Protecting sources and identifying user-generated disinformation policy

Last Updated: September 1, 2024

Purpose 

This policy sets out how we protect confidential sources while effectively identifying and addressing user-generated disinformation. It ensures we maintain our ethical standards, protect our sources, and serve the public interest.

Who Must Follow This 

All team members handling information: fact-checkers, editors, contributors, and partners.

Our Core Principles

  • Keeping sources safe and confidential
  • Being clear about our fact-checking methods
  • Following ethical and legal standards
  • Maintaining our credibility and integrity

Protecting Our Sources

Source Confidentiality

  • Sources remain anonymous unless they agree otherwise
  • Use secure, encrypted communication channels
  • Protect sources from any form of retaliation
  • Limit source identity knowledge to essential staff only

Identifying User-Generated Disinformation

Detection and Assessment

  • Regular monitoring of online platforms
  • Strict fact-checking protocols for user content
  • Working with platforms to flag false information
  • Using both AI tools and human expertise for pattern detection

Verification Process

  • Cross-reference information with reliable sources
  • Document the verification steps taken
  • Maintain records of identified disinformation patterns
  • Regular reporting on emerging disinformation trends

Handling Sensitive Information

  • Consider impact before publishing sensitive content
  • Keep all sensitive data encrypted and secure
  • Follow all relevant privacy and digital content laws

When things go wrong

Reporting problems

  • Report any breach of source protection immediately
  • Independent committee reviews all incidents
  • Clear consequences for policy violations

Legal requirements

  • Comply with all privacy laws
  • Follow digital content regulations
  • Maintain proper documentation

Staying current We review this policy yearly to keep up with:

  • New technology
  • Changing legal requirements
  • Best practices in source protection
  • Evolution of disinformation tactics
Share to friends
Factсheck BY