SlideShare a Scribd company logo
1 of 43
Download to read offline
Enforcing Your
Code of Conduct
effective incident response
Audrey Eschright - Open Source and Feelings 2015
Content Warning
• general discussion of harassment and its effects
• types of harassment and other code of conduct
violations that occur
a Code of Conduct
is a tool for creating
inclusive spaces
As an event organizer…
• you’ve been asked to add a code of conduct for
your event
• you agree to do it, but…
• you really hope no one ever has to report a
problem because you’re not prepared—yet!
A Code of Conduct
How do we use it
effectively?
Start with your values
• education
• friendliness
• communication
• the ability to participate and learn
• diversity of perspectives
We value an environment
free from harassment
“Open Source & Feelings is dedicated to providing 

a safe, inclusive, welcoming, harassment-free 

conference experience for everyone”
Specify what behaviors are
inappropriate
“Harassment includes verbal comments that reinforce social
structures of domination related to gender, gender identity and
expression, sexual orientation, disability, physical appearance,
body size, race, age, religion; sexual images in public spaces;
deliberate intimidation; stalking; following; harassing
photography or recording; sustained disruption of talks or
other events; inappropriate physical contact; and unwelcome
sexual attention.”
Actions we may
choose to take
“If a participant engages in harassing behavior, the
conference organizers may take any action they deem
appropriate, including warning the offender or expulsion from
the conference with no refund.”
Behaviors that are
appropriate
“Participate in an authentic and active way. In doing so, you
contribute to the health and longevity of this community.”
“Be mindful of your surroundings and of your fellow
participants.”
The scope of the policy
“We expect all community participants (guests, sponsors, and
contributors, paid or otherwise) to abide by this Code of
Conduct in all community venues, online and in-person, as
well as in all one-on-one communications pertaining to
community business.”
Who to contact
“If you are subject to or witness unacceptable behavior, or
have any other concerns, please notify a community organizer
as soon as possible at conduct@osfeels.com.”
Reporting guidelines
• contact info for the reporter
• names of all people involved, if known
• when and where it happened
• what happened
• additional context
• is it ongoing?
Use an existing
Code of Conduct
• Geek Feminism anti-harassment policy
• Citizen Code of Conduct
• Contributor Covenant
Tell your community
what this is for
• why we have a code of conduct
• what we expect from participants
• who to contact
The response team
• at least two people
• keep each other accountable
• trade off duties when needed
Represent the people
you’re trying to include
• will people feel comfortable reporting 

problems to you?
• work to build trust through representation 

(as well as your actions)
• don’t ask the one woman in your group to help
just because of her gender
Covering big events
• figure out who’s on duty
• make sure you cover after-hours and offsite
events
• check in at least daily
• plan for record-keeping needs
• assign someone to cover social media
Types of incidents 

(a small sample)
• sexist, racist, or homophobic remarks or jokes
• in-person harassment
• non-consensual physical contact
• physical or sexual assault
• online harassment through social media or email
• stalking
Responding to reports
• gather information
• assess the impact and risk of further harm
• determine what resources are needed
• address the problem
• follow up with the people affected
• record the full details and resolution
• follow up within your organization
An example report
• reported by: Mike
• who: Chris G (@creepius, creepius@example.com)
• when: October 2015 meeting
• what happened: Chris made an offensive joke about Muslims
after a speaker with an Arabic name presented. The speaker
was not present, but Mike overheard it and brought it to our
attention.
• additional context: n/a
• ongoing? no
Responding to the report
• state that you received a report of a code of
conduct issue
• when and where it happened
• a general description of what happened 

(don’t name the reporter)
• what the consequences are
• what you expect from the person now
You control who participates
• “Oh no! I can’t believe I said that. 

I am so sorry.”
• “What are you talking about? 

I didn’t do anything.”
When you receive a report
• focus on recording the details, not your
judgement
• record what you’re hearing from the person
affected
• write it down
• assume reports are credible
Privacy is important
• out in the hallway or another room
• off the mailing list, in private email
• not where bystanders will overhear or read
Safety First
• quiet
• rest
• water
• medical assistance
• trusted friends
Trauma and triggers
• code of conduct violations can be traumatic
• traumatic events can cause certain reactions
• when someone is reminded of past trauma in a
way that causes these reactions, we call that a
“trigger”
• fatigue, disorientation, memory loss, and inability
to focus are all normal responses
Impact assessment
• how many people are affected?
• in public? in private?
• spill-over effects
Analyzing risk
• medical or legal requirements
• repeat offenders
• how dangerous is it for this to happen again?
Risk + impact
low risk high risk
low impact
inappropriate
jokes made in
private
attendee with
previous arrest
or assault
high impact
inappropriate
jokes
persistent
coordinated
harassment
Using risk + impact to
determine a response
low risk high risk
low impact verbal warning
take notes,
follow-up later
high impact
public apology,
remove person
from event
coordinated
whole-team
response
Gather resources
• other members of your organizing team
• past incident logs
• organizers of other events who have been similarly affected
• people with specialized expertise
• crisis line
• 911
• online safety resources like Crash Override
Resolve the situation
• choose a fair and proportionate response
• stay true to your values
• you’re responsible to the direct victim(s) and to
the community as a whole
Make the decision you need right now
—
Decide on the
long-term penalties later
Follow up with the people
who were affected
• did you find a code of conduct violation?
• how you responded (i.e. reprimand, asking the
person to not participate)
• anything further you need to discuss
Reduce the threat of
retaliation
• be very cautious about sharing information that
can be used to identify people
• retaliation will tend to target the people seen as
most vulnerable
• retaliation can target individuals or groups
Following up with the
reporter from our event
• we found a code of conduct violation
• we chose the reprimand the person
• he will be asked to leave if it happens again
• we’re here in case you need more support or
anything else happens
Time to regroup
• how did it go?
• what did we learn?
• do we need anything for next time?
• is there anything we haven’t resolved?
You did it!
• this is hard work!
• it is so important to your community that you do
it well
• be kind to yourselves
How to use this template
• write an incident response plan for your event,
project, or community space
• do training with the people responsible for taking
and responding to reports
Thank you!
• email me: audrey@lifeofaudrey.com
• my site: lifeofaudrey.com
• my work: recompilermag.com
• more resources: safetyfirstpdx.org 

(a work in progress—you can help!)

More Related Content

What's hot

Presentation_Malware Analysis.pptx
Presentation_Malware Analysis.pptxPresentation_Malware Analysis.pptx
Presentation_Malware Analysis.pptxnishanth kurush
 
Recommender system algorithm and architecture
Recommender system algorithm and architectureRecommender system algorithm and architecture
Recommender system algorithm and architectureLiang Xiang
 
Music Recommendations at Scale with Spark
Music Recommendations at Scale with SparkMusic Recommendations at Scale with Spark
Music Recommendations at Scale with SparkChris Johnson
 
Homepage Personalization at Spotify
Homepage Personalization at SpotifyHomepage Personalization at Spotify
Homepage Personalization at SpotifyOguz Semerci
 
An introduction to Recommender Systems
An introduction to Recommender SystemsAn introduction to Recommender Systems
An introduction to Recommender SystemsDavid Zibriczky
 
Netflix's Recommendation ML Pipeline Using Apache Spark: Spark Summit East ta...
Netflix's Recommendation ML Pipeline Using Apache Spark: Spark Summit East ta...Netflix's Recommendation ML Pipeline Using Apache Spark: Spark Summit East ta...
Netflix's Recommendation ML Pipeline Using Apache Spark: Spark Summit East ta...Spark Summit
 
PR-386: Light Field Networks: Neural Scene Representations with Single-Evalua...
PR-386: Light Field Networks: Neural Scene Representations with Single-Evalua...PR-386: Light Field Networks: Neural Scene Representations with Single-Evalua...
PR-386: Light Field Networks: Neural Scene Representations with Single-Evalua...Hyeongmin Lee
 
81-220-1 Chapter 8
81-220-1 Chapter 881-220-1 Chapter 8
81-220-1 Chapter 8mpalaro
 
Recommendation system
Recommendation systemRecommendation system
Recommendation systemSAIFUR RAHMAN
 
Personalizing the listening experience
Personalizing the listening experiencePersonalizing the listening experience
Personalizing the listening experienceMounia Lalmas-Roelleke
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesChamath Sajeewa
 
AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...Daniel Faggella
 
Zillow's favorite big data & machine learning tools
Zillow's favorite big data & machine learning toolsZillow's favorite big data & machine learning tools
Zillow's favorite big data & machine learning toolsnjstevens
 
Crime Analysis using Data Analysis
Crime Analysis using Data AnalysisCrime Analysis using Data Analysis
Crime Analysis using Data AnalysisChetan Hireholi
 

What's hot (20)

Racial and gender bias in AI
Racial and gender bias in AI Racial and gender bias in AI
Racial and gender bias in AI
 
Presentation_Malware Analysis.pptx
Presentation_Malware Analysis.pptxPresentation_Malware Analysis.pptx
Presentation_Malware Analysis.pptx
 
Recommender system algorithm and architecture
Recommender system algorithm and architectureRecommender system algorithm and architecture
Recommender system algorithm and architecture
 
Music Recommendations at Scale with Spark
Music Recommendations at Scale with SparkMusic Recommendations at Scale with Spark
Music Recommendations at Scale with Spark
 
Homepage Personalization at Spotify
Homepage Personalization at SpotifyHomepage Personalization at Spotify
Homepage Personalization at Spotify
 
An introduction to Recommender Systems
An introduction to Recommender SystemsAn introduction to Recommender Systems
An introduction to Recommender Systems
 
Data Science: Past, Present, and Future
Data Science: Past, Present, and FutureData Science: Past, Present, and Future
Data Science: Past, Present, and Future
 
Netflix's Recommendation ML Pipeline Using Apache Spark: Spark Summit East ta...
Netflix's Recommendation ML Pipeline Using Apache Spark: Spark Summit East ta...Netflix's Recommendation ML Pipeline Using Apache Spark: Spark Summit East ta...
Netflix's Recommendation ML Pipeline Using Apache Spark: Spark Summit East ta...
 
PR-386: Light Field Networks: Neural Scene Representations with Single-Evalua...
PR-386: Light Field Networks: Neural Scene Representations with Single-Evalua...PR-386: Light Field Networks: Neural Scene Representations with Single-Evalua...
PR-386: Light Field Networks: Neural Scene Representations with Single-Evalua...
 
81-220-1 Chapter 8
81-220-1 Chapter 881-220-1 Chapter 8
81-220-1 Chapter 8
 
Predictive Policing
Predictive PolicingPredictive Policing
Predictive Policing
 
Anomaly Detection
Anomaly DetectionAnomaly Detection
Anomaly Detection
 
Recommendation system
Recommendation systemRecommendation system
Recommendation system
 
Personalizing the listening experience
Personalizing the listening experiencePersonalizing the listening experience
Personalizing the listening experience
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articles
 
Bias in AI
Bias in AIBias in AI
Bias in AI
 
AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...
 
Zillow's favorite big data & machine learning tools
Zillow's favorite big data & machine learning toolsZillow's favorite big data & machine learning tools
Zillow's favorite big data & machine learning tools
 
Crime and Criminology
Crime and CriminologyCrime and Criminology
Crime and Criminology
 
Crime Analysis using Data Analysis
Crime Analysis using Data AnalysisCrime Analysis using Data Analysis
Crime Analysis using Data Analysis
 

Viewers also liked

Code of Ethics for Cooperative Leaders and Employees
Code of Ethics for Cooperative Leaders and EmployeesCode of Ethics for Cooperative Leaders and Employees
Code of Ethics for Cooperative Leaders and Employeesjo bitonio
 
大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま
大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま
大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいまMaehana Tsuyoshi
 
Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...
Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...
Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...Slamit
 
Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013
Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013
Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013Rob Reynolds
 
How does a gender lens contribute to a healthy environment and healthy people...
How does a gender lens contribute to a healthy environment and healthy people...How does a gender lens contribute to a healthy environment and healthy people...
How does a gender lens contribute to a healthy environment and healthy people...Jo Vearey
 
React.js: Beyond the Browser
React.js: Beyond the BrowserReact.js: Beyond the Browser
React.js: Beyond the Browsergarbles
 
Code of conduct (Central)
Code of conduct (Central)Code of conduct (Central)
Code of conduct (Central)koolman
 
Code of Professional Practice SJSD
Code of Professional Practice SJSDCode of Professional Practice SJSD
Code of Professional Practice SJSDjcordovasjsd
 
Employee engagement in Toyota Motor Corporation
Employee engagement in Toyota Motor CorporationEmployee engagement in Toyota Motor Corporation
Employee engagement in Toyota Motor CorporationSinja Raut
 
Hourglass: a Library for Incremental Processing on Hadoop
Hourglass: a Library for Incremental Processing on HadoopHourglass: a Library for Incremental Processing on Hadoop
Hourglass: a Library for Incremental Processing on HadoopMatthew Hayes
 
Let out for good behaviour
Let out for good behaviourLet out for good behaviour
Let out for good behaviourLisa Stevens
 
Storytelling using Javascript HTML5 CSS3
Storytelling using Javascript HTML5 CSS3Storytelling using Javascript HTML5 CSS3
Storytelling using Javascript HTML5 CSS3Xavier Damman
 
Organizational+behavior
Organizational+behaviorOrganizational+behavior
Organizational+behaviorSachin Salvi
 

Viewers also liked (20)

Azure Web Scalability
Azure Web ScalabilityAzure Web Scalability
Azure Web Scalability
 
Code of conduct
Code of conductCode of conduct
Code of conduct
 
Code of conduct(BECG)
Code of conduct(BECG)Code of conduct(BECG)
Code of conduct(BECG)
 
Code of Ethics for Cooperative Leaders and Employees
Code of Ethics for Cooperative Leaders and EmployeesCode of Ethics for Cooperative Leaders and Employees
Code of Ethics for Cooperative Leaders and Employees
 
Code of Conduct
Code of ConductCode of Conduct
Code of Conduct
 
大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま
大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま
大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま
 
Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...
Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...
Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...
 
Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013
Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013
Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013
 
How does a gender lens contribute to a healthy environment and healthy people...
How does a gender lens contribute to a healthy environment and healthy people...How does a gender lens contribute to a healthy environment and healthy people...
How does a gender lens contribute to a healthy environment and healthy people...
 
React.js: Beyond the Browser
React.js: Beyond the BrowserReact.js: Beyond the Browser
React.js: Beyond the Browser
 
Code of conduct (Central)
Code of conduct (Central)Code of conduct (Central)
Code of conduct (Central)
 
Code of Professional Practice SJSD
Code of Professional Practice SJSDCode of Professional Practice SJSD
Code of Professional Practice SJSD
 
Hcc ems-code-of-conduct-6.20134
Hcc ems-code-of-conduct-6.20134Hcc ems-code-of-conduct-6.20134
Hcc ems-code-of-conduct-6.20134
 
Employee engagement in Toyota Motor Corporation
Employee engagement in Toyota Motor CorporationEmployee engagement in Toyota Motor Corporation
Employee engagement in Toyota Motor Corporation
 
H&P Code of Conduct
H&P Code of ConductH&P Code of Conduct
H&P Code of Conduct
 
Code of Conduct PFN
Code of Conduct PFNCode of Conduct PFN
Code of Conduct PFN
 
Hourglass: a Library for Incremental Processing on Hadoop
Hourglass: a Library for Incremental Processing on HadoopHourglass: a Library for Incremental Processing on Hadoop
Hourglass: a Library for Incremental Processing on Hadoop
 
Let out for good behaviour
Let out for good behaviourLet out for good behaviour
Let out for good behaviour
 
Storytelling using Javascript HTML5 CSS3
Storytelling using Javascript HTML5 CSS3Storytelling using Javascript HTML5 CSS3
Storytelling using Javascript HTML5 CSS3
 
Organizational+behavior
Organizational+behaviorOrganizational+behavior
Organizational+behavior
 

Similar to Enforcing Your Code of Conduct: effective incident response

Workshop Sessions: New training ,models for University staff: What worked for...
Workshop Sessions: New training ,models for University staff: What worked for...Workshop Sessions: New training ,models for University staff: What worked for...
Workshop Sessions: New training ,models for University staff: What worked for...CEPS Projectes Socials #makingprojects
 
For Abortion Providers: How to work with individuals in the sex trade
For Abortion Providers: How to work with individuals in the sex tradeFor Abortion Providers: How to work with individuals in the sex trade
For Abortion Providers: How to work with individuals in the sex tradeLindsay A. Roth
 
Media Relations Training
Media Relations TrainingMedia Relations Training
Media Relations TrainingDonna Dubuc
 
Ethics in journalism
Ethics in journalismEthics in journalism
Ethics in journalismMMcCardle
 
Lateral Violence, Bullying, Victims ...Big River Saskatchewan
Lateral Violence, Bullying, Victims ...Big River SaskatchewanLateral Violence, Bullying, Victims ...Big River Saskatchewan
Lateral Violence, Bullying, Victims ...Big River Saskatchewangriehl
 
Sexual Harassment, Gender Discrimination and Sexism
Sexual Harassment, Gender Discrimination and SexismSexual Harassment, Gender Discrimination and Sexism
Sexual Harassment, Gender Discrimination and SexismYash Kaushik
 
Harassment Training by Iowa Civil Rights Commission
Harassment Training by Iowa Civil Rights CommissionHarassment Training by Iowa Civil Rights Commission
Harassment Training by Iowa Civil Rights CommissionAtlantic Training, LLC.
 
Session 1 introducing the bystander [autosaved]
Session 1   introducing the bystander [autosaved]Session 1   introducing the bystander [autosaved]
Session 1 introducing the bystander [autosaved]su-training
 
fall_2019_thayer_orientation life change.pptx
fall_2019_thayer_orientation life change.pptxfall_2019_thayer_orientation life change.pptx
fall_2019_thayer_orientation life change.pptxchandan100088
 
Behind the wall keynote a. nelson [2.18.25]
Behind the wall keynote a. nelson [2.18.25]Behind the wall keynote a. nelson [2.18.25]
Behind the wall keynote a. nelson [2.18.25]aknelson
 
Online training an advocates role in s.a. crisis intervention
Online training an advocates role in s.a. crisis interventionOnline training an advocates role in s.a. crisis intervention
Online training an advocates role in s.a. crisis interventionHi-Line's Help
 
Family Life Education - Legal and Ethical Issues
Family Life Education - Legal and Ethical IssuesFamily Life Education - Legal and Ethical Issues
Family Life Education - Legal and Ethical IssuesAdam Thompson
 
Better Communication in Nursing - Ending Nursing Violence
Better Communication in Nursing - Ending Nursing ViolenceBetter Communication in Nursing - Ending Nursing Violence
Better Communication in Nursing - Ending Nursing Violencegriehl
 
Presentation on PSEA
Presentation on PSEAPresentation on PSEA
Presentation on PSEASediqInami
 
Social Justice. Social Good. Social Media. Social Change.
Social Justice. Social Good. Social Media. Social Change.Social Justice. Social Good. Social Media. Social Change.
Social Justice. Social Good. Social Media. Social Change.Paul Brown
 
The way back project: Needs and views of people who have attempted suicide an...
The way back project: Needs and views of people who have attempted suicide an...The way back project: Needs and views of people who have attempted suicide an...
The way back project: Needs and views of people who have attempted suicide an...Hunter Institute of Mental Health
 
First AID for psychology.ppt
First AID for psychology.pptFirst AID for psychology.ppt
First AID for psychology.pptdevmarineacademy
 

Similar to Enforcing Your Code of Conduct: effective incident response (20)

Ethics Training by Service Master Clean
Ethics Training by Service Master CleanEthics Training by Service Master Clean
Ethics Training by Service Master Clean
 
Workshop Sessions: New training ,models for University staff: What worked for...
Workshop Sessions: New training ,models for University staff: What worked for...Workshop Sessions: New training ,models for University staff: What worked for...
Workshop Sessions: New training ,models for University staff: What worked for...
 
For Abortion Providers: How to work with individuals in the sex trade
For Abortion Providers: How to work with individuals in the sex tradeFor Abortion Providers: How to work with individuals in the sex trade
For Abortion Providers: How to work with individuals in the sex trade
 
Media Relations Training
Media Relations TrainingMedia Relations Training
Media Relations Training
 
Ethics in journalism
Ethics in journalismEthics in journalism
Ethics in journalism
 
Lateral Violence, Bullying, Victims ...Big River Saskatchewan
Lateral Violence, Bullying, Victims ...Big River SaskatchewanLateral Violence, Bullying, Victims ...Big River Saskatchewan
Lateral Violence, Bullying, Victims ...Big River Saskatchewan
 
Sexual Harassment, Gender Discrimination and Sexism
Sexual Harassment, Gender Discrimination and SexismSexual Harassment, Gender Discrimination and Sexism
Sexual Harassment, Gender Discrimination and Sexism
 
Harassment Training by Iowa Civil Rights Commission
Harassment Training by Iowa Civil Rights CommissionHarassment Training by Iowa Civil Rights Commission
Harassment Training by Iowa Civil Rights Commission
 
Session 1 introducing the bystander [autosaved]
Session 1   introducing the bystander [autosaved]Session 1   introducing the bystander [autosaved]
Session 1 introducing the bystander [autosaved]
 
Safe spaces2014.ppt
Safe spaces2014.pptSafe spaces2014.ppt
Safe spaces2014.ppt
 
fall_2019_thayer_orientation life change.pptx
fall_2019_thayer_orientation life change.pptxfall_2019_thayer_orientation life change.pptx
fall_2019_thayer_orientation life change.pptx
 
Behind the wall keynote a. nelson [2.18.25]
Behind the wall keynote a. nelson [2.18.25]Behind the wall keynote a. nelson [2.18.25]
Behind the wall keynote a. nelson [2.18.25]
 
Online training an advocates role in s.a. crisis intervention
Online training an advocates role in s.a. crisis interventionOnline training an advocates role in s.a. crisis intervention
Online training an advocates role in s.a. crisis intervention
 
Family Life Education - Legal and Ethical Issues
Family Life Education - Legal and Ethical IssuesFamily Life Education - Legal and Ethical Issues
Family Life Education - Legal and Ethical Issues
 
Better Communication in Nursing - Ending Nursing Violence
Better Communication in Nursing - Ending Nursing ViolenceBetter Communication in Nursing - Ending Nursing Violence
Better Communication in Nursing - Ending Nursing Violence
 
Presentation on PSEA
Presentation on PSEAPresentation on PSEA
Presentation on PSEA
 
Anger
AngerAnger
Anger
 
Social Justice. Social Good. Social Media. Social Change.
Social Justice. Social Good. Social Media. Social Change.Social Justice. Social Good. Social Media. Social Change.
Social Justice. Social Good. Social Media. Social Change.
 
The way back project: Needs and views of people who have attempted suicide an...
The way back project: Needs and views of people who have attempted suicide an...The way back project: Needs and views of people who have attempted suicide an...
The way back project: Needs and views of people who have attempted suicide an...
 
First AID for psychology.ppt
First AID for psychology.pptFirst AID for psychology.ppt
First AID for psychology.ppt
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Enforcing Your Code of Conduct: effective incident response

  • 1. Enforcing Your Code of Conduct effective incident response Audrey Eschright - Open Source and Feelings 2015
  • 2. Content Warning • general discussion of harassment and its effects • types of harassment and other code of conduct violations that occur
  • 3. a Code of Conduct is a tool for creating inclusive spaces
  • 4. As an event organizer… • you’ve been asked to add a code of conduct for your event • you agree to do it, but… • you really hope no one ever has to report a problem because you’re not prepared—yet!
  • 5. A Code of Conduct
  • 6. How do we use it effectively?
  • 7. Start with your values • education • friendliness • communication • the ability to participate and learn • diversity of perspectives
  • 8. We value an environment free from harassment “Open Source & Feelings is dedicated to providing 
 a safe, inclusive, welcoming, harassment-free 
 conference experience for everyone”
  • 9. Specify what behaviors are inappropriate “Harassment includes verbal comments that reinforce social structures of domination related to gender, gender identity and expression, sexual orientation, disability, physical appearance, body size, race, age, religion; sexual images in public spaces; deliberate intimidation; stalking; following; harassing photography or recording; sustained disruption of talks or other events; inappropriate physical contact; and unwelcome sexual attention.”
  • 10. Actions we may choose to take “If a participant engages in harassing behavior, the conference organizers may take any action they deem appropriate, including warning the offender or expulsion from the conference with no refund.”
  • 11. Behaviors that are appropriate “Participate in an authentic and active way. In doing so, you contribute to the health and longevity of this community.” “Be mindful of your surroundings and of your fellow participants.”
  • 12. The scope of the policy “We expect all community participants (guests, sponsors, and contributors, paid or otherwise) to abide by this Code of Conduct in all community venues, online and in-person, as well as in all one-on-one communications pertaining to community business.”
  • 13. Who to contact “If you are subject to or witness unacceptable behavior, or have any other concerns, please notify a community organizer as soon as possible at conduct@osfeels.com.”
  • 14. Reporting guidelines • contact info for the reporter • names of all people involved, if known • when and where it happened • what happened • additional context • is it ongoing?
  • 15. Use an existing Code of Conduct • Geek Feminism anti-harassment policy • Citizen Code of Conduct • Contributor Covenant
  • 16. Tell your community what this is for • why we have a code of conduct • what we expect from participants • who to contact
  • 17. The response team • at least two people • keep each other accountable • trade off duties when needed
  • 18. Represent the people you’re trying to include • will people feel comfortable reporting 
 problems to you? • work to build trust through representation 
 (as well as your actions) • don’t ask the one woman in your group to help just because of her gender
  • 19. Covering big events • figure out who’s on duty • make sure you cover after-hours and offsite events • check in at least daily • plan for record-keeping needs • assign someone to cover social media
  • 20. Types of incidents 
 (a small sample) • sexist, racist, or homophobic remarks or jokes • in-person harassment • non-consensual physical contact • physical or sexual assault • online harassment through social media or email • stalking
  • 21. Responding to reports • gather information • assess the impact and risk of further harm • determine what resources are needed • address the problem • follow up with the people affected • record the full details and resolution • follow up within your organization
  • 22. An example report • reported by: Mike • who: Chris G (@creepius, creepius@example.com) • when: October 2015 meeting • what happened: Chris made an offensive joke about Muslims after a speaker with an Arabic name presented. The speaker was not present, but Mike overheard it and brought it to our attention. • additional context: n/a • ongoing? no
  • 23. Responding to the report • state that you received a report of a code of conduct issue • when and where it happened • a general description of what happened 
 (don’t name the reporter) • what the consequences are • what you expect from the person now
  • 24. You control who participates • “Oh no! I can’t believe I said that. 
 I am so sorry.” • “What are you talking about? 
 I didn’t do anything.”
  • 25. When you receive a report • focus on recording the details, not your judgement • record what you’re hearing from the person affected • write it down • assume reports are credible
  • 26. Privacy is important • out in the hallway or another room • off the mailing list, in private email • not where bystanders will overhear or read
  • 27. Safety First • quiet • rest • water • medical assistance • trusted friends
  • 28. Trauma and triggers • code of conduct violations can be traumatic • traumatic events can cause certain reactions • when someone is reminded of past trauma in a way that causes these reactions, we call that a “trigger” • fatigue, disorientation, memory loss, and inability to focus are all normal responses
  • 29. Impact assessment • how many people are affected? • in public? in private? • spill-over effects
  • 30. Analyzing risk • medical or legal requirements • repeat offenders • how dangerous is it for this to happen again?
  • 31. Risk + impact low risk high risk low impact inappropriate jokes made in private attendee with previous arrest or assault high impact inappropriate jokes persistent coordinated harassment
  • 32. Using risk + impact to determine a response low risk high risk low impact verbal warning take notes, follow-up later high impact public apology, remove person from event coordinated whole-team response
  • 33. Gather resources • other members of your organizing team • past incident logs • organizers of other events who have been similarly affected • people with specialized expertise • crisis line • 911 • online safety resources like Crash Override
  • 34. Resolve the situation • choose a fair and proportionate response • stay true to your values • you’re responsible to the direct victim(s) and to the community as a whole
  • 35. Make the decision you need right now — Decide on the long-term penalties later
  • 36. Follow up with the people who were affected • did you find a code of conduct violation? • how you responded (i.e. reprimand, asking the person to not participate) • anything further you need to discuss
  • 37.
  • 38. Reduce the threat of retaliation • be very cautious about sharing information that can be used to identify people • retaliation will tend to target the people seen as most vulnerable • retaliation can target individuals or groups
  • 39. Following up with the reporter from our event • we found a code of conduct violation • we chose the reprimand the person • he will be asked to leave if it happens again • we’re here in case you need more support or anything else happens
  • 40. Time to regroup • how did it go? • what did we learn? • do we need anything for next time? • is there anything we haven’t resolved?
  • 41. You did it! • this is hard work! • it is so important to your community that you do it well • be kind to yourselves
  • 42. How to use this template • write an incident response plan for your event, project, or community space • do training with the people responsible for taking and responding to reports
  • 43. Thank you! • email me: audrey@lifeofaudrey.com • my site: lifeofaudrey.com • my work: recompilermag.com • more resources: safetyfirstpdx.org 
 (a work in progress—you can help!)