SlideShare a Scribd company logo
1 of 43
Download to read offline
Enforcing Your
Code of Conduct
effective incident response
Audrey Eschright - Open Source and Feelings 2015
Content Warning
• general discussion of harassment and its effects
• types of harassment and other code of conduct
violations that occur
a Code of Conduct
is a tool for creating
inclusive spaces
As an event organizer…
• you’ve been asked to add a code of conduct for
your event
• you agree to do it, but…
• you really hope no one ever has to report a
problem because you’re not prepared—yet!
A Code of Conduct
How do we use it
effectively?
Start with your values
• education
• friendliness
• communication
• the ability to participate and learn
• diversity of perspectives
We value an environment
free from harassment
“Open Source & Feelings is dedicated to providing 

a safe, inclusive, welcoming, harassment-free 

conference experience for everyone”
Specify what behaviors are
inappropriate
“Harassment includes verbal comments that reinforce social
structures of domination related to gender, gender identity and
expression, sexual orientation, disability, physical appearance,
body size, race, age, religion; sexual images in public spaces;
deliberate intimidation; stalking; following; harassing
photography or recording; sustained disruption of talks or
other events; inappropriate physical contact; and unwelcome
sexual attention.”
Actions we may
choose to take
“If a participant engages in harassing behavior, the
conference organizers may take any action they deem
appropriate, including warning the offender or expulsion from
the conference with no refund.”
Behaviors that are
appropriate
“Participate in an authentic and active way. In doing so, you
contribute to the health and longevity of this community.”
“Be mindful of your surroundings and of your fellow
participants.”
The scope of the policy
“We expect all community participants (guests, sponsors, and
contributors, paid or otherwise) to abide by this Code of
Conduct in all community venues, online and in-person, as
well as in all one-on-one communications pertaining to
community business.”
Who to contact
“If you are subject to or witness unacceptable behavior, or
have any other concerns, please notify a community organizer
as soon as possible at conduct@osfeels.com.”
Reporting guidelines
• contact info for the reporter
• names of all people involved, if known
• when and where it happened
• what happened
• additional context
• is it ongoing?
Use an existing
Code of Conduct
• Geek Feminism anti-harassment policy
• Citizen Code of Conduct
• Contributor Covenant
Tell your community
what this is for
• why we have a code of conduct
• what we expect from participants
• who to contact
The response team
• at least two people
• keep each other accountable
• trade off duties when needed
Represent the people
you’re trying to include
• will people feel comfortable reporting 

problems to you?
• work to build trust through representation 

(as well as your actions)
• don’t ask the one woman in your group to help
just because of her gender
Covering big events
• figure out who’s on duty
• make sure you cover after-hours and offsite
events
• check in at least daily
• plan for record-keeping needs
• assign someone to cover social media
Types of incidents 

(a small sample)
• sexist, racist, or homophobic remarks or jokes
• in-person harassment
• non-consensual physical contact
• physical or sexual assault
• online harassment through social media or email
• stalking
Responding to reports
• gather information
• assess the impact and risk of further harm
• determine what resources are needed
• address the problem
• follow up with the people affected
• record the full details and resolution
• follow up within your organization
An example report
• reported by: Mike
• who: Chris G (@creepius, creepius@example.com)
• when: October 2015 meeting
• what happened: Chris made an offensive joke about Muslims
after a speaker with an Arabic name presented. The speaker
was not present, but Mike overheard it and brought it to our
attention.
• additional context: n/a
• ongoing? no
Responding to the report
• state that you received a report of a code of
conduct issue
• when and where it happened
• a general description of what happened 

(don’t name the reporter)
• what the consequences are
• what you expect from the person now
You control who participates
• “Oh no! I can’t believe I said that. 

I am so sorry.”
• “What are you talking about? 

I didn’t do anything.”
When you receive a report
• focus on recording the details, not your
judgement
• record what you’re hearing from the person
affected
• write it down
• assume reports are credible
Privacy is important
• out in the hallway or another room
• off the mailing list, in private email
• not where bystanders will overhear or read
Safety First
• quiet
• rest
• water
• medical assistance
• trusted friends
Trauma and triggers
• code of conduct violations can be traumatic
• traumatic events can cause certain reactions
• when someone is reminded of past trauma in a
way that causes these reactions, we call that a
“trigger”
• fatigue, disorientation, memory loss, and inability
to focus are all normal responses
Impact assessment
• how many people are affected?
• in public? in private?
• spill-over effects
Analyzing risk
• medical or legal requirements
• repeat offenders
• how dangerous is it for this to happen again?
Risk + impact
low risk high risk
low impact
inappropriate
jokes made in
private
attendee with
previous arrest
or assault
high impact
inappropriate
jokes
persistent
coordinated
harassment
Using risk + impact to
determine a response
low risk high risk
low impact verbal warning
take notes,
follow-up later
high impact
public apology,
remove person
from event
coordinated
whole-team
response
Gather resources
• other members of your organizing team
• past incident logs
• organizers of other events who have been similarly affected
• people with specialized expertise
• crisis line
• 911
• online safety resources like Crash Override
Resolve the situation
• choose a fair and proportionate response
• stay true to your values
• you’re responsible to the direct victim(s) and to
the community as a whole
Make the decision you need right now
—
Decide on the
long-term penalties later
Follow up with the people
who were affected
• did you find a code of conduct violation?
• how you responded (i.e. reprimand, asking the
person to not participate)
• anything further you need to discuss
Reduce the threat of
retaliation
• be very cautious about sharing information that
can be used to identify people
• retaliation will tend to target the people seen as
most vulnerable
• retaliation can target individuals or groups
Following up with the
reporter from our event
• we found a code of conduct violation
• we chose the reprimand the person
• he will be asked to leave if it happens again
• we’re here in case you need more support or
anything else happens
Time to regroup
• how did it go?
• what did we learn?
• do we need anything for next time?
• is there anything we haven’t resolved?
You did it!
• this is hard work!
• it is so important to your community that you do
it well
• be kind to yourselves
How to use this template
• write an incident response plan for your event,
project, or community space
• do training with the people responsible for taking
and responding to reports
Thank you!
• email me: audrey@lifeofaudrey.com
• my site: lifeofaudrey.com
• my work: recompilermag.com
• more resources: safetyfirstpdx.org 

(a work in progress—you can help!)

More Related Content

What's hot

The risk of risks: Reputation risk and resiliency Sept. 2014
The risk of risks: Reputation risk and resiliency Sept. 2014The risk of risks: Reputation risk and resiliency Sept. 2014
The risk of risks: Reputation risk and resiliency Sept. 2014Linda Locke Reputation Strategist
 
Cyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnCyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnKloudLearn
 
Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and complianceMagdalena Matell
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
Best Practice Crisis And Issues Management A Recommended Approach By SMC
Best Practice Crisis And Issues Management   A Recommended Approach By SMCBest Practice Crisis And Issues Management   A Recommended Approach By SMC
Best Practice Crisis And Issues Management A Recommended Approach By SMCJanet Saunders
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy Dam Frank
 
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)Sam Bowne
 
Move out of your comfort zone worksheets
Move out of your comfort zone worksheetsMove out of your comfort zone worksheets
Move out of your comfort zone worksheetsDWCNetwork
 
BUSINESS CONTINUITY MANAGEMENT system
BUSINESS CONTINUITY MANAGEMENT systemBUSINESS CONTINUITY MANAGEMENT system
BUSINESS CONTINUITY MANAGEMENT systemKuroba Kaitou
 
Data recovery power point
Data recovery power pointData recovery power point
Data recovery power pointtutannandi
 
Risk Management Module Powerpoint Presentation Slides
Risk Management Module Powerpoint Presentation SlidesRisk Management Module Powerpoint Presentation Slides
Risk Management Module Powerpoint Presentation SlidesSlideTeam
 
NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)April Mardock CISSP
 
Crisis Management and Crisis Communication
Crisis Management and Crisis Communication Crisis Management and Crisis Communication
Crisis Management and Crisis Communication Alaa Abdallah
 
The management of change
The management of changeThe management of change
The management of changeReynel Dan
 
ISO 22301 Business Continuity Management
ISO 22301 Business Continuity ManagementISO 22301 Business Continuity Management
ISO 22301 Business Continuity ManagementRamiro Cid
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsSam Bowne
 

What's hot (20)

The risk of risks: Reputation risk and resiliency Sept. 2014
The risk of risks: Reputation risk and resiliency Sept. 2014The risk of risks: Reputation risk and resiliency Sept. 2014
The risk of risks: Reputation risk and resiliency Sept. 2014
 
CISSP - Security Assessment
CISSP - Security AssessmentCISSP - Security Assessment
CISSP - Security Assessment
 
Cyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnCyber Crisis Management - Kloudlearn
Cyber Crisis Management - Kloudlearn
 
Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and compliance
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Best Practice Crisis And Issues Management A Recommended Approach By SMC
Best Practice Crisis And Issues Management   A Recommended Approach By SMCBest Practice Crisis And Issues Management   A Recommended Approach By SMC
Best Practice Crisis And Issues Management A Recommended Approach By SMC
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
System Security Plans 101
System Security Plans 101System Security Plans 101
System Security Plans 101
 
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)
 
Move out of your comfort zone worksheets
Move out of your comfort zone worksheetsMove out of your comfort zone worksheets
Move out of your comfort zone worksheets
 
BUSINESS CONTINUITY MANAGEMENT system
BUSINESS CONTINUITY MANAGEMENT systemBUSINESS CONTINUITY MANAGEMENT system
BUSINESS CONTINUITY MANAGEMENT system
 
Data recovery power point
Data recovery power pointData recovery power point
Data recovery power point
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Risk Management Module Powerpoint Presentation Slides
Risk Management Module Powerpoint Presentation SlidesRisk Management Module Powerpoint Presentation Slides
Risk Management Module Powerpoint Presentation Slides
 
NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)
 
Crisis Management and Crisis Communication
Crisis Management and Crisis Communication Crisis Management and Crisis Communication
Crisis Management and Crisis Communication
 
The management of change
The management of changeThe management of change
The management of change
 
ISO 22301 Business Continuity Management
ISO 22301 Business Continuity ManagementISO 22301 Business Continuity Management
ISO 22301 Business Continuity Management
 
Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
 

Viewers also liked

Code of Ethics for Cooperative Leaders and Employees
Code of Ethics for Cooperative Leaders and EmployeesCode of Ethics for Cooperative Leaders and Employees
Code of Ethics for Cooperative Leaders and Employeesjo bitonio
 
大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま
大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま
大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいまMaehana Tsuyoshi
 
Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...
Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...
Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...Slamit
 
Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013
Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013
Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013Rob Reynolds
 
How does a gender lens contribute to a healthy environment and healthy people...
How does a gender lens contribute to a healthy environment and healthy people...How does a gender lens contribute to a healthy environment and healthy people...
How does a gender lens contribute to a healthy environment and healthy people...Jo Vearey
 
React.js: Beyond the Browser
React.js: Beyond the BrowserReact.js: Beyond the Browser
React.js: Beyond the Browsergarbles
 
Code of conduct (Central)
Code of conduct (Central)Code of conduct (Central)
Code of conduct (Central)koolman
 
Code of Professional Practice SJSD
Code of Professional Practice SJSDCode of Professional Practice SJSD
Code of Professional Practice SJSDjcordovasjsd
 
Employee engagement in Toyota Motor Corporation
Employee engagement in Toyota Motor CorporationEmployee engagement in Toyota Motor Corporation
Employee engagement in Toyota Motor CorporationSinja Raut
 
Hourglass: a Library for Incremental Processing on Hadoop
Hourglass: a Library for Incremental Processing on HadoopHourglass: a Library for Incremental Processing on Hadoop
Hourglass: a Library for Incremental Processing on HadoopMatthew Hayes
 
Let out for good behaviour
Let out for good behaviourLet out for good behaviour
Let out for good behaviourLisa Stevens
 
Storytelling using Javascript HTML5 CSS3
Storytelling using Javascript HTML5 CSS3Storytelling using Javascript HTML5 CSS3
Storytelling using Javascript HTML5 CSS3Xavier Damman
 
Organizational+behavior
Organizational+behaviorOrganizational+behavior
Organizational+behaviorSachin Salvi
 

Viewers also liked (20)

Azure Web Scalability
Azure Web ScalabilityAzure Web Scalability
Azure Web Scalability
 
Code of conduct
Code of conductCode of conduct
Code of conduct
 
Code of conduct(BECG)
Code of conduct(BECG)Code of conduct(BECG)
Code of conduct(BECG)
 
Code of Ethics for Cooperative Leaders and Employees
Code of Ethics for Cooperative Leaders and EmployeesCode of Ethics for Cooperative Leaders and Employees
Code of Ethics for Cooperative Leaders and Employees
 
Code of Conduct
Code of ConductCode of Conduct
Code of Conduct
 
大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま
大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま
大きなチーム、大きな仕事 ~ 大規模アジャイル開発のいま
 
Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...
Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...
Participants presentations, Ilda Ribeiros Portugal - 2nd RECIPE ERASMUS+ Cour...
 
Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013
Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013
Puppet on Windows: Now You're Getting Chocolatey PuppetConf2013
 
How does a gender lens contribute to a healthy environment and healthy people...
How does a gender lens contribute to a healthy environment and healthy people...How does a gender lens contribute to a healthy environment and healthy people...
How does a gender lens contribute to a healthy environment and healthy people...
 
React.js: Beyond the Browser
React.js: Beyond the BrowserReact.js: Beyond the Browser
React.js: Beyond the Browser
 
Code of conduct (Central)
Code of conduct (Central)Code of conduct (Central)
Code of conduct (Central)
 
Code of Professional Practice SJSD
Code of Professional Practice SJSDCode of Professional Practice SJSD
Code of Professional Practice SJSD
 
Hcc ems-code-of-conduct-6.20134
Hcc ems-code-of-conduct-6.20134Hcc ems-code-of-conduct-6.20134
Hcc ems-code-of-conduct-6.20134
 
Employee engagement in Toyota Motor Corporation
Employee engagement in Toyota Motor CorporationEmployee engagement in Toyota Motor Corporation
Employee engagement in Toyota Motor Corporation
 
H&P Code of Conduct
H&P Code of ConductH&P Code of Conduct
H&P Code of Conduct
 
Code of Conduct PFN
Code of Conduct PFNCode of Conduct PFN
Code of Conduct PFN
 
Hourglass: a Library for Incremental Processing on Hadoop
Hourglass: a Library for Incremental Processing on HadoopHourglass: a Library for Incremental Processing on Hadoop
Hourglass: a Library for Incremental Processing on Hadoop
 
Let out for good behaviour
Let out for good behaviourLet out for good behaviour
Let out for good behaviour
 
Storytelling using Javascript HTML5 CSS3
Storytelling using Javascript HTML5 CSS3Storytelling using Javascript HTML5 CSS3
Storytelling using Javascript HTML5 CSS3
 
Organizational+behavior
Organizational+behaviorOrganizational+behavior
Organizational+behavior
 

Similar to Enforcing Your Code of Conduct: effective incident response

Workshop Sessions: New training ,models for University staff: What worked for...
Workshop Sessions: New training ,models for University staff: What worked for...Workshop Sessions: New training ,models for University staff: What worked for...
Workshop Sessions: New training ,models for University staff: What worked for...CEPS Projectes Socials #makingprojects
 
For Abortion Providers: How to work with individuals in the sex trade
For Abortion Providers: How to work with individuals in the sex tradeFor Abortion Providers: How to work with individuals in the sex trade
For Abortion Providers: How to work with individuals in the sex tradeLindsay A. Roth
 
Media Relations Training
Media Relations TrainingMedia Relations Training
Media Relations TrainingDonna Dubuc
 
Ethics in journalism
Ethics in journalismEthics in journalism
Ethics in journalismMMcCardle
 
Lateral Violence, Bullying, Victims ...Big River Saskatchewan
Lateral Violence, Bullying, Victims ...Big River SaskatchewanLateral Violence, Bullying, Victims ...Big River Saskatchewan
Lateral Violence, Bullying, Victims ...Big River Saskatchewangriehl
 
Sexual Harassment, Gender Discrimination and Sexism
Sexual Harassment, Gender Discrimination and SexismSexual Harassment, Gender Discrimination and Sexism
Sexual Harassment, Gender Discrimination and SexismYash Kaushik
 
Harassment Training by Iowa Civil Rights Commission
Harassment Training by Iowa Civil Rights CommissionHarassment Training by Iowa Civil Rights Commission
Harassment Training by Iowa Civil Rights CommissionAtlantic Training, LLC.
 
Session 1 introducing the bystander [autosaved]
Session 1   introducing the bystander [autosaved]Session 1   introducing the bystander [autosaved]
Session 1 introducing the bystander [autosaved]su-training
 
fall_2019_thayer_orientation life change.pptx
fall_2019_thayer_orientation life change.pptxfall_2019_thayer_orientation life change.pptx
fall_2019_thayer_orientation life change.pptxchandan100088
 
Behind the wall keynote a. nelson [2.18.25]
Behind the wall keynote a. nelson [2.18.25]Behind the wall keynote a. nelson [2.18.25]
Behind the wall keynote a. nelson [2.18.25]aknelson
 
Online training an advocates role in s.a. crisis intervention
Online training an advocates role in s.a. crisis interventionOnline training an advocates role in s.a. crisis intervention
Online training an advocates role in s.a. crisis interventionHi-Line's Help
 
Family Life Education - Legal and Ethical Issues
Family Life Education - Legal and Ethical IssuesFamily Life Education - Legal and Ethical Issues
Family Life Education - Legal and Ethical IssuesAdam Thompson
 
Better Communication in Nursing - Ending Nursing Violence
Better Communication in Nursing - Ending Nursing ViolenceBetter Communication in Nursing - Ending Nursing Violence
Better Communication in Nursing - Ending Nursing Violencegriehl
 
Presentation on PSEA
Presentation on PSEAPresentation on PSEA
Presentation on PSEASediqInami
 
Social Justice. Social Good. Social Media. Social Change.
Social Justice. Social Good. Social Media. Social Change.Social Justice. Social Good. Social Media. Social Change.
Social Justice. Social Good. Social Media. Social Change.Paul Brown
 
The way back project: Needs and views of people who have attempted suicide an...
The way back project: Needs and views of people who have attempted suicide an...The way back project: Needs and views of people who have attempted suicide an...
The way back project: Needs and views of people who have attempted suicide an...Hunter Institute of Mental Health
 
First AID for psychology.ppt
First AID for psychology.pptFirst AID for psychology.ppt
First AID for psychology.pptdevmarineacademy
 

Similar to Enforcing Your Code of Conduct: effective incident response (20)

Ethics Training by Service Master Clean
Ethics Training by Service Master CleanEthics Training by Service Master Clean
Ethics Training by Service Master Clean
 
Workshop Sessions: New training ,models for University staff: What worked for...
Workshop Sessions: New training ,models for University staff: What worked for...Workshop Sessions: New training ,models for University staff: What worked for...
Workshop Sessions: New training ,models for University staff: What worked for...
 
For Abortion Providers: How to work with individuals in the sex trade
For Abortion Providers: How to work with individuals in the sex tradeFor Abortion Providers: How to work with individuals in the sex trade
For Abortion Providers: How to work with individuals in the sex trade
 
Media Relations Training
Media Relations TrainingMedia Relations Training
Media Relations Training
 
Ethics in journalism
Ethics in journalismEthics in journalism
Ethics in journalism
 
Lateral Violence, Bullying, Victims ...Big River Saskatchewan
Lateral Violence, Bullying, Victims ...Big River SaskatchewanLateral Violence, Bullying, Victims ...Big River Saskatchewan
Lateral Violence, Bullying, Victims ...Big River Saskatchewan
 
Sexual Harassment, Gender Discrimination and Sexism
Sexual Harassment, Gender Discrimination and SexismSexual Harassment, Gender Discrimination and Sexism
Sexual Harassment, Gender Discrimination and Sexism
 
Harassment Training by Iowa Civil Rights Commission
Harassment Training by Iowa Civil Rights CommissionHarassment Training by Iowa Civil Rights Commission
Harassment Training by Iowa Civil Rights Commission
 
Session 1 introducing the bystander [autosaved]
Session 1   introducing the bystander [autosaved]Session 1   introducing the bystander [autosaved]
Session 1 introducing the bystander [autosaved]
 
Safe spaces2014.ppt
Safe spaces2014.pptSafe spaces2014.ppt
Safe spaces2014.ppt
 
fall_2019_thayer_orientation life change.pptx
fall_2019_thayer_orientation life change.pptxfall_2019_thayer_orientation life change.pptx
fall_2019_thayer_orientation life change.pptx
 
Behind the wall keynote a. nelson [2.18.25]
Behind the wall keynote a. nelson [2.18.25]Behind the wall keynote a. nelson [2.18.25]
Behind the wall keynote a. nelson [2.18.25]
 
Online training an advocates role in s.a. crisis intervention
Online training an advocates role in s.a. crisis interventionOnline training an advocates role in s.a. crisis intervention
Online training an advocates role in s.a. crisis intervention
 
Family Life Education - Legal and Ethical Issues
Family Life Education - Legal and Ethical IssuesFamily Life Education - Legal and Ethical Issues
Family Life Education - Legal and Ethical Issues
 
Better Communication in Nursing - Ending Nursing Violence
Better Communication in Nursing - Ending Nursing ViolenceBetter Communication in Nursing - Ending Nursing Violence
Better Communication in Nursing - Ending Nursing Violence
 
Presentation on PSEA
Presentation on PSEAPresentation on PSEA
Presentation on PSEA
 
Anger
AngerAnger
Anger
 
Social Justice. Social Good. Social Media. Social Change.
Social Justice. Social Good. Social Media. Social Change.Social Justice. Social Good. Social Media. Social Change.
Social Justice. Social Good. Social Media. Social Change.
 
The way back project: Needs and views of people who have attempted suicide an...
The way back project: Needs and views of people who have attempted suicide an...The way back project: Needs and views of people who have attempted suicide an...
The way back project: Needs and views of people who have attempted suicide an...
 
First AID for psychology.ppt
First AID for psychology.pptFirst AID for psychology.ppt
First AID for psychology.ppt
 

Recently uploaded

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 

Recently uploaded (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 

Enforcing Your Code of Conduct: effective incident response

  • 1. Enforcing Your Code of Conduct effective incident response Audrey Eschright - Open Source and Feelings 2015
  • 2. Content Warning • general discussion of harassment and its effects • types of harassment and other code of conduct violations that occur
  • 3. a Code of Conduct is a tool for creating inclusive spaces
  • 4. As an event organizer… • you’ve been asked to add a code of conduct for your event • you agree to do it, but… • you really hope no one ever has to report a problem because you’re not prepared—yet!
  • 5. A Code of Conduct
  • 6. How do we use it effectively?
  • 7. Start with your values • education • friendliness • communication • the ability to participate and learn • diversity of perspectives
  • 8. We value an environment free from harassment “Open Source & Feelings is dedicated to providing 
 a safe, inclusive, welcoming, harassment-free 
 conference experience for everyone”
  • 9. Specify what behaviors are inappropriate “Harassment includes verbal comments that reinforce social structures of domination related to gender, gender identity and expression, sexual orientation, disability, physical appearance, body size, race, age, religion; sexual images in public spaces; deliberate intimidation; stalking; following; harassing photography or recording; sustained disruption of talks or other events; inappropriate physical contact; and unwelcome sexual attention.”
  • 10. Actions we may choose to take “If a participant engages in harassing behavior, the conference organizers may take any action they deem appropriate, including warning the offender or expulsion from the conference with no refund.”
  • 11. Behaviors that are appropriate “Participate in an authentic and active way. In doing so, you contribute to the health and longevity of this community.” “Be mindful of your surroundings and of your fellow participants.”
  • 12. The scope of the policy “We expect all community participants (guests, sponsors, and contributors, paid or otherwise) to abide by this Code of Conduct in all community venues, online and in-person, as well as in all one-on-one communications pertaining to community business.”
  • 13. Who to contact “If you are subject to or witness unacceptable behavior, or have any other concerns, please notify a community organizer as soon as possible at conduct@osfeels.com.”
  • 14. Reporting guidelines • contact info for the reporter • names of all people involved, if known • when and where it happened • what happened • additional context • is it ongoing?
  • 15. Use an existing Code of Conduct • Geek Feminism anti-harassment policy • Citizen Code of Conduct • Contributor Covenant
  • 16. Tell your community what this is for • why we have a code of conduct • what we expect from participants • who to contact
  • 17. The response team • at least two people • keep each other accountable • trade off duties when needed
  • 18. Represent the people you’re trying to include • will people feel comfortable reporting 
 problems to you? • work to build trust through representation 
 (as well as your actions) • don’t ask the one woman in your group to help just because of her gender
  • 19. Covering big events • figure out who’s on duty • make sure you cover after-hours and offsite events • check in at least daily • plan for record-keeping needs • assign someone to cover social media
  • 20. Types of incidents 
 (a small sample) • sexist, racist, or homophobic remarks or jokes • in-person harassment • non-consensual physical contact • physical or sexual assault • online harassment through social media or email • stalking
  • 21. Responding to reports • gather information • assess the impact and risk of further harm • determine what resources are needed • address the problem • follow up with the people affected • record the full details and resolution • follow up within your organization
  • 22. An example report • reported by: Mike • who: Chris G (@creepius, creepius@example.com) • when: October 2015 meeting • what happened: Chris made an offensive joke about Muslims after a speaker with an Arabic name presented. The speaker was not present, but Mike overheard it and brought it to our attention. • additional context: n/a • ongoing? no
  • 23. Responding to the report • state that you received a report of a code of conduct issue • when and where it happened • a general description of what happened 
 (don’t name the reporter) • what the consequences are • what you expect from the person now
  • 24. You control who participates • “Oh no! I can’t believe I said that. 
 I am so sorry.” • “What are you talking about? 
 I didn’t do anything.”
  • 25. When you receive a report • focus on recording the details, not your judgement • record what you’re hearing from the person affected • write it down • assume reports are credible
  • 26. Privacy is important • out in the hallway or another room • off the mailing list, in private email • not where bystanders will overhear or read
  • 27. Safety First • quiet • rest • water • medical assistance • trusted friends
  • 28. Trauma and triggers • code of conduct violations can be traumatic • traumatic events can cause certain reactions • when someone is reminded of past trauma in a way that causes these reactions, we call that a “trigger” • fatigue, disorientation, memory loss, and inability to focus are all normal responses
  • 29. Impact assessment • how many people are affected? • in public? in private? • spill-over effects
  • 30. Analyzing risk • medical or legal requirements • repeat offenders • how dangerous is it for this to happen again?
  • 31. Risk + impact low risk high risk low impact inappropriate jokes made in private attendee with previous arrest or assault high impact inappropriate jokes persistent coordinated harassment
  • 32. Using risk + impact to determine a response low risk high risk low impact verbal warning take notes, follow-up later high impact public apology, remove person from event coordinated whole-team response
  • 33. Gather resources • other members of your organizing team • past incident logs • organizers of other events who have been similarly affected • people with specialized expertise • crisis line • 911 • online safety resources like Crash Override
  • 34. Resolve the situation • choose a fair and proportionate response • stay true to your values • you’re responsible to the direct victim(s) and to the community as a whole
  • 35. Make the decision you need right now — Decide on the long-term penalties later
  • 36. Follow up with the people who were affected • did you find a code of conduct violation? • how you responded (i.e. reprimand, asking the person to not participate) • anything further you need to discuss
  • 37.
  • 38. Reduce the threat of retaliation • be very cautious about sharing information that can be used to identify people • retaliation will tend to target the people seen as most vulnerable • retaliation can target individuals or groups
  • 39. Following up with the reporter from our event • we found a code of conduct violation • we chose the reprimand the person • he will be asked to leave if it happens again • we’re here in case you need more support or anything else happens
  • 40. Time to regroup • how did it go? • what did we learn? • do we need anything for next time? • is there anything we haven’t resolved?
  • 41. You did it! • this is hard work! • it is so important to your community that you do it well • be kind to yourselves
  • 42. How to use this template • write an incident response plan for your event, project, or community space • do training with the people responsible for taking and responding to reports
  • 43. Thank you! • email me: audrey@lifeofaudrey.com • my site: lifeofaudrey.com • my work: recompilermag.com • more resources: safetyfirstpdx.org 
 (a work in progress—you can help!)