Anonymity and digital privacy are a critical part of human rights, but they are also connected to cyber crime, such as fraud, identity theft, cyber stalking, bullying, phishing and trolling. Survivors of VAW rely on anonymity and privacy to access life-saving information, while abusers use these rights as an opportunity to commit violence freely.
Anonymous communication has an important place in political and social discourse and is effective in promoting freedom of expression. Anonymity and privacy allow women to protect themselves, find resources when facing violence, seek community when isolated, speak out against repression and find information on sensitive health issues. When women face violence, they may not come forward without the assurance of privacy during and after their case.
You can learn more about protecting privacy and anonymity when talking to survivors and storing data in the Take Back the Tech! companion fact sheets.
|Providing training on privacy and anonymity for police officers dealing with VAW is critical. People experiencing violence need to be able to report crimes anonymously and ensure that their privacy will be protected, especially if the perpetrator remains at large. Many police departments even keep survivor addresses out of protection order databases in order to improve safety. Additionally, persons reporting the abuse of others should be able do so anonymously.|
Train officers or advocates to give survivors advice on data protection and privacy. Officers should consider how privacy and data laws, as well as changes to those laws, can affect their work with survivors. Where laws have yet to catch up with ICT, some officers work diligently to find unique ways to apply other laws to ICT-related cases. For example, they use copyright laws to stop so-called “revenge porn”, or the abuse of private images for blackmail and harassment.
Furthermore, there are cases of officers stealing intimate photos from the phones of women they arrest and sharing them with their colleagues. Such officers should be charged according to the law, and departments should have written policies and protocols for reporting these privacy violations.
Tech-related violence usually leaves an evidence trail, which service providers should be trained to recognise. Work with survivors to save communications (e.g., SMS, emails, instant messages, chatroom messages, phone bills, screenshots of web pages, receipts, log files) and document each contact. Because ICT trends change quickly, providers need frequent training on ICT and VAW so they can collect evidence and help survivors stay safe.
In the digital age, the protection of client confidentiality by survivor service providers is essential. Keeping case files away from the internet and networked computers can ensure that they cannot be accessed by hackers. If you have a shared database, ensure that all parties use the same standards to protect privacy and anonymity. Develop a privacy and security protocol for the organisation based on a risk assessment and confidentiality commitments to the survivor.
Schools and universities
|School staff should be acquainted with the school's privacy policies as well any privacy laws relevant to minors, but many schools have not updated their disciplinary and privacy policies to reflect changes in ICT. Without updated policies, incidents can slip through the cracks, survivor privacy can be easily (if unintentionally) violated and schools can be held liable. Ideally, there should be a trained staff person assigned to respond to cases of tech-related and other violence.|
|Students should have the opportunity to report any crime anonymously or remain anonymous during the investigation. Some schools even use an anonymous reporting system.|
Employers should be familiar with area privacy laws related to the workplace and provide clear and comprehensive guidelines for employees, informing them of the rights and obligations of both parties. Do not assume that employees know where the privacy line is drawn at work.
Employers should consider the following:
- Privacy policies and settings: Easy to find, comprehensive, optimised for usability.
- Trusted information technology (IT) systems: Using confidentiality standards, maintaining system integrity.
- Protection of the virtual personality: Digital signatures, user names, passwords, PINs, etc., must not be used or changed by others without the consent of the owner.
Intermediaries (telecoms, internet service providers and other platforms through which tech-related violence happens) are obliged to provide customer privacy policies and terms of service and to enable users to maintain a certain level of privacy. In case of data or identity theft, intermediaries may be responsible for investigating and providing advice to users.