<img style="margin:5px; float:left;" src="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" alt=" Working with Private Security Providers" /> <p>Note: These good practices are not meant to be prescriptive. It is up to the user to evaluate whether they could be feasible, useful and appropriate to the local context and specific situation on the ground.</p>]]></description>
		<link>https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/labour-standards.html</link>
		<guid isPermaLink="true">https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/labour-standards.html</guid>
		<pubDate>Fri, 15 Mar 2024 15:22:00 +0000</pubDate>
		<enclosure url="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" length="12035" type="image/jpeg" />
	</item>
	<item>
		<title><![CDATA[Training]]></title>
		<description><![CDATA[<img style="margin:5px; float:left;" src="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" alt=" Working with Private Security Providers" /> <p>Note: These good practices are not meant to be prescriptive. It is up to the user to evaluate whether they could be feasible, useful and appropriate to the local context and specific situation on the ground.</p>]]></description>
		<link>https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/training.html</link>
		<guid isPermaLink="true">https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/training.html</guid>
		<pubDate>Fri, 15 Mar 2024 15:21:00 +0000</pubDate>
		<enclosure url="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" length="12035" type="image/jpeg" />
	</item>
	<item>
		<title><![CDATA[Private security within risk and impact assessment]]></title>
		<description><![CDATA[<img style="margin:5px; float:left;" src="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" alt=" Working with Private Security Providers" /> <p>Note: These good practices are not meant to be prescriptive. It is up to the user to evaluate whether they could be feasible, useful and appropriate to the local context and specific situation on the ground.</p>]]></description>
		<link>https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/private-security-within-risk-and-impact-assessment.html</link>
		<guid isPermaLink="true">https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/private-security-within-risk-and-impact-assessment.html</guid>
		<pubDate>Fri, 15 Mar 2024 15:20:00 +0000</pubDate>
		<enclosure url="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" length="12035" type="image/jpeg" />
	</item>
	<item>
		<title><![CDATA[Bids and contracts]]></title>
		<description><![CDATA[<img style="margin:5px; float:left;" src="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" alt=" Working with Private Security Providers" /> <p>Note: These good practices are not meant to be prescriptive. It is up to the user to evaluate whether they could be feasible, useful and appropriate to the local context and specific situation on the ground.</p>]]></description>
		<link>https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/bids-and-contracts.html</link>
		<guid isPermaLink="true">https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/bids-and-contracts.html</guid>
		<pubDate>Fri, 15 Mar 2024 15:18:00 +0000</pubDate>
		<enclosure url="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" length="12035" type="image/jpeg" />
	</item>
	<item>
		<title><![CDATA[Local procurement]]></title>
		<description><![CDATA[<img style="margin:5px; float:left;" src="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" alt=" Working with Private Security Providers" /> <p>Note: These good practices are not meant to be prescriptive. It is up to the user to evaluate whether they could be feasible, useful and appropriate to the local context and specific situation on the ground.</p>]]></description>
		<link>https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/local-procurement.html</link>
		<guid isPermaLink="true">https://www.securityhumanrightshub.org/es/toolkit/challenge-areas/working-with-private-security-providers/local-procurement.html</guid>
		<pubDate>Fri, 15 Mar 2024 15:17:00 +0000</pubDate>
		<enclosure url="https://www.securityhumanrightshub.org/media/images/articles2/article482_thumb.jpg" length="12035" type="image/jpeg" />
	</item>
</channel>
</rss>