Joke Collection Website - Public benefit messages - How do we protect our legitimate rights and interests when we suffer from online violence?
How do we protect our legitimate rights and interests when we suffer from online violence?
When we suffer from online violence, first of all, don’t be afraid, treat it calmly, and then choose the right way to deal with it.
1. First, let’s understand what cyber violence is.
Cyber ??violence is a form of violence. It is a type of harmful, insulting and inflammatory remarks made online. , pictures, and videos, people are accustomed to calling it "cyber violence."
2. What rights does cyber violence infringe on the victim
Cyber ??violence can cause reputational damage to the parties involved, and it has broken the moral bottom line and is often accompanied by infringements and violations of the law. criminal behavior.
my country's Civil Code clearly stipulates that citizens and legal persons enjoy the right to reputation, and citizens' personal dignity is protected by law. It is prohibited to use insults, slander, etc. to damage the reputations of citizens and legal persons. It also stipulates that citizens whose rights to name, portrait, reputation, and honor have been infringed have the right to demand an end to the infringement, restore their reputation, eliminate the impact, apologize, and demand compensation for losses.
3. What behaviors in life are cyber violence
1. Publish harmful, insulting and inflammatory falsehoods on the Internet regarding unconfirmed or confirmed Internet incidents Speeches, causing damage to the reputation of the parties involved;
2. Disclosing the personal privacy of the parties in real life online, infringing on their privacy rights;
3. Harming the normal lives of the parties and their relatives and friends Actions and speech intrusion, resulting in damage to their personal rights, etc.
4. How to protect your own rights and interests in the face of online violence
1. Collect evidence and clues
When we encounter online violence, information may appear After the information is leaked, we are likely to receive various emails or text messages, as well as various phone calls. At this time, we have to pay attention and write down the other party’s phone number or email address. and other useful information. This information may be trivial, but once collected, it will not only help you safeguard your rights, but may also help more people.
2. Each website platform has a reporting portal. You can report disputes over users’ reputation rights, portrait rights, privacy and other rights and interests. Use the complaint and reporting functions to report to the cyberspace department in this way. Or cyber police.
3. If rumors and attacks develop further, you can seek help from lawyers and the Internet Court to fix the evidence in a timely manner and ask Weibo to provide the personal information of the cyberviolent. At the same time, the lawyer's statement or the complaint certified by the media or platform will be posted on the Weibo of the party concerned.
4. You can be angry, but don’t be afraid, and don’t blame yourself too much, especially don’t reflect on yourself or explain yourself in response to the keyboard warrior’s accusations. Ordinary people have not received professional crisis public relations training, and it is easy for them to speak in a panic, leaving the keyboard warrior to pick out more words and write more articles.
5. Don’t put yourself in a bad mood because of other people’s attacks. You can choose to filter out some information to keep yourself in a normal mood.
- Previous article:How does Huawei nova4 start backup?
- Next article:Publish some classic words in 2020.
- Related articles
- How to turn on the 5gsa function
- A brief greeting during the Spring Festival holiday.
- English birthday greetings are short and powerful.
- How much is the deduction of Zheshang Bank's mortgage repayment?
- How does Huawei make WeChat notification display content?
- What if I can't receive the apple id verification code?
- Some short messages sent in groups show delivery, others don't show delivery, and they don't show delivery. Did the other party receive it?
- How did the collection company find my social security information?
- How does CCB inquire about its bank number?
- How does ipad set up synchronous iphone SMS?