Search


Tagged with Digital evidence x Reputation x

LIBEL AND HUMILIATION

Bad language, swearing and use of a disrespectful tone that degrade personal dignity, reputation and/or status in society. Pictures, videos, memes and gifs can also be utilised to inflict humiliation/shame. 

Everyone has different tolerance levels and the line between libel and criticism is often blurred.  Public figures, especially politicians who represent the general public,  must  display a higher level of tolerance of criticism. On the other hand, journalists, and human rights’ defenders, have the right to shock, disturb and even offend members of and the public at large, when carrying out their professional duties and in the public’s interest.

Female journalists, activists and women politicians are more likely to be targets of libel and humiliation than their male counterparts.  Offense based on gender identity or presentation is a silencing mechanism, and has been recognized as a form of gender-based violence and, as such, publicly condemned. https://twitter.com/UNESCO/status/1140888153928196096

If you are targeted with any type of digital violence, we urge you to seek support from your support networks that understand you and your feelings. Take time away from spaces where you’re experiencing the harassment, and ask people you trust to check on your accounts, emails and update you about the status of attack, or help you document the abuse.

If you are a  female journalist, there is  an initiative “Female Journalists against violence”, which offers support and help rooted in the empathy, trust and mutual learning.

Digital evidence Reputation Tactic Support Journalists Public official

REVENGE PORN

Revenge porn is defined as posting sexually explicit content without consent, with the intent of humiliation, shame or blackmail. Revenge porn is a violation of  privacy and can result in extreme emotional trauma. 
 

Even if the content was consensually created, consent must also explicitly be given for online posting or distribution. 

Regardless of the medium (video recording, pictures, or gif) - the act of posting non-consensual content alone can be considered revenge porn as a person targeted with online abuse is in no way to blame: there is no excuse for violence. If you are targeted with any type of digital violence, we urge you to seek support from your support networks - primarily friends, family, that can understand you and your feelings. Take time away from spaces where you’re experiencing the harassment, and ask people you trust to check on your accounts, emails and update you about the status of attack, or help you collect digital evidence  .

A journalist from Azerbaijan was secretly filmed engaging in sexual intercouse in her own home. This video was later leaked to the media and widely posted online. The European Court of Human Rights later determined that the journalist’s right to privacy and freedom of expression were violated. It was the first case of its kind that clearly established a link between privacy and freedom of expression.

Digital evidence Digital hygiene Reputation Safety Support Sexual Harassment Pornography Fear

IDENTITY MANIPULATION

Identity manipulation or misuse of personal data is a serious threat with potentially far-reaching consequences.

There are different forms of identity manipulation and fraud utilising unlawful collection of data, including data leaking, and database hacks, and information dumps, for example. 

The most common reasons for identity manipulation include theft, misrepresentation and cover-up of criminal activity.

Digital evidence Digital hygiene Damage Reputation Identity

DOXXING

Publicly disclosing personal information about a target, such as home address, familial status, bank and credit card details, date of birth etc. This information can be posted on one or many different platforms, in comment sections, or via video or text. 

The infraction of doxxing does not require that the published information be utilized with consequence to the target. The simple act of making sensitive information - the spread of which could have repercussions on the person whose information has been published -public, sends a clear message of intimidation and harassment. 

It is important to report online violence to social media platforms as there is  always the chance that the data is removed and/or the perpetrator blocked  . It is important to report abusive content as a method of documentation and evidence for police investigations and court cases - and there is always the chance that the content is removed and/or the perpetrator blocked. If needed, ask family and friends to take over reporting and communication with the platforms.

The most important thing is to take care of yourself, and acknowledge your feelings, even if it means allowing yourself a few days to lie in bed under the blankets, doing nothing.

There is always the option of abstaining from social media for a certain period of time, but given our reliance on these platforms, this is a strategy that is much easier said than done. Try instead to limit the time you spend on these platforms and interact with people you trust in closed group settings.

If you are a female journalist, there is an initiative “Female Journalists against violence”, which offers support and help rooted in the empathy, trust and mutual learning.

Check aslo OnLine SoS to learn more about additional means of protection.

Digital evidence Digital hygiene Harassment Reputation Safety Sexual Harassment Journalists Identity

LIBEL AND HUMILIATION

Bad language, swearing and use of a disrespectful tone that degrade personal dignity, reputation and/or status in society. Pictures, videos, memes and gifs can also be utilised to inflict humiliation/shame. 

Criminal charges detailing the assault, and any evidence (hard copy) must be officially filed with the police, referencing the criminal offense - in this case art. 170 of the Criminal Code. Note that the entire procedure as well as identification of the perpetrator is the responsibility of the filing party, given the designation of this criminal charge as a private offence. 

ADVICE: try not to respond to the statements/acts of libel and humiliation, as these responses could ultimately be used against you in court. 

Also, thoroughly assess the situation before initiating a court procedure, to ensure a bad joke or harsh criticism is not being claimed as offence. If the court makes this determination, the outcome can be negative for the filing party. 

If the identity of the perpetrator is known to you, you have the option of claiming damages before a civil court, although police support cannot be relied upon in this type of proceeding. A civil case can be initiated via lawsuit, and if the court finds in your favor, it results in monetary settlement.

Assessment of risk is a useful way to evaluate a potential offence - when it happened, why and from whom? For example, if you post an article on a sensitive societal issue, this tool can help with risk management, to evaluate  which groups or individuals may react negatively. It is important not to internalize  or normalize these types of offences. 

Choose a response that will help you feel safe and decrease the possibility of further harm, document  (or ask family and friends to) all acts of libel/humiliation, and learn more about digital safety, mechanisms for semi-functional protection on social media platforms.

Digital evidence Report to platform Block user Reputation Tactic Criminal charges

IDENTITY MANIPULATION

Identity manipulation or misuse of personal data is a serious threat with potentially far-reaching consequences. Whether the target is a person whose personal data has been misused, or someone else, the damage can be incalculable.

Due to the complexity and different manifestations of this category of assault, it is difficult to determine the legal basis offering the most suitable protection. In the case of fraud committed using the computer belonging to another person, and resulting in material or financial gain for the perpetrator, a criminal complaint may be filed under art. 301 (Computer Fraud).  Another criminal offense, the unauthorized collection of personal data (art. 146), must be initiated via private lawsuit, and therefore the identity of the perpetrator must be known.  

If a case of identity manipulation leads to psychological harm, or damage to reputation or dignity, then compensation may be claimed using civil legal procedures. Before initiating this type of lawsuit, the identity of the perpetrator as well as evidence substantiating the claim of identity manipulation and resulting harm must be provided.

 

Identity manipulation is often tied to financial fraud and online theft. There are different ways you can protect yourself from these crimes: limit the amount of money that can be transferred to another account, or taken out via ATM at one time, use at least a two-factor authentication system for your finance-related logins, and destroy old bank and other identity cards with sensitive data. 

If you are a victim of identity manipulation, inform the police as soon as possible, notify the financial institutions or websites where you have accounts and temporarily block compromised bank accounts and/or cards. 

Timely risk assessment and digital hygiene are important means of  prevention and protection.

Digital evidence Password Authentication Recovery account Phone/Tablet Damage Reputation Identity Cybercrime User account Computer/Laptop Access recovery System restore Criminal charges

GOOGLE BOMBING

Intentional optimization of inaccurate and malicious information on internet search engines (i.e. Google), with the objective of causing damage to the target’s dignity and reputation.

The criminal justice system does not explicitly prohibit this or identify it as a criminal act. From a technical viewpoint, Google bombing does not imply the misuse or manipulation of personal data. Rather it is seen as a misuse of the (Google) search engine. In certain cases, this type of assault can be prosecuted via Unauthorised Access to Computer, Computer Network or Electronic Data Processing (art.302 of the Criminal Code ). In this case, criminal charges, together with collected evidence  (screenshot  of the search results, analysis of the search optimization,etc), should be filed with the police.

For harm suffered in the form of damage to reputation and dignity, compensation may be claimed through civil legal proceedings initiated via a lawsuit. Before initiating this type of lawsuit, the identity of the perpetrator as well as evidence substantiating the claim of identity manipulation and resulting harm must be provided.

Because tools to modify search engine algorithms are widely available, almost anyone can alter search results. For this reason it is quite difficult to prevent or protect yourself from Google bombing.

Google has developed an extension for their search engine - Google Meet Bomb Guard that allows users to block all uninvited participants and generic gmail accounts from organized Google Meet groups.

Take a look at other available search engine extensions  that can help prevent this type of assault. 

Digital evidence Digital hygiene Browser Damage Report to platform Reputation

DOXXING

Publicly disclosing personal information about a target, such as home address, familial status, bank and credit card details, date of birth etc. This information can be posted on one or many different platforms, in comment sections, or via video or text. 

Regardless whether or not disclosed data is utilised for harassment, the unauthorized posting of data alone, qualifies as doxxing, and is viewed as a type of online attack. As is often the case, when doxxing creates an imminent danger to safety, art. 138 of the Criminal Code - Endangering safety - could provide legal protection. In this case, public prosecutors and police are mandated to follow up, investigate and responsible for protection. As the filing party, you are responsible for collecting evidence  needed for filing the criminal charges. This charge provides stricter sanctions if the target is a (female) journalist.

ADVICE: Explain in detail how, why and when you feel unsafe, and detail your concern for the safety of your family and loved ones. These details could be the key to success when it comes to court proceedings.

Art. 146 of the Criminal Code, Unauthorised Collection of Personal Data, which prohibits the collection, publication and use of data for purposes “other than those for which they are intended”, could provide the basis for legal protection. 

Document every instance and location in which your personal data was posted, and file this evidence with the police.

Immediately report doxxing and any other unauthorised publication of personal data to the websites or platforms where it was posted, and to the police. 

Follow-up on your report to better ensure they respond.  Immediate action is key to prevent further distribution of your personal information online.

Turn off location tracking options on your phone, Google maps, and other applications that collect your sensitive data (location, key address, etc). 

Put strict privacy controls on your social media profiles, and two-step authentication  systems for all website logins storing your sensitive data. 

Talk to the people you trust - colleagues, friends, employers. Urge the police to alert the platform to remove your personal data, and use website and platform reporting mechanisms. 
Deleteme is a tool that can help find and remove sensitive data online.

If you ever feel that the online violence you’re experiencing, might transition into the physical world, call the police → immediately. 

Digital evidence Password Recovery account Digital hygiene Phone/Tablet Location Report to platform Data leaks Reputation Safety Sexual Harassment Identity User account Computer/Laptop Criminal charges