{"id":3008,"date":"2025-02-21T18:49:27","date_gmt":"2025-02-21T15:49:27","guid":{"rendered":"https:\/\/factcheck.lt\/?page_id=3008"},"modified":"2025-02-21T18:49:28","modified_gmt":"2025-02-21T15:49:28","slug":"","status":"publish","type":"page","link":"https:\/\/factcheck.lt\/eng\/policy_protecting_sources_or_identify_user-generated_disinformation_content\/","title":{"rendered":"","raw":""},"content":{"rendered":"","protected":false,"raw":""},"excerpt":{"rendered":"","protected":false,"raw":""},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_ru_post_content":"<!-- wp:paragraph -->\n<p>Last Updated: September 1, 2024<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>Purpose&nbsp;<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>This policy sets out how we protect confidential sources while effectively identifying and addressing user-generated disinformation. It ensures we maintain our ethical standards, protect our sources, and serve the public interest.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>Who Must Follow This<\/strong>&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>All team members handling information: fact-checkers, editors, contributors, and partners.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>Our Core Principles<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>Keeping sources safe and confidential<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Being clear about our fact-checking methods<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Following ethical and legal standards<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Maintaining our credibility and integrity<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p><strong>Protecting Our Sources<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>Source Confidentiality<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>Sources remain anonymous unless they agree otherwise<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Use secure, encrypted communication channels<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Protect sources from any form of retaliation<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Limit source identity knowledge to essential staff only<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p><strong>Identifying User-Generated Disinformation<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>Detection and Assessment<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>Regular monitoring of online platforms<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Strict fact-checking protocols for user content<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Working with platforms to flag false information<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Using both AI tools and human expertise for pattern detection<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p><strong>Verification Process<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>Cross-reference information with reliable sources<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Document the verification steps taken<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Maintain records of identified disinformation patterns<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Regular reporting on emerging disinformation trends<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p><strong>Handling Sensitive Information<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>Consider impact before publishing sensitive content<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Keep all sensitive data encrypted and secure<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Follow all relevant privacy and digital content laws<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p><strong>When things go wrong<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>Reporting problems<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>Report any breach of source protection immediately<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Independent committee reviews all incidents<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Clear consequences for policy violations<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p><strong>Legal requirements<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>Comply with all privacy laws<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Follow digital content regulations<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Maintain proper documentation<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p><strong>Staying current We review this policy yearly to keep up with:<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>New technology<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Changing legal requirements<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Best practices in source protection<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Evolution of disinformation tactics<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->","_ru_post_name":"policy_protecting_sources_or_identify_user-generated_disinformation_content","_ru_post_excerpt":"","_ru_post_title":"Protecting sources and identifying user-generated disinformation policy","_eng_post_content":"","_eng_post_name":"","_eng_post_excerpt":"","_eng_post_title":"","_bel_post_content":"","_bel_post_name":"","_bel_post_excerpt":"","_bel_post_title":"","_lt_post_content":"","_lt_post_name":"","_lt_post_excerpt":"","_lt_post_title":"","edit_language":"eng","footnotes":""},"_links":{"self":[{"href":"https:\/\/factcheck.lt\/eng\/wp-json\/wp\/v2\/pages\/3008"}],"collection":[{"href":"https:\/\/factcheck.lt\/eng\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/factcheck.lt\/eng\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/factcheck.lt\/eng\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/factcheck.lt\/eng\/wp-json\/wp\/v2\/comments?post=3008"}],"version-history":[{"count":1,"href":"https:\/\/factcheck.lt\/eng\/wp-json\/wp\/v2\/pages\/3008\/revisions"}],"predecessor-version":[{"id":3009,"href":"https:\/\/factcheck.lt\/eng\/wp-json\/wp\/v2\/pages\/3008\/revisions\/3009"}],"wp:attachment":[{"href":"https:\/\/factcheck.lt\/eng\/wp-json\/wp\/v2\/media?parent=3008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}