[Bp_counteringabuse] Bp_counteringabuse Digest, Vol 5, Issue 7

Lisa Garcia lisa.garcia at gmail.com
Fri Aug 7 23:26:13 EDT 2015


Hi Anri,

Please find attached some cases from the Philippines. We have also included
the sources, should you wish to check on them further. We are also
encouraging our partners to participate in the online survey.

Warm regards.

Lisa

On Wed, Aug 5, 2015 at 5:27 PM, Anri VAN DER SPUY <AVANDERSPUY at unog.ch>
wrote:

> Dear Erika
>
> Sorry to hear about your (double!) computer problems and glad to have you
> back and promoting our work at IGF LAC! I see survey responses streaming
> in, so you (and everyone else!) are doing something right - thanks.
>
> Would be great if you could get someone from Google to submit their
> actions as a company case study example. We're still lacking those.
>
> Hope to see you Tuesday.
>
> All the best,
>
> Anri
>
>
>
> From:        "Erika Smith" <erika at apcwomen.org>
> To:        "Lisa Garcia" <lisa.garcia at gmail.com>,
> Cc:        "Anri VAN DER SPUY" <avanderspuy at unog.ch>, "katharina jens" <
> katharina.jens at gmail.com>, bp_counteringabuse at intgovforum.org
> Date:        04/08/2015 17:32
> Subject:        Re: [Bp_counteringabuse] Bp_counteringabuse Digest, Vol
> 5, Issue 7
> ------------------------------
>
>
>
> Hello everyone,
> apologies for being behind on debates and not participating in the most
> recent meetings. I have been travelling but also my ability to communicate
> affected by 2 (TWO!) computers breaking down on me while in transit.  So
> I've a backlog of three weeks of mail.
>
> However, I am at the IGF LAC and am actively promoting the BP and have
> been plugging our BP consistently, and making personal contacts for
> filling out survey or offering cases.
>
> I *hope* I can get back to you all on these issues by friday or monday
> when meetings here are finalised. We have convened with Derechos Digitales
> a public conversation on cyber violence - multistakeholder format - this
> afternoon as it was not a specific theme in the lac igf, will let you know
> how it goes, but will specifically ask the representatives from google to
> include their actions to remove indexing of reported revenge porn as a
> best practice example.
>
> warm greetings to all,
>
> erika
>
>
> > Hello Anri, Jac,
> >
> > Although I have not participated in the online meetings, I have been
> > following the developments and discussions on this. We can also help
> > provide some examples from the Philippines based on the categories
> > identified.
> >
> > Regards.
> >
> > Lisa
> >
> >
> >
> > On Wed, Jul 22, 2015 at 9:24 PM, Anri VAN DER SPUY <AVANDERSPUY at unog.ch>
> > wrote:
> >
> >> Hi Katharina
> >>
> >> Thanks for volunteering!
> >>
> >> Sadaf and Erika (both copied) also volunteered to find some examples, so
> >> perhaps the three of you can liaise amongst yourselves to make the task
> >> easier and to prevent a duplication of work?
> >>
> >> You can see the current list of practices on the working document
> >> <
> https://docs.google.com/document/d/120ASwl3zLW7n6bhH1fpHrYyJ-4J0UUvjr1_oQ4tgs6M/edit
> >
> >> (section 1.2a)), but I think the easiest would be if you simply use the
> >> mailing list to send examples.
> >>
> >> We're looking at finalising this section by 10 August - is that deadline
> >> workable for you?
> >>
> >> Thanks again,
> >> Anri
> >>
> >>
> >>
> >> From:        katharina jens <katharina.jens at gmail.com>
> >> To:        bp_counteringabuse at intgovforum.org,
> >> Date:        22/07/2015 15:08
> >> Subject:        Re: [Bp_counteringabuse] Bp_counteringabuse Digest, Vol
> >> 5, Issue 7
> >> Sent by:        "Bp_counteringabuse" <
> >> bp_counteringabuse-bounces at intgovforum.org>
> >> ------------------------------
> >>
> >>
> >>
> >> Hi everyone,
> >>
> >> Jac, I can volunteer to find different examples of VAW online, as I
> >> remember you mentioned the necessity for this in the last meeting. If
> >> you
> >> agree, what is the best way for me to publish them? Here on the mailing
> >> list or add them to our working document?
> >>
> >> Let me know what you think.
> >>
> >> Best,
> >> Katharina
> >>
> >>
> >> On 16 Jul 2015, at 17:00, *bp_counteringabuse-request at intgovforum.org*
> >> <bp_counteringabuse-request at intgovforum.org> wrote:
> >>
> >> Send Bp_counteringabuse mailing list submissions to
> >> *bp_counteringabuse at intgovforum.org*
> >> <bp_counteringabuse at intgovforum.org>
> >>
> >> To subscribe or unsubscribe via the World Wide Web, visit
> >>
> http://intgovforum.org/mailman/listinfo/bp_counteringabuse_intgovforum.org
> >>
> >> or, via email, send a message with subject or body 'help' to
> >> bp_counteringabuse-request at intgovforum.org
> >>
> >> You can reach the person managing the list at
> >> bp_counteringabuse-owner at intgovforum.org
> >>
> >> When replying, please edit your Subject line so it is more specific
> >> than "Re: Contents of Bp_counteringabuse digest..."
> >> Today's Topics:
> >>
> >>  1. INPUT: 1.2 Problem definition: Countering Online Violence
> >>     Against Women (Jac sm Kee)
> >>
> >> *From: *Jac sm Kee <jac at apcwomen.org>
> >> *Subject: [Bp_counteringabuse] INPUT: 1.2 Problem definition: Countering
> >> Online Violence Against Women*
> >> *Date: *15 July 2015 19:14:29 BST
> >> *To: *Anri VAN DER SPUY <AVANDERSPUY at unog.ch>,
> >> bp_counteringabuse at intgovforum.org
> >>
> >>
> >> -----BEGIN PGP SIGNED MESSAGE-----
> >> Hash: SHA1
> >>
> >> Hi everyone,
> >>
> >> As we are getting into the substance of the discussion, we are also
> >> looking for input through this mailing list for those who are unable to
> >> participate in the regular fortnightly meetings. As such, we will
> >> schedule a series of input requests following the timeline of the BPF as
> >> well.
> >>
> >> The purpose for a mailing list input is also to facilitate more
> >> discussion on each of the different sections.
> >>
> >> - -------------------------------------
> >> The first section for discussion is on 1.2: Problem Definition [1.1 is
> >> the introduction, which will be written when it ends].
> >>
> >> a) How would you define online abuse and VAW? Please add specific
> >> references from research or other policy documents as you see relevant.
> >>
> >> b) In your knowledge or experience, what are the types of behaviour of
> >> conduct that you think constitute online abuse or VAW?
> >>
> >> In particular, what would you add to the following categories, or
> >> change them, or include examples or cases to them as you have come
> >> across?
> >>
> >> a) Infringement of privacy
> >> - - Accessing private data without consent
> >> - - Taking photo/video without consent
> >> - - Sharing and/or disseminating private information, including
> >> (sexualised) images, audio clips or video clips, without knowledge or
> >> consent
> >> - - Doxxing (researching and broadcasting personally identifiable
> >> information about an individual without consent)
> >>
> >> b) Surveillance and monitoring
> >> - - Monitoring & tracking online or offline activities and movement
> >> - - Restricting/controlling mobility
> >>
> >> c) Damaging reputation/credibility:
> >> - - Deleting emails, creating false personal data like online accounts
> >> or advertisement postings
> >> - - Manipulating or creating fake photos and videos.
> >> - - Disseminating private information for the purposes of damaging
> >> reputation
> >> - - Offensive, denigrating, false online comments that are intended to
> >> tarnish a person's reputation
> >>
> >> d) Harassment
> >> - - Repeated harassment through unwanted messages & contact
> >> - - Direct threats of violence, including sexual and physical violence
> >> - - Abusive comments
> >> - - Verbal online abuse
> >> - - Hate speech targetted on gender and sexuality
> >> - - Mobbing (as a practice specifically facilitated by technology)
> >>
> >> e) Direct threats or violence
> >> - - Trafficking of women through the use of technology
> >> - - Online abuse directly transformed into offline, physical abuse
> >> because of online information
> >> - - Sexualised blackmail or extortion
> >> - - Stealing identity, money or property
> >> - - Impersonation resulting in physical attack
> >>
> >> f) Targetted attacks to communities
> >> - - Hacking websites, social media or email accounts
> >> - - Surveillance and monitoring of activities by members in the
> >> community
> >> - - Direct threats of violence to community members
> >> - - Disclosure of anonymised information like address of shelters etc
> >>
> >> More?
> >>
> >> - -------------------------------------
> >> Deadline for responding: **24 July** [In the meeting, we said 1 week,
> >> but since we are delayed in this email, seems to make sense to have it
> >> until 24 July, before our next meeting]
> >>
> >> As a reminder, we will be following the draft outline of work that you
> >> can find in the google doc here:
> >>
> https://docs.google.com/document/d/120ASwl3zLW7n6bhH1fpHrYyJ-4J0UUvjr1_o
> >> Q4tgs6M/edit
> >>
> >> You also have the option of responding via the survey here:
> >>
> https://docs.google.com/forms/d/1Az3fSQRX5nVlkMpReLz4Vtk8QWygHqqJRrSrbvK
> >> 5ZS0/viewform
> >>
> >> Much thanks, and looking forward to your responses!
> >>
> >> Best,
> >> jac
> >>
> >> - ---------------------------------
> >> Jac sm Kee
> >> Manager, Women's Rights Programme
> >> Association for Progressive Communications
> >> www.apc.org | www.takebackthetech.net | erotics.apc.org
> >> Jitsi: jacsmk | Skype: jacsmk | Twitter: @jhybe
> >> -----BEGIN PGP SIGNATURE-----
> >> Version: GnuPG/MacGPG2 v2.0.14 (Darwin)
> >>
> >> iQEcBAEBAgAGBQJVpqMEAAoJEKpQzmPAS5Fmn2oIAIA0YDWoj1BVryLhvMUrOGen
> >> S5N/b0x86IMW4qMGGzCjrS+8Pb0XXLkdI2RbyxitBifwwbt4glmMfel12+Wg5ICn
> >> Pgn3LDq3US1I8TKfPuJELyQMYOA5SnKigiVATN5rdZg15PmOOD0y5FlAT+G9voyp
> >> EMra50rl5VzQ0rLOdY2tkdcthDo4cfoxFT09spnAziUQgDHhTHgnaPtHeIo+I9YF
> >> tqitJlGXpKiy6qsXk+KXU7z7LsscJJfFhtFGv7SEAt70270sfsRnBVU66KL1J//g
> >> zwqo8OloVUbVDtZsVLcQ/1Bq81DFxNvNEDsvKpbftCfK9HWah42O+RoONKJHlsI=
> >> =dJxC
> >> -----END PGP SIGNATURE-----
> >>
> >>
> >>
> >>
> >> _______________________________________________
> >> Bp_counteringabuse mailing list
> >> Bp_counteringabuse at intgovforum.org
> >>
> http://intgovforum.org/mailman/listinfo/bp_counteringabuse_intgovforum.org
> >> _______________________________________________
> >> Bp_counteringabuse mailing list
> >> Bp_counteringabuse at intgovforum.org
> >>
> http://intgovforum.org/mailman/listinfo/bp_counteringabuse_intgovforum.org
> >>
> >>
> >> _______________________________________________
> >> Bp_counteringabuse mailing list
> >> Bp_counteringabuse at intgovforum.org
> >>
> http://intgovforum.org/mailman/listinfo/bp_counteringabuse_intgovforum.org
> >>
> >>
> > _______________________________________________
> > Bp_counteringabuse mailing list
> > Bp_counteringabuse at intgovforum.org
> >
> http://intgovforum.org/mailman/listinfo/bp_counteringabuse_intgovforum.org
> >
>
>
> Erika Smith
> Association for Progressive Communications
> Women's Rights Programme
>
> Take Back the Tech! Reclaim ICTs to end violence against women:
> https://www.takebackthetech.net
> Map tech-related violence https://www.apc.org/ushahidi
> Gender and ICT Policy Portal: https://genderit.org
> Connect your Rights! Internet Rights are Human Rights:
> http://www.apc.org/en/node/11424
> Gender Evaluation Methodology for ICTS: https://genderevaluation.net
> GreeningIT - ICTS, Climate Change & Environmental Sustainability:
> https://www.apc.org/node/8022
>
>
>
> _______________________________________________
> Bp_counteringabuse mailing list
> Bp_counteringabuse at intgovforum.org
> http://intgovforum.org/mailman/listinfo/bp_counteringabuse_intgovforum.org
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://intgovforum.org/pipermail/bp_counteringabuse_intgovforum.org/attachments/20150808/bdee18a0/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: PHilippine country experience.docx
Type: application/vnd.openxmlformats-officedocument.wordprocessingml.document
Size: 160421 bytes
Desc: not available
URL: <http://intgovforum.org/pipermail/bp_counteringabuse_intgovforum.org/attachments/20150808/bdee18a0/attachment.docx>


More information about the Bp_counteringabuse mailing list