{"id":1897,"date":"2019-02-05T08:27:42","date_gmt":"2019-02-05T08:27:42","guid":{"rendered":"https:\/\/accessaccountability.org\/?p=1897"},"modified":"2020-05-13T03:41:43","modified_gmt":"2020-05-13T03:41:43","slug":"human-rights-documentation-methods-part-2","status":"publish","type":"post","link":"https:\/\/accessaccountability.org\/index.php\/2019\/02\/05\/human-rights-documentation-methods-part-2\/","title":{"rendered":"Human Rights Documentation Methods (Part 2)"},"content":{"rendered":"<p>[et_pb_section fb_built=&#x201D;1&#x2033; _builder_version=&#x201D;3.19.18&#x2033; custom_padding=&#x201D;0|0px|0|0px|false|false&#x201D;][et_pb_row _builder_version=&#x201D;3.19.18&#x2033; custom_padding=&#x201D;0|0px|0|0px|false|false&#x201D;][et_pb_column type=&#x201D;4_4&#x2033; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_video src=&#x201D;https:\/\/www.youtube.com\/watch?v=ysk9uUSgYoc&#x201D; _builder_version=&#x201D;3.19.18&#x2033;][\/et_pb_video][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#x201D;1&#x2033; _builder_version=&#x201D;3.19.18&#x2033; custom_padding=&#x201D;0|0px|0|0px|false|false&#x201D;][et_pb_row _builder_version=&#x201D;3.19.18&#x2033; custom_padding=&#x201D;35px|0px|0|0px|false|false&#x201D;][et_pb_column type=&#x201D;4_4&#x2033; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_text _builder_version=&#x201D;3.19.18&#x2033;]<\/p><p>&#x201C;Human Rights Documentation Methods&#x201D; was recorded on 25 July 2017. This was the second session of the conference titled <a href=\"https:\/\/accessaccountability.org\/index.php\/2017\/07\/27\/amassing-evidence-workshop-for-practitioners\/\" target=\"_blank\" rel=\"noopener noreferrer\">Amassing Evidence: Applying Information Technology and Forensic Science in Human Rights Documentation<\/a>, held in Seoul, South Korea.<\/p>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n\n\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":2557,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","footnotes":""},"categories":[9,121],"tags":[],"class_list":["post-1897","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-documentation","category-video"],"_links":{"self":[{"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/posts\/1897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/comments?post=1897"}],"version-history":[{"count":3,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/posts\/1897\/revisions"}],"predecessor-version":[{"id":1988,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/posts\/1897\/revisions\/1988"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/media\/2557"}],"wp:attachment":[{"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/media?parent=1897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/categories?post=1897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/tags?post=1897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}