CYBER VIOLENCE AGAINST WOMEN AND GIRLS
cyber_violence_gender%20report
cyber_violence_gender%20report
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
ecome aware of its presence on their sites (New<br />
Zealand). In South Africa, an individual within a company<br />
as well as the company itself can bear criminal liability<br />
for failing to comply with a court’s request to facilitate<br />
the identification of an individual accused of online<br />
harassment. 87 The Manila Principles on Intermediary<br />
Liability, while not VAWG specific, provide useful<br />
information and research.<br />
Terms of Use in practice: There is no one-size-fits-all<br />
solution for the complex set of challenges raised by Terms<br />
of Use (ToU) enforcement. Platforms vary in terms of<br />
history, mission, content hosted, size, and user base,<br />
and no single set of practices will be an appropriate<br />
fit in every case. Moreover, while the examples in this<br />
report focus on platforms that host social media, the<br />
recommendations are broadly applicable to companies<br />
that host different types of user-generated content.<br />
They should acknowledge that companies can have a<br />
significant impact on user rights and user satisfaction by<br />
being clearer and more consistent in how they implement<br />
ToU and interact with users. And they are mindful that<br />
costs associated with creating channels for customer<br />
support, responses to user inquiries, appeals processes,<br />
and similar mechanisms should not be underestimated.<br />
Positive outcomes often rely on proactive and transparent<br />
communications with users from the outset and at each<br />
stage of interaction between the company and a user. It is<br />
in this context that recommendations cover primarily the<br />
following areas: Offer clear, consistent, and transparent<br />
ToU and guidelines:<br />
• Respond when a suspected violation of the ToU is<br />
identified<br />
• Provide opportunities for recourse: appeals, due<br />
Process, and data export<br />
• Embed human rights considerations into company<br />
practice and platform design<br />
• Recommendations for users.<br />
Useful resources exist to help platforms design programs<br />
and policies that are consonant with human rights<br />
norms and practices. These include the Global Network<br />
Initiative’s Principles on Free Expression and Privacy;<br />
the Protect, Respect, and Remedy framework created by<br />
John Ruggie, the United Nations Special Representative of<br />
the Secretary General on transnational corporations and<br />
other business enterprises; and the OECD’s Guidelines<br />
for Multinational Enterprises—Recommendations for<br />
Responsible Business Conduct in a Global Context. 88<br />
APC has also created a checklist for social media<br />
platforms based on the Ruggie framework titled: Ensuring<br />
compliance with the UN Guiding Principles: A checklist for<br />
addressing violence against women.<br />
An interesting example of a “soft tool” used by<br />
government to discourage violence against women<br />
through ICTs is being proposed by the Government of<br />
Sweden in the form of a “seal” that will indicate whether<br />
video games are gender friendly. 89<br />
4.3.2 On-line safety tools and apps<br />
To date there are a few security tools for women 90 that<br />
comprise innovative tracking, monitoring and reporting<br />
methods; they represent civil society’s immediate<br />
response to dealing with VAWG. There has been a wave<br />
of safety technology developed for smartphone users:<br />
whistles to get bystanders’ attention, GPS trackers to<br />
lead people to your location, automatic video recordings<br />
to capture proof of a crime, to name a few. For example,<br />
bsafe and guardly are free downloadable apps. Other<br />
examples include:<br />
• HARASSmap is a mobile online technology that<br />
uses interactive mapping to try to reduce the social<br />
acceptability of sexual harassment throughout<br />
Egypt by monitoring harassment. Reports are<br />
mapped and appear as a red dot.<br />
• SafetiPin is a map-based mobile personal safety<br />
36