“Gender-based violence (GBV) is violence that is directed at an individual based on his or her biological sex OR gender identity. It includes physical, sexual, verbal, emotional, and psychological abuse, threats, coercion, and economic or educational deprivation, whether occurring in public or private life.”
Too many victims of GBV often suffer in silence, feeling guilty and ashamed , wondering why this has happened to them, and what they could have done to prevent it. This stigma is something that needs to be eradicated from our world! NO victim of GBV is ever asking for it!!
SA Women Fight Back are here to help victims of GBV become Survivors, warriors..
Our Universal Right is life , Security, Equality and also the right to freedom from discrimination.
TYPES OF GBV
How to get a protection order
Step 1: Report the complaint to a local police station.
Step 2: Apply for a protection order at a magistrates court.
Step 3: A magistrate considers the application.
Step 4: An interim protection order may be granted and will be served on the respondent.
Step 5: Court proceedings or hearing of evidence to determine whether a final protection order should be granted.
Step 6: Consequences for the respondent if he/she violates the conditions of a final protection order.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.