SlideShare a Scribd company logo
Enforcing Your
Code of Conduct
effective incident response
Audrey Eschright - Open Source and Feelings 2015
Content Warning
• general discussion of harassment and its effects
• types of harassment and other code of conduct
violations that occur
a Code of Conduct
is a tool for creating
inclusive spaces
As an event organizer…
• you’ve been asked to add a code of conduct for
your event
• you agree to do it, but…
• you really hope no one ever has to report a
problem because you’re not prepared—yet!
A Code of Conduct
How do we use it
effectively?
Start with your values
• education
• friendliness
• communication
• the ability to participate and learn
• diversity of perspectives
We value an environment
free from harassment
“Open Source & Feelings is dedicated to providing 

a safe, inclusive, welcoming, harassment-free 

conference experience for everyone”
Specify what behaviors are
inappropriate
“Harassment includes verbal comments that reinforce social
structures of domination related to gender, gender identity and
expression, sexual orientation, disability, physical appearance,
body size, race, age, religion; sexual images in public spaces;
deliberate intimidation; stalking; following; harassing
photography or recording; sustained disruption of talks or
other events; inappropriate physical contact; and unwelcome
sexual attention.”
Actions we may
choose to take
“If a participant engages in harassing behavior, the
conference organizers may take any action they deem
appropriate, including warning the offender or expulsion from
the conference with no refund.”
Behaviors that are
appropriate
“Participate in an authentic and active way. In doing so, you
contribute to the health and longevity of this community.”
“Be mindful of your surroundings and of your fellow
participants.”
The scope of the policy
“We expect all community participants (guests, sponsors, and
contributors, paid or otherwise) to abide by this Code of
Conduct in all community venues, online and in-person, as
well as in all one-on-one communications pertaining to
community business.”
Who to contact
“If you are subject to or witness unacceptable behavior, or
have any other concerns, please notify a community organizer
as soon as possible at conduct@osfeels.com.”
Reporting guidelines
• contact info for the reporter
• names of all people involved, if known
• when and where it happened
• what happened
• additional context
• is it ongoing?
Use an existing
Code of Conduct
• Geek Feminism anti-harassment policy
• Citizen Code of Conduct
• Contributor Covenant
Tell your community
what this is for
• why we have a code of conduct
• what we expect from participants
• who to contact
The response team
• at least two people
• keep each other accountable
• trade off duties when needed
Represent the people
you’re trying to include
• will people feel comfortable reporting 

problems to you?
• work to build trust through representation 

(as well as your actions)
• don’t ask the one woman in your group to help
just because of her gender
Covering big events
• figure out who’s on duty
• make sure you cover after-hours and offsite
events
• check in at least daily
• plan for record-keeping needs
• assign someone to cover social media
Types of incidents 

(a small sample)
• sexist, racist, or homophobic remarks or jokes
• in-person harassment
• non-consensual physical contact
• physical or sexual assault
• online harassment through social media or email
• stalking
Responding to reports
• gather information
• assess the impact and risk of further harm
• determine what resources are needed
• address the problem
• follow up with the people affected
• record the full details and resolution
• follow up within your organization
An example report
• reported by: Mike
• who: Chris G (@creepius, creepius@example.com)
• when: October 2015 meeting
• what happened: Chris made an offensive joke about Muslims
after a speaker with an Arabic name presented. The speaker
was not present, but Mike overheard it and brought it to our
attention.
• additional context: n/a
• ongoing? no
Responding to the report
• state that you received a report of a code of
conduct issue
• when and where it happened
• a general description of what happened 

(don’t name the reporter)
• what the consequences are
• what you expect from the person now
You control who participates
• “Oh no! I can’t believe I said that. 

I am so sorry.”
• “What are you talking about? 

I didn’t do anything.”
When you receive a report
• focus on recording the details, not your
judgement
• record what you’re hearing from the person
affected
• write it down
• assume reports are credible
Privacy is important
• out in the hallway or another room
• off the mailing list, in private email
• not where bystanders will overhear or read
Safety First
• quiet
• rest
• water
• medical assistance
• trusted friends
Trauma and triggers
• code of conduct violations can be traumatic
• traumatic events can cause certain reactions
• when someone is reminded of past trauma in a
way that causes these reactions, we call that a
“trigger”
• fatigue, disorientation, memory loss, and inability
to focus are all normal responses
Impact assessment
• how many people are affected?
• in public? in private?
• spill-over effects
Analyzing risk
• medical or legal requirements
• repeat offenders
• how dangerous is it for this to happen again?
Risk + impact
low risk high risk
low impact
inappropriate
jokes made in
private
attendee with
previous arrest
or assault
high impact
inappropriate
jokes
persistent
coordinated
harassment
Using risk + impact to
determine a response
low risk high risk
low impact verbal warning
take notes,
follow-up later
high impact
public apology,
remove person
from event
coordinated
whole-team
response
Gather resources
• other members of your organizing team
• past incident logs
• organizers of other events who have been similarly affected
• people with specialized expertise
• crisis line
• 911
• online safety resources like Crash Override
Resolve the situation
• choose a fair and proportionate response
• stay true to your values
• you’re responsible to the direct victim(s) and to
the community as a whole
Make the decision you need right now
—
Decide on the
long-term penalties later
Follow up with the people
who were affected
• did you find a code of conduct violation?
• how you responded (i.e. reprimand, asking the
person to not participate)
• anything further you need to discuss
Enforcing Your Code of Conduct: effective incident response
Reduce the threat of
retaliation
• be very cautious about sharing information that
can be used to identify people
• retaliation will tend to target the people seen as
most vulnerable
• retaliation can target individuals or groups
Following up with the
reporter from our event
• we found a code of conduct violation
• we chose the reprimand the person
• he will be asked to leave if it happens again
• we’re here in case you need more support or
anything else happens
Time to regroup
• how did it go?
• what did we learn?
• do we need anything for next time?
• is there anything we haven’t resolved?
You did it!
• this is hard work!
• it is so important to your community that you do
it well
• be kind to yourselves
How to use this template
• write an incident response plan for your event,
project, or community space
• do training with the people responsible for taking
and responding to reports
Thank you!
• email me: audrey@lifeofaudrey.com
• my site: lifeofaudrey.com
• my work: recompilermag.com
• more resources: safetyfirstpdx.org 

(a work in progress—you can help!)

More Related Content

What's hot

Audience Theory
Audience TheoryAudience Theory
Audience Theory
npamediastudies
 
Private investigation ppt
Private investigation pptPrivate investigation ppt
Private investigation ppt
privateinvestigationie
 
Social Media and Fake News, Brand Building and Start-ups
Social Media and Fake News, Brand Building and Start-upsSocial Media and Fake News, Brand Building and Start-ups
Social Media and Fake News, Brand Building and Start-ups
Girish Balachandran
 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
leminhvuong
 
Graphical password ppt
Graphical password pptGraphical password ppt
Graphical password ppt
Mumbai University
 
culture presentation
 culture presentation culture presentation
culture presentation
meghabafna123
 
Cultural Tattoos
Cultural TattoosCultural Tattoos
Cultural Tattoos
DocKetchum
 
Cyber Kill Chain.pptx
Cyber Kill Chain.pptxCyber Kill Chain.pptx
Cyber Kill Chain.pptx
Vivek Chauhan
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
Sam Bowne
 
Brand Opening (Using open-source collaboration principles to create BIG ideas...
Brand Opening (Using open-source collaboration principles to create BIG ideas...Brand Opening (Using open-source collaboration principles to create BIG ideas...
Brand Opening (Using open-source collaboration principles to create BIG ideas...
BigHeads Network
 
A comparison of LGBT rights globally and in India
A comparison of LGBT rights globally and in IndiaA comparison of LGBT rights globally and in India
A comparison of LGBT rights globally and in India
Centre for Public Policy Research
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
Jamil Ali Ahmed
 
GNDER SENSITIZATION
GNDER SENSITIZATIONGNDER SENSITIZATION
GNDER SENSITIZATION
ANUP SINGH
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Sam Bowne
 

What's hot (14)

Audience Theory
Audience TheoryAudience Theory
Audience Theory
 
Private investigation ppt
Private investigation pptPrivate investigation ppt
Private investigation ppt
 
Social Media and Fake News, Brand Building and Start-ups
Social Media and Fake News, Brand Building and Start-upsSocial Media and Fake News, Brand Building and Start-ups
Social Media and Fake News, Brand Building and Start-ups
 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
 
Graphical password ppt
Graphical password pptGraphical password ppt
Graphical password ppt
 
culture presentation
 culture presentation culture presentation
culture presentation
 
Cultural Tattoos
Cultural TattoosCultural Tattoos
Cultural Tattoos
 
Cyber Kill Chain.pptx
Cyber Kill Chain.pptxCyber Kill Chain.pptx
Cyber Kill Chain.pptx
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 
Brand Opening (Using open-source collaboration principles to create BIG ideas...
Brand Opening (Using open-source collaboration principles to create BIG ideas...Brand Opening (Using open-source collaboration principles to create BIG ideas...
Brand Opening (Using open-source collaboration principles to create BIG ideas...
 
A comparison of LGBT rights globally and in India
A comparison of LGBT rights globally and in IndiaA comparison of LGBT rights globally and in India
A comparison of LGBT rights globally and in India
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
GNDER SENSITIZATION
GNDER SENSITIZATIONGNDER SENSITIZATION
GNDER SENSITIZATION
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
 

Viewers also liked

Azure Web Scalability
Azure Web ScalabilityAzure Web Scalability
Azure Web Scalability
Matias Quaranta
 
Code of conduct
Code of conductCode of conduct
Code of conduct
Rashika Goyal
 
Code of conduct(BECG)
Code of conduct(BECG)Code of conduct(BECG)
Code of conduct(BECG)
zarna pansuriya
 
Code of Ethics for Cooperative Leaders and Employees
Code of Ethics for Cooperative Leaders and EmployeesCode of Ethics for Cooperative Leaders and Employees
Code of Ethics for Cooperative Leaders and Employees
jo bitonio
 
Code of Conduct
Code of ConductCode of Conduct
Code of Conduct
Katherine Chin
 
大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま
大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま
大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま
Maehana Tsuyoshi
 
Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...
Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...
Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...
Slamit
 
Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013
Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013
Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013
Rob Reynolds
 
How does a gender lens contribute to a healthy environment and healthy people...
How does a gender lens contribute to a healthy environment and healthy people...How does a gender lens contribute to a healthy environment and healthy people...
How does a gender lens contribute to a healthy environment and healthy people...
Jo Vearey
 
React.js: Beyond the Browser
React.js: Beyond the BrowserReact.js: Beyond the Browser
React.js: Beyond the Browser
garbles
 
Code of conduct (Central)
Code of conduct (Central)Code of conduct (Central)
Code of conduct (Central)
koolman
 
Code of Professional Practice SJSD
Code of Professional Practice SJSDCode of Professional Practice SJSD
Code of Professional Practice SJSD
jcordovasjsd
 
Hcc ems-code-of-conduct-6.20134
Hcc ems-code-of-conduct-6.20134Hcc ems-code-of-conduct-6.20134
Hcc ems-code-of-conduct-6.20134
Houston Community College
 
Employee engagement in Toyota Motor Corporation
Employee engagement in Toyota Motor CorporationEmployee engagement in Toyota Motor Corporation
Employee engagement in Toyota Motor Corporation
Sinja Raut
 
H&P Code of Conduct
H&P Code of ConductH&P Code of Conduct
H&P Code of Conduct
Hauska & Partner
 
Code of Conduct PFN
Code of Conduct PFNCode of Conduct PFN
Code of Conduct PFN
Peter Bouwhuis
 
Hourglass: a Library for Incremental Processing on Hadoop
Hourglass: a Library for Incremental Processing on HadoopHourglass: a Library for Incremental Processing on Hadoop
Hourglass: a Library for Incremental Processing on Hadoop
Matthew Hayes
 
Let out for good behaviour
Let out for good behaviourLet out for good behaviour
Let out for good behaviour
Lisa Stevens
 
Storytelling using Javascript HTML5 CSS3
Storytelling using Javascript HTML5 CSS3Storytelling using Javascript HTML5 CSS3
Storytelling using Javascript HTML5 CSS3
Xavier Damman
 
Organizational+behavior
Organizational+behaviorOrganizational+behavior
Organizational+behavior
Sachin Salvi
 

Viewers also liked (20)

Azure Web Scalability
Azure Web ScalabilityAzure Web Scalability
Azure Web Scalability
 
Code of conduct
Code of conductCode of conduct
Code of conduct
 
Code of conduct(BECG)
Code of conduct(BECG)Code of conduct(BECG)
Code of conduct(BECG)
 
Code of Ethics for Cooperative Leaders and Employees
Code of Ethics for Cooperative Leaders and EmployeesCode of Ethics for Cooperative Leaders and Employees
Code of Ethics for Cooperative Leaders and Employees
 
Code of Conduct
Code of ConductCode of Conduct
Code of Conduct
 
大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま
大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま
大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま
 
Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...
Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...
Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...
 
Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013
Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013
Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013
 
How does a gender lens contribute to a healthy environment and healthy people...
How does a gender lens contribute to a healthy environment and healthy people...How does a gender lens contribute to a healthy environment and healthy people...
How does a gender lens contribute to a healthy environment and healthy people...
 
React.js: Beyond the Browser
React.js: Beyond the BrowserReact.js: Beyond the Browser
React.js: Beyond the Browser
 
Code of conduct (Central)
Code of conduct (Central)Code of conduct (Central)
Code of conduct (Central)
 
Code of Professional Practice SJSD
Code of Professional Practice SJSDCode of Professional Practice SJSD
Code of Professional Practice SJSD
 
Hcc ems-code-of-conduct-6.20134
Hcc ems-code-of-conduct-6.20134Hcc ems-code-of-conduct-6.20134
Hcc ems-code-of-conduct-6.20134
 
Employee engagement in Toyota Motor Corporation
Employee engagement in Toyota Motor CorporationEmployee engagement in Toyota Motor Corporation
Employee engagement in Toyota Motor Corporation
 
H&P Code of Conduct
H&P Code of ConductH&P Code of Conduct
H&P Code of Conduct
 
Code of Conduct PFN
Code of Conduct PFNCode of Conduct PFN
Code of Conduct PFN
 
Hourglass: a Library for Incremental Processing on Hadoop
Hourglass: a Library for Incremental Processing on HadoopHourglass: a Library for Incremental Processing on Hadoop
Hourglass: a Library for Incremental Processing on Hadoop
 
Let out for good behaviour
Let out for good behaviourLet out for good behaviour
Let out for good behaviour
 
Storytelling using Javascript HTML5 CSS3
Storytelling using Javascript HTML5 CSS3Storytelling using Javascript HTML5 CSS3
Storytelling using Javascript HTML5 CSS3
 
Organizational+behavior
Organizational+behaviorOrganizational+behavior
Organizational+behavior
 

Similar to Enforcing Your Code of Conduct: effective incident response

Ethics Training by Service Master Clean
Ethics Training by Service Master CleanEthics Training by Service Master Clean
Ethics Training by Service Master Clean
Atlantic Training, LLC.
 
Workshop Sessions: New training ,models for University staff: What worked for...
Workshop Sessions: New training ,models for University staff: What worked for...Workshop Sessions: New training ,models for University staff: What worked for...
Workshop Sessions: New training ,models for University staff: What worked for...
CEPS Projectes Socials #makingprojects
 
For Abortion Providers: How to work with individuals in the sex trade
For Abortion Providers: How to work with individuals in the sex tradeFor Abortion Providers: How to work with individuals in the sex trade
For Abortion Providers: How to work with individuals in the sex trade
Lindsay A. Roth
 
Media Relations Training
Media Relations TrainingMedia Relations Training
Media Relations Training
Donna Dubuc
 
Ethics in journalism
Ethics in journalismEthics in journalism
Ethics in journalism
MMcCardle
 
Lateral Violence, Bullying, Victims ...Big River Saskatchewan
Lateral Violence, Bullying, Victims ...Big River SaskatchewanLateral Violence, Bullying, Victims ...Big River Saskatchewan
Lateral Violence, Bullying, Victims ...Big River Saskatchewan
griehl
 
Sexual Harassment, Gender Discrimination and Sexism
Sexual Harassment, Gender Discrimination and SexismSexual Harassment, Gender Discrimination and Sexism
Sexual Harassment, Gender Discrimination and Sexism
Yash Kaushik
 
Harassment Training by Iowa Civil Rights Commission
Harassment Training by Iowa Civil Rights CommissionHarassment Training by Iowa Civil Rights Commission
Harassment Training by Iowa Civil Rights Commission
Atlantic Training, LLC.
 
Session 1 introducing the bystander [autosaved]
Session 1   introducing the bystander [autosaved]Session 1   introducing the bystander [autosaved]
Session 1 introducing the bystander [autosaved]
su-training
 
Safe spaces2014.ppt
Safe spaces2014.pptSafe spaces2014.ppt
Safe spaces2014.ppt
Lindsay A. Roth
 
fall_2019_thayer_orientation life change.pptx
fall_2019_thayer_orientation life change.pptxfall_2019_thayer_orientation life change.pptx
fall_2019_thayer_orientation life change.pptx
chandan100088
 
Behind the wall keynote a. nelson [2.18.25]
Behind the wall keynote a. nelson [2.18.25]Behind the wall keynote a. nelson [2.18.25]
Behind the wall keynote a. nelson [2.18.25]
aknelson
 
Online training an advocates role in s.a. crisis intervention
Online training an advocates role in s.a. crisis interventionOnline training an advocates role in s.a. crisis intervention
Online training an advocates role in s.a. crisis intervention
Hi-Line's Help
 
Family Life Education - Legal and Ethical Issues
Family Life Education - Legal and Ethical IssuesFamily Life Education - Legal and Ethical Issues
Family Life Education - Legal and Ethical Issues
Adam Thompson
 
Better Communication in Nursing - Ending Nursing Violence
Better Communication in Nursing - Ending Nursing ViolenceBetter Communication in Nursing - Ending Nursing Violence
Better Communication in Nursing - Ending Nursing Violence
griehl
 
Presentation on PSEA
Presentation on PSEAPresentation on PSEA
Presentation on PSEA
SediqInami
 
The most five ethical approaches.pdf.hba
The most five ethical approaches.pdf.hbaThe most five ethical approaches.pdf.hba
The most five ethical approaches.pdf.hba
habtamuabera041
 
Anger
AngerAnger
Social Justice. Social Good. Social Media. Social Change.
Social Justice. Social Good. Social Media. Social Change.Social Justice. Social Good. Social Media. Social Change.
Social Justice. Social Good. Social Media. Social Change.
Paul Brown
 
The way back project: Needs and views of people who have attempted suicide an...
The way back project: Needs and views of people who have attempted suicide an...The way back project: Needs and views of people who have attempted suicide an...
The way back project: Needs and views of people who have attempted suicide an...
Hunter Institute of Mental Health
 

Similar to Enforcing Your Code of Conduct: effective incident response (20)

Ethics Training by Service Master Clean
Ethics Training by Service Master CleanEthics Training by Service Master Clean
Ethics Training by Service Master Clean
 
Workshop Sessions: New training ,models for University staff: What worked for...
Workshop Sessions: New training ,models for University staff: What worked for...Workshop Sessions: New training ,models for University staff: What worked for...
Workshop Sessions: New training ,models for University staff: What worked for...
 
For Abortion Providers: How to work with individuals in the sex trade
For Abortion Providers: How to work with individuals in the sex tradeFor Abortion Providers: How to work with individuals in the sex trade
For Abortion Providers: How to work with individuals in the sex trade
 
Media Relations Training
Media Relations TrainingMedia Relations Training
Media Relations Training
 
Ethics in journalism
Ethics in journalismEthics in journalism
Ethics in journalism
 
Lateral Violence, Bullying, Victims ...Big River Saskatchewan
Lateral Violence, Bullying, Victims ...Big River SaskatchewanLateral Violence, Bullying, Victims ...Big River Saskatchewan
Lateral Violence, Bullying, Victims ...Big River Saskatchewan
 
Sexual Harassment, Gender Discrimination and Sexism
Sexual Harassment, Gender Discrimination and SexismSexual Harassment, Gender Discrimination and Sexism
Sexual Harassment, Gender Discrimination and Sexism
 
Harassment Training by Iowa Civil Rights Commission
Harassment Training by Iowa Civil Rights CommissionHarassment Training by Iowa Civil Rights Commission
Harassment Training by Iowa Civil Rights Commission
 
Session 1 introducing the bystander [autosaved]
Session 1   introducing the bystander [autosaved]Session 1   introducing the bystander [autosaved]
Session 1 introducing the bystander [autosaved]
 
Safe spaces2014.ppt
Safe spaces2014.pptSafe spaces2014.ppt
Safe spaces2014.ppt
 
fall_2019_thayer_orientation life change.pptx
fall_2019_thayer_orientation life change.pptxfall_2019_thayer_orientation life change.pptx
fall_2019_thayer_orientation life change.pptx
 
Behind the wall keynote a. nelson [2.18.25]
Behind the wall keynote a. nelson [2.18.25]Behind the wall keynote a. nelson [2.18.25]
Behind the wall keynote a. nelson [2.18.25]
 
Online training an advocates role in s.a. crisis intervention
Online training an advocates role in s.a. crisis interventionOnline training an advocates role in s.a. crisis intervention
Online training an advocates role in s.a. crisis intervention
 
Family Life Education - Legal and Ethical Issues
Family Life Education - Legal and Ethical IssuesFamily Life Education - Legal and Ethical Issues
Family Life Education - Legal and Ethical Issues
 
Better Communication in Nursing - Ending Nursing Violence
Better Communication in Nursing - Ending Nursing ViolenceBetter Communication in Nursing - Ending Nursing Violence
Better Communication in Nursing - Ending Nursing Violence
 
Presentation on PSEA
Presentation on PSEAPresentation on PSEA
Presentation on PSEA
 
The most five ethical approaches.pdf.hba
The most five ethical approaches.pdf.hbaThe most five ethical approaches.pdf.hba
The most five ethical approaches.pdf.hba
 
Anger
AngerAnger
Anger
 
Social Justice. Social Good. Social Media. Social Change.
Social Justice. Social Good. Social Media. Social Change.Social Justice. Social Good. Social Media. Social Change.
Social Justice. Social Good. Social Media. Social Change.
 
The way back project: Needs and views of people who have attempted suicide an...
The way back project: Needs and views of people who have attempted suicide an...The way back project: Needs and views of people who have attempted suicide an...
The way back project: Needs and views of people who have attempted suicide an...
 

Recently uploaded

The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
“Transforming Enterprise Intelligence: The Power of Computer Vision and Gen A...
“Transforming Enterprise Intelligence: The Power of Computer Vision and Gen A...“Transforming Enterprise Intelligence: The Power of Computer Vision and Gen A...
“Transforming Enterprise Intelligence: The Power of Computer Vision and Gen A...
Edge AI and Vision Alliance
 
beyond-the-hype-capturing-the-potential-of-ai-and-gen-ai-in-tmt.pdf
beyond-the-hype-capturing-the-potential-of-ai-and-gen-ai-in-tmt.pdfbeyond-the-hype-capturing-the-potential-of-ai-and-gen-ai-in-tmt.pdf
beyond-the-hype-capturing-the-potential-of-ai-and-gen-ai-in-tmt.pdf
EVertil1
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
How Netflix Builds High Performance Applications at Global Scale
How Netflix Builds High Performance Applications at Global ScaleHow Netflix Builds High Performance Applications at Global Scale
How Netflix Builds High Performance Applications at Global Scale
ScyllaDB
 
6 Different Types of Printed Circuit Boards.pdf
6 Different Types of Printed Circuit Boards.pdf6 Different Types of Printed Circuit Boards.pdf
6 Different Types of Printed Circuit Boards.pdf
shammikudrat
 
STKI Israeli Market Study 2024 final v1
STKI Israeli Market Study 2024 final  v1STKI Israeli Market Study 2024 final  v1
STKI Israeli Market Study 2024 final v1
Dr. Jimmy Schwarzkopf
 
Database Management Myths for Developers
Database Management Myths for DevelopersDatabase Management Myths for Developers
Database Management Myths for Developers
John Sterrett
 
Running a Go App in Kubernetes: CPU Impacts
Running a Go App in Kubernetes: CPU ImpactsRunning a Go App in Kubernetes: CPU Impacts
Running a Go App in Kubernetes: CPU Impacts
ScyllaDB
 
AI_dev Europe 2024 - From OpenAI to Opensource AI
AI_dev Europe 2024 - From OpenAI to Opensource AIAI_dev Europe 2024 - From OpenAI to Opensource AI
AI_dev Europe 2024 - From OpenAI to Opensource AI
Raphaël Semeteys
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
Emerging Tech
 
HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)
Alpen-Adria-Universität
 
this resume for sadika shaikh bca student
this resume for sadika shaikh bca studentthis resume for sadika shaikh bca student
this resume for sadika shaikh bca student
SadikaShaikh7
 
Verti - EMEA Insurer Innovation Award 2024
Verti - EMEA Insurer Innovation Award 2024Verti - EMEA Insurer Innovation Award 2024
Verti - EMEA Insurer Innovation Award 2024
The Digital Insurer
 
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre timesBlockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
anupriti
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
Vijayananda Mohire
 
@Call @Girls Pune 0000000000 Riya Khan Beautiful Girl any Time
@Call @Girls Pune 0000000000 Riya Khan Beautiful Girl any Time@Call @Girls Pune 0000000000 Riya Khan Beautiful Girl any Time
@Call @Girls Pune 0000000000 Riya Khan Beautiful Girl any Time
amitchopra0215
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 
Artificial Intelligence (AI), Robotics and Computational fluid dynamics
Artificial Intelligence (AI), Robotics and Computational fluid dynamicsArtificial Intelligence (AI), Robotics and Computational fluid dynamics
Artificial Intelligence (AI), Robotics and Computational fluid dynamics
Chintan Kalsariya
 

Recently uploaded (20)

The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
“Transforming Enterprise Intelligence: The Power of Computer Vision and Gen A...
“Transforming Enterprise Intelligence: The Power of Computer Vision and Gen A...“Transforming Enterprise Intelligence: The Power of Computer Vision and Gen A...
“Transforming Enterprise Intelligence: The Power of Computer Vision and Gen A...
 
beyond-the-hype-capturing-the-potential-of-ai-and-gen-ai-in-tmt.pdf
beyond-the-hype-capturing-the-potential-of-ai-and-gen-ai-in-tmt.pdfbeyond-the-hype-capturing-the-potential-of-ai-and-gen-ai-in-tmt.pdf
beyond-the-hype-capturing-the-potential-of-ai-and-gen-ai-in-tmt.pdf
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
How Netflix Builds High Performance Applications at Global Scale
How Netflix Builds High Performance Applications at Global ScaleHow Netflix Builds High Performance Applications at Global Scale
How Netflix Builds High Performance Applications at Global Scale
 
6 Different Types of Printed Circuit Boards.pdf
6 Different Types of Printed Circuit Boards.pdf6 Different Types of Printed Circuit Boards.pdf
6 Different Types of Printed Circuit Boards.pdf
 
STKI Israeli Market Study 2024 final v1
STKI Israeli Market Study 2024 final  v1STKI Israeli Market Study 2024 final  v1
STKI Israeli Market Study 2024 final v1
 
Database Management Myths for Developers
Database Management Myths for DevelopersDatabase Management Myths for Developers
Database Management Myths for Developers
 
Running a Go App in Kubernetes: CPU Impacts
Running a Go App in Kubernetes: CPU ImpactsRunning a Go App in Kubernetes: CPU Impacts
Running a Go App in Kubernetes: CPU Impacts
 
AI_dev Europe 2024 - From OpenAI to Opensource AI
AI_dev Europe 2024 - From OpenAI to Opensource AIAI_dev Europe 2024 - From OpenAI to Opensource AI
AI_dev Europe 2024 - From OpenAI to Opensource AI
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
 
HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)
 
this resume for sadika shaikh bca student
this resume for sadika shaikh bca studentthis resume for sadika shaikh bca student
this resume for sadika shaikh bca student
 
Verti - EMEA Insurer Innovation Award 2024
Verti - EMEA Insurer Innovation Award 2024Verti - EMEA Insurer Innovation Award 2024
Verti - EMEA Insurer Innovation Award 2024
 
Blockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre timesBlockchain and Cyber Defense Strategies in new genre times
Blockchain and Cyber Defense Strategies in new genre times
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
 
@Call @Girls Pune 0000000000 Riya Khan Beautiful Girl any Time
@Call @Girls Pune 0000000000 Riya Khan Beautiful Girl any Time@Call @Girls Pune 0000000000 Riya Khan Beautiful Girl any Time
@Call @Girls Pune 0000000000 Riya Khan Beautiful Girl any Time
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 
Artificial Intelligence (AI), Robotics and Computational fluid dynamics
Artificial Intelligence (AI), Robotics and Computational fluid dynamicsArtificial Intelligence (AI), Robotics and Computational fluid dynamics
Artificial Intelligence (AI), Robotics and Computational fluid dynamics
 

Enforcing Your Code of Conduct: effective incident response

  • 1. Enforcing Your Code of Conduct effective incident response Audrey Eschright - Open Source and Feelings 2015
  • 2. Content Warning • general discussion of harassment and its effects • types of harassment and other code of conduct violations that occur
  • 3. a Code of Conduct is a tool for creating inclusive spaces
  • 4. As an event organizer… • you’ve been asked to add a code of conduct for your event • you agree to do it, but… • you really hope no one ever has to report a problem because you’re not prepared—yet!
  • 5. A Code of Conduct
  • 6. How do we use it effectively?
  • 7. Start with your values • education • friendliness • communication • the ability to participate and learn • diversity of perspectives
  • 8. We value an environment free from harassment “Open Source & Feelings is dedicated to providing 
 a safe, inclusive, welcoming, harassment-free 
 conference experience for everyone”
  • 9. Specify what behaviors are inappropriate “Harassment includes verbal comments that reinforce social structures of domination related to gender, gender identity and expression, sexual orientation, disability, physical appearance, body size, race, age, religion; sexual images in public spaces; deliberate intimidation; stalking; following; harassing photography or recording; sustained disruption of talks or other events; inappropriate physical contact; and unwelcome sexual attention.”
  • 10. Actions we may choose to take “If a participant engages in harassing behavior, the conference organizers may take any action they deem appropriate, including warning the offender or expulsion from the conference with no refund.”
  • 11. Behaviors that are appropriate “Participate in an authentic and active way. In doing so, you contribute to the health and longevity of this community.” “Be mindful of your surroundings and of your fellow participants.”
  • 12. The scope of the policy “We expect all community participants (guests, sponsors, and contributors, paid or otherwise) to abide by this Code of Conduct in all community venues, online and in-person, as well as in all one-on-one communications pertaining to community business.”
  • 13. Who to contact “If you are subject to or witness unacceptable behavior, or have any other concerns, please notify a community organizer as soon as possible at conduct@osfeels.com.”
  • 14. Reporting guidelines • contact info for the reporter • names of all people involved, if known • when and where it happened • what happened • additional context • is it ongoing?
  • 15. Use an existing Code of Conduct • Geek Feminism anti-harassment policy • Citizen Code of Conduct • Contributor Covenant
  • 16. Tell your community what this is for • why we have a code of conduct • what we expect from participants • who to contact
  • 17. The response team • at least two people • keep each other accountable • trade off duties when needed
  • 18. Represent the people you’re trying to include • will people feel comfortable reporting 
 problems to you? • work to build trust through representation 
 (as well as your actions) • don’t ask the one woman in your group to help just because of her gender
  • 19. Covering big events • figure out who’s on duty • make sure you cover after-hours and offsite events • check in at least daily • plan for record-keeping needs • assign someone to cover social media
  • 20. Types of incidents 
 (a small sample) • sexist, racist, or homophobic remarks or jokes • in-person harassment • non-consensual physical contact • physical or sexual assault • online harassment through social media or email • stalking
  • 21. Responding to reports • gather information • assess the impact and risk of further harm • determine what resources are needed • address the problem • follow up with the people affected • record the full details and resolution • follow up within your organization
  • 22. An example report • reported by: Mike • who: Chris G (@creepius, creepius@example.com) • when: October 2015 meeting • what happened: Chris made an offensive joke about Muslims after a speaker with an Arabic name presented. The speaker was not present, but Mike overheard it and brought it to our attention. • additional context: n/a • ongoing? no
  • 23. Responding to the report • state that you received a report of a code of conduct issue • when and where it happened • a general description of what happened 
 (don’t name the reporter) • what the consequences are • what you expect from the person now
  • 24. You control who participates • “Oh no! I can’t believe I said that. 
 I am so sorry.” • “What are you talking about? 
 I didn’t do anything.”
  • 25. When you receive a report • focus on recording the details, not your judgement • record what you’re hearing from the person affected • write it down • assume reports are credible
  • 26. Privacy is important • out in the hallway or another room • off the mailing list, in private email • not where bystanders will overhear or read
  • 27. Safety First • quiet • rest • water • medical assistance • trusted friends
  • 28. Trauma and triggers • code of conduct violations can be traumatic • traumatic events can cause certain reactions • when someone is reminded of past trauma in a way that causes these reactions, we call that a “trigger” • fatigue, disorientation, memory loss, and inability to focus are all normal responses
  • 29. Impact assessment • how many people are affected? • in public? in private? • spill-over effects
  • 30. Analyzing risk • medical or legal requirements • repeat offenders • how dangerous is it for this to happen again?
  • 31. Risk + impact low risk high risk low impact inappropriate jokes made in private attendee with previous arrest or assault high impact inappropriate jokes persistent coordinated harassment
  • 32. Using risk + impact to determine a response low risk high risk low impact verbal warning take notes, follow-up later high impact public apology, remove person from event coordinated whole-team response
  • 33. Gather resources • other members of your organizing team • past incident logs • organizers of other events who have been similarly affected • people with specialized expertise • crisis line • 911 • online safety resources like Crash Override
  • 34. Resolve the situation • choose a fair and proportionate response • stay true to your values • you’re responsible to the direct victim(s) and to the community as a whole
  • 35. Make the decision you need right now — Decide on the long-term penalties later
  • 36. Follow up with the people who were affected • did you find a code of conduct violation? • how you responded (i.e. reprimand, asking the person to not participate) • anything further you need to discuss
  • 38. Reduce the threat of retaliation • be very cautious about sharing information that can be used to identify people • retaliation will tend to target the people seen as most vulnerable • retaliation can target individuals or groups
  • 39. Following up with the reporter from our event • we found a code of conduct violation • we chose the reprimand the person • he will be asked to leave if it happens again • we’re here in case you need more support or anything else happens
  • 40. Time to regroup • how did it go? • what did we learn? • do we need anything for next time? • is there anything we haven’t resolved?
  • 41. You did it! • this is hard work! • it is so important to your community that you do it well • be kind to yourselves
  • 42. How to use this template • write an incident response plan for your event, project, or community space • do training with the people responsible for taking and responding to reports
  • 43. Thank you! • email me: audrey@lifeofaudrey.com • my site: lifeofaudrey.com • my work: recompilermag.com • more resources: safetyfirstpdx.org 
 (a work in progress—you can help!)