{"id":359,"date":"2018-09-12T02:20:25","date_gmt":"2018-09-12T02:20:25","guid":{"rendered":"http:\/\/accessaccountability.org\/?p=359"},"modified":"2020-10-13T15:22:19","modified_gmt":"2020-10-13T06:22:19","slug":"how-to-deal-with-online-abuse-or-harassment","status":"publish","type":"post","link":"https:\/\/accessaccountability.org\/index.php\/2018\/09\/12\/how-to-deal-with-online-abuse-or-harassment\/","title":{"rendered":"How to Deal with Online Abuse or Harassment"},"content":{"rendered":"<p>[et_pb_section fb_built=&#x201D;1&#x2033; _builder_version=&#x201D;3.19.18&#x2033; custom_padding=&#x201D;0|0px|0|0px|false|false&#x201D;][et_pb_row custom_padding=&#x201D;0|0px|27px|0px|false|false&#x201D; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_column type=&#x201D;4_4&#x2033; _builder_version=&#x201D;3.19.18&#x2033;][et_pb_text _builder_version=&#x201D;3.19.18&#x2033;]<\/p><p><span>Many human rights defenders around the world experience online harassment. This is largely due to the rise of social media and its growing use in activism. No one is immune to threats: in a 2018 statement by the UN High Commissioner for Human Rights, Zeid Ra&#x2019;ad Al Hussein, <\/span><a href=\"https:\/\/www.ohchr.org\/EN\/NewsEvents\/Pages\/DisplayNews.aspx?NewsID=16414\" target=\"_blank\" rel=\"noopener noreferrer\"><span>rapporteurs<\/span><\/a><span> for the UN Human Rights Council are reported to have experienced online threats of increasing seriousness<\/span><span>. Human rights organizations such as <\/span><a href=\"https:\/\/www.amnesty.org\/en\/latest\/news\/2017\/11\/amnesty-reveals-alarming-impact-of-online-abuse-against-women\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span>Amnesty International<\/span><\/a><span> have also raised the issue<\/span><span>. <\/span><\/p>\n<p><!-- \/divi:paragraph --><\/p>\n<p><!-- divi:paragraph --><span>Current patterns of abuse show that female human rights defenders are more vulnerable to abuse, and that the main mode of attack is to damage the victim&#x2019;s credibility and public image in an attempt to silence their voice. Due to the high degree of international online connectivity we are now subjected to, abuse and harassment can escalate extremely quickly. The damage can not only involve the victim&#x2019;s credibility, but it can also have a significant psychological impact, causing stress, insomnia and depression.<\/span><\/p>\n<p><!-- \/divi:paragraph --><\/p>\n<h3><\/h3>\n<h3><\/h3>\n<h3><!-- divi:paragraph --><span><b>What is online harassment?<\/b><\/span><\/h3>\n<p><!-- \/divi:paragraph --><\/p>\n<p><!-- divi:list --><\/p>\n<ul>\n<li><span>Different types of threats can occur via online platforms:<\/span><\/li>\n<li><span>Your opinions are unfairly or wrongly misquoted in online news articles or social media;<\/span><\/li>\n<li><span>You receive derogatory comments such as racist or sexist abuse on your social media accounts;<\/span><\/li>\n<li><span>You receive deliberate, malicious commentary via the online platforms of others;<\/span><\/li>\n<li><span>Your private photos are shared online without your permission, sometimes altered without your consent to damage your reputation.<\/span><\/li>\n<\/ul>\n<p><!-- \/divi:list --><\/p>\n<p><!-- divi:paragraph --><span>Online harassment can also escalate into real-world threats to you or your family, such as via death threats, sexual assault, or other forms of physical harm. If you experience online harassment, it is important to take appropriate steps to address it and to protect yourself and those close to you.<\/span><\/p>\n<p><span><\/span><\/p>\n<p><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><!-- \/divi:paragraph --><\/a><\/p>\n<h3><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><!-- divi:paragraph --><span><b>How to respond<\/b><\/span><\/a><\/h3>\n<p><!-- \/divi:paragraph --><\/p>\n<p><!-- divi:paragraph --><span>In some instances, it may be appropriate to contact the harasser and tell them to stop. Do not allow anyone else to contact them on your behalf. Do not respond with aggression or any action that might be considered abuse, but tell the harassers you are not to be contacted or harassed in this way. In other situations, it may be preferable not to contact the harasser, but to report their conduct immediately.<\/span><\/p>\n<p><span><\/span><\/p>\n<p><!-- \/divi:paragraph --><\/p>\n<h3><!-- divi:paragraph --><a href=\"\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>How to report<\/strong><\/a><\/h3>\n<p><!-- \/divi:paragraph --><\/p>\n<p><!-- divi:paragraph -->Do not delete the record of harassment, but keep as much of the evidence as possible, from email records to chat logs. For example, take a screenshot of any social media pages where harassment appears, showing the date, time, and the name of the social media account. Save it as a pdf file and keep it in a safe place. Immediately complain to the appropriate parties and ask service providers such as Facebook or Twitter to take abusive content down. Consult law enforcement in your country for additional guidance. However, keep in mind that making a case can take up time and the costs can be prohibitive.<\/p>\n<p><!-- \/divi:paragraph --><\/p>\n<h3><\/h3>\n<h3><\/h3>\n<h3><!-- divi:paragraph --><span><b>Protect yourself from future abuse<\/b><\/span><\/h3>\n<p><!-- \/divi:paragraph --><\/p>\n<p><!-- divi:list --><\/p>\n<ul>\n<li><span>Although it may not be possible to avoid all forms of online abuse, there are key measures that all human rights defenders should take to minimize opportunities for attackers to cause harm. Here are some steps you can take:<\/span><\/li>\n<li><span>Block or ignore unwanted users <\/span><\/li>\n<li><span>Be cautious of uploading your personal photos and family, especially if you are female. Make your social media ID and email address as non-gender specific if possible. <\/span><\/li>\n<li><span>As online harassment can lead to real-world threat, do not post your personal information such as your contact numbers or addresses to your social media accounts. Check your privacy settings in social media to review who can see your posts. If you have been on social media for many years, review historical posts and remove anything you would not wish to see misused. (<a href=\"https:\/\/www.privacyrights.org\/consumer-guides\/online-harassment-cyberstalking\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.privacyrights.org\/consumer-guides\/online-harassment-cyberstalking<\/a>)<\/span><\/li>\n<li><span>Use caution when accepting friend requests or follow requests on social media. Even if you are accepting friend requests from someone you recognize, it is wise to verify their identity by contacting them through another form of communication before accepting the request (<a href=\"https:\/\/www.privacyrights.org\/consumer-guides\/online-harassment-cyberstalking\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.privacyrights.org\/consumer-guides\/online-harassment-cyberstalking<\/a>)<\/span><\/li>\n<\/ul>\n<p><!-- \/divi:list --><\/p>\n<p><!-- divi:paragraph --><span>For more information on good digital security practices, <\/span><span>see <\/span><a href=\"https:\/\/www.youtube.com\/watch?v=kjKjcll_qVY\" target=\"_blank\" rel=\"noopener noreferrer\"><span>this video<\/span><\/a><span>&#xA0;or <\/span><a href=\"https:\/\/accessaccountability.org\/index.php\/2018\/09\/12\/digital-security-checklist-for-human-rights-defenders\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span>article<\/span><\/a><span>.<\/span><\/p>\n<p><!-- \/divi:paragraph --><\/p>\n<p><!-- divi:shortcode --><\/p>\n<p><iframe loading=\"lazy\" width=\"1080\" height=\"608\" src=\"https:\/\/www.youtube.com\/embed\/kjKjcll_qVY?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p><!-- \/divi:shortcode --><\/p>\n<h2><!-- divi:paragraph --><span><b>Resources<\/b><\/span><\/h2>\n<p><a href=\"http:\/\/www.haltabuse.org\/help\/respond.shtml\">http:\/\/www.haltabuse.org\/help\/respond.shtml<\/a><\/p>\n<p><a href=\"https:\/\/www.privacyrights.org\/consumer-guides\/online-harassment-cyberstalking\">https:\/\/www.privacyrights.org\/consumer-guides\/online-harassment-cyberstalking<\/a><\/p>\n<p><a href=\"https:\/\/www.stopbullying.gov\/cyberbullying\/how-to-report\/index.html\">https:\/\/www.stopbullying.gov\/cyberbullying\/how-to-report\/index.html<\/a><\/p>\n<p><a href=\"https:\/\/www.stopbullying.gov\/cyberbullying\/how-to-report\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\" style=\"font-size: 16px;\"><\/a><\/p>\n<p><!-- divi:paragraph --><em><span>Last Updated: September, 2018<\/span><\/em><\/p>\n<p><!-- \/divi:paragraph --><\/p>\n<p><!-- divi:paragraph --><em>Author: Yurim Choi<\/em><\/p>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":6,"featured_media":3029,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:paragraph -->\n<p><span style=\"font-family: Times New Roman, serif;\">Many human rights defenders around the world experience online harassment. This is largely due to the rise of social media and its growing use in activism. No one is immune to threats: in a 2018 statement by the UN High Commissioner for Human Rights, Zeid Ra\u2019ad Al Hussein, <\/span><a href=\"https:\/\/www.ohchr.org\/EN\/NewsEvents\/Pages\/DisplayNews.aspx?NewsID=16414\"><span style=\"font-family: Times New Roman, serif;\">rapporteurs<\/span><\/a><span style=\"font-family: Times New Roman, serif;\"> for the UN Human Rights Council are reported to have experienced online threats of increasing seriousness<\/span><span style=\"font-family: Times New Roman, serif;\">. Human rights organizations such as <\/span><a href=\"https:\/\/www.amnesty.org\/en\/latest\/news\/2017\/11\/amnesty-reveals-alarming-impact-of-online-abuse-against-women\/\"><span style=\"font-family: Times New Roman, serif;\">Amnesty International<\/span><\/a><span style=\"font-family: Times New Roman, serif;\"> have also raised the issue<\/span><span style=\"font-family: Times New Roman, serif;\">. <\/span><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><span style=\"font-family: Times New Roman, serif;\">Current patterns of abuse show that female human rights defenders are more vulnerable to abuse, and that the main mode of attack is to damage the victim\u2019s credibility and public image in an attempt to silence their voice. Due to the high degree of international online connectivity we are now subjected to, abuse and harassment can escalate extremely quickly. The damage can not only involve the victim\u2019s credibility, but it can also have a significant psychological impact, causing stress, insomnia and depression.<\/span><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><span style=\"font-family: Times New Roman, serif;\"><b>What is online harassment?<\/b><\/span><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul><li><span style=\"font-family: Times New Roman, serif;\">Different types of threats can occur via online platforms:<\/span><\/li><li><span style=\"font-family: Times New Roman, serif;\">Your opinions are unfairly or wrongly misquoted in online news articles or social media;<\/span><\/li><li><span style=\"font-family: Times New Roman, serif;\">You receive derogatory comments such as racist or sexist abuse on your social media accounts;<\/span><\/li><li><span style=\"font-family: Times New Roman, serif;\">You receive deliberate, malicious commentary via the online platforms of others;<\/span><\/li><li><span style=\"font-family: Times New Roman, serif;\">Your private photos are shared online without your permission, sometimes altered without your consent to damage your reputation.<\/span><\/li><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p><span style=\"font-family: Times New Roman, serif;\">Online harassment can also escalate into real-world threats to you or your family, such as via death threats, sexual assault, or other forms of physical harm. If you experience online harassment, it is important to take appropriate steps to address it and to protect yourself and those close to you. <\/span><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><span style=\"font-family: Times New Roman, serif;\"><b>How to respond<\/b><\/span><span style=\"font-family: Times New Roman, serif;\"> (<a href=\"http:\/\/www.haltabuse.org\/help\/respond.shtml\">http:\/\/www.haltabuse.org\/help\/respond.shtml<\/a>)<\/span><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><span style=\"font-family: Times New Roman, serif;\">In some instances, it may be appropriate to contact the harasser and tell them to stop. Do not allow anyone else to contact them on your behalf. Do not respond with aggression or any action that might be considered abuse, but tell the harassers you are not to be contacted or harassed in this way. In other situations, it may be preferable not to contact the harasser, but to report their conduct immediately.<\/span><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>How\nto report<\/strong>\n(<a href=\"http:\/\/www.haltabuse.org\/help\/respond.shtml\">http:\/\/www.haltabuse.org\/help\/respond.shtml<\/a>)<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Do not delete the record of harassment, but keep as much of the evidence as possible, from email records to chat logs. For example, take a screenshot of any social media pages where harassment appears, showing the date, time, and the name of the social media account. Save it as a pdf file and keep it in a safe place. Immediately complain to the appropriate parties and ask service providers such as Facebook or Twitter to take abusive content down. Consult law enforcement in your country for additional guidance. However, keep in mind that making a case can take up time and the costs can be prohibitive.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman, serif;\"><b>Protect yourself from future abuse<\/b><\/span><\/span><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul><li><span style=\"font-family: Times New Roman, serif;\">Although it may not be possible to avoid all forms of online abuse, there are key measures that all human rights defenders should take to minimize opportunities for attackers to cause harm. Here are some steps you can take:<\/span><\/li><li><span style=\"font-family: Times New Roman, serif;\">Block or ignore unwanted users <\/span><\/li><li><span style=\"font-family: Times New Roman, serif;\">Be cautious of uploading your personal photos and family, especially if you are female. Make your social media ID and email address as non-gender specific if possible. <\/span><\/li><li><span style=\"font-family: Times New Roman, serif;\">As online harassment can lead to real-world threat, do not post your personal information such as your contact numbers or addresses to your social media accounts. Check your privacy settings in social media to review who can see your posts. If you have been on social media for many years, review historical posts and remove anything you would not wish to see misused. (<a href=\"https:\/\/www.privacyrights.org\/consumer-guides\/online-harassment-cyberstalking\">https:\/\/www.privacyrights.org\/consumer-guides\/online-harassment-cyberstalking<\/a>)<\/span><\/li><li><span style=\"font-family: Times New Roman, serif;\">Use caution when accepting friend requests or follow requests on social media. Even if you are accepting friend requests from someone you recognize, it is wise to verify their identity by contacting them through another form of communication before accepting the request (<a href=\"https:\/\/www.privacyrights.org\/consumer-guides\/online-harassment-cyberstalking\">https:\/\/www.privacyrights.org\/consumer-guides\/online-harassment-cyberstalking<\/a>)<\/span><\/li><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p><span style=\"font-family: Times New Roman, serif;\">For more information on good digital security practices, <\/span><span style=\"font-family: Times New Roman, serif;\">see <\/span><a href=\"https:\/\/www.youtube.com\/watch?v=kjKjcll_qVY\"><span style=\"font-family: Times New Roman, serif;\">this video<\/span><\/a><span style=\"font-family: Times New Roman, serif;\">&nbsp;or <\/span><a href=\"https:\/\/accessaccountability.org\/index.php\/2018\/09\/12\/digital-security-checklist-for-human-rights-defenders\/\"><span style=\"font-family: Times New Roman, serif;\">article<\/span><\/a><span style=\"font-family: Times New Roman, serif;\">.<\/span><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:shortcode -->\n[embed]https:\/\/www.youtube.com\/watch?v=kjKjcll_qVY[\/embed]\n<!-- \/wp:shortcode -->\n\n<!-- wp:paragraph -->\n<p><span style=\"font-family: Times New Roman, serif;\"><b>Resources<\/b><\/span><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:embed {\"url\":\"http:\/\/www.haltabuse.org\/help\/respond.shtml\"} -->\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttp:\/\/www.haltabuse.org\/help\/respond.shtml\n<\/div><\/figure>\n<!-- \/wp:embed -->\n\n<!-- wp:embed {\"url\":\"https:\/\/www.privacyrights.org\/consumer-guides\/online-harassment-cyberstalking\"} -->\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/www.privacyrights.org\/consumer-guides\/online-harassment-cyberstalking\n<\/div><\/figure>\n<!-- \/wp:embed -->\n\n<!-- wp:embed {\"url\":\"https:\/\/www.stopbullying.gov\/cyberbullying\/how-to-report\/index.html\"} -->\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/www.stopbullying.gov\/cyberbullying\/how-to-report\/index.html\n<\/div><\/figure>\n<!-- \/wp:embed -->\n\n<!-- wp:paragraph -->\n<p><em><span style=\"font-family: Calibri, serif;\">Last Updated: September 12, 2018<\/span><\/em><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><em>Author: Yurim Choi<\/em><\/p>\n<!-- \/wp:paragraph -->","footnotes":""},"categories":[160],"tags":[],"class_list":["post-359","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-security"],"_links":{"self":[{"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/posts\/359","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/comments?post=359"}],"version-history":[{"count":9,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/posts\/359\/revisions"}],"predecessor-version":[{"id":3030,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/posts\/359\/revisions\/3030"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/media\/3029"}],"wp:attachment":[{"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/media?parent=359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/categories?post=359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/accessaccountability.org\/index.php\/wp-json\/wp\/v2\/tags?post=359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}