{"id":438,"date":"2026-01-27T10:55:08","date_gmt":"2026-01-27T18:55:08","guid":{"rendered":"https:\/\/blogs.reed.edu\/share\/?p=438"},"modified":"2026-01-27T11:23:41","modified_gmt":"2026-01-27T19:23:41","slug":"digital-and-tech-safety","status":"publish","type":"post","link":"https:\/\/blogs.reed.edu\/share\/digital-and-tech-safety\/","title":{"rendered":"Digital and Tech Safety"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Dealing with Online Harassment&nbsp;<\/h3>\n\n\n\n<h2 class=\"wp-block-heading\">What is online abuse?<\/h2>\n\n\n\n<p>Online abuse is an umbrella term that encompasses many types of&nbsp; behaviors and interactions that are intended to provoke fear, threaten, intimidate, or otherwise harm their targeted person or group. There\u2019s a wide variety of online abuse and harassment, and has impacts outside of the online world from emotional and personal impacts to employment. Regardless, harassment is wrong and depending on how the harassers got information, could be illegal. It is never the victim\u2019s fault.<\/p>\n\n\n\n<p>This may look like sending hateful messages, hacking others\u2019 accounts, stalking, sending threats, non-consensual sharing of intimate or private images, initiating and\/or participating in campaigns to spread damaging and\/or false information. Here\u2019s a <a href=\"https:\/\/righttobe.org\/guides\/understanding-online-harassment\/\">guide<\/a> if you want more information.&nbsp;<\/p>\n\n\n\n<p>Who is more likely to be on the receiving end of online harassment? Data tells us that often age and gender are closely associated with those who experience harassment, but there are other factors such as sexuality and race.&nbsp;<\/p>\n\n\n\n<p>Some statistics about age and gender (<a href=\"https:\/\/www.pewresearch.org\/internet\/2014\/10\/22\/online-harassment\/\">source<\/a>):<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>18 to 29 year olds are most likely to experience harassment<\/li>\n\n\n\n<li>Young women (ages 18-24) experience harassment are disproportionately high levels:<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>25% were the target of online sexual harassment<\/li>\n\n\n\n<li>26% of these young women have been stalked online<\/li>\n\n\n\n<li>Overall, men are somewhat more likely than women to experience at least one of the elements of online harassment, 44% vs. 37%, and more likely than women to encounter embarrassment, physical threats, and name calling<\/li>\n<\/ul>\n\n\n\n<p>Because there are different ways people are harassed or abused online, here\u2019s a helpful <a href=\"https:\/\/onlineharassmentfieldmanual.pen.org\/defining-online-harassment-a-glossary-of-terms\/\">list<\/a> of terms to use. This is also helpful for when you encounter abuse as a bystander or victim, to better describe what is happening.&nbsp;<\/p>\n\n\n\n<p>Now, the rest of this page is split up into four parts: what to do if you see someone being harassed, what to do when you face harassment, how to keep yourself safe on the internet and online in general, and what you can do as a Reedie.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What to do if <strong>you see someone <\/strong>getting harassed:<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Prioritize your safety<\/strong><\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>This can take many forms, but make sure your own cybersecurity is protected. If you\u2019re concerned about the risks of intervention, here\u2019s a <a href=\"https:\/\/onlineharassmentfieldmanual.pen.org\/assessing-online-threats\/\">guide<\/a> for assessing threats. Trusting your instincts is typically a safe choice. There are many ways to be a good ally without direct intervention.&nbsp;<\/li>\n\n\n\n<li>Make sure you practice self care, and know that your emotional safety is important. It can be difficult to witness harassment and abuse, and there are a lot of factors that determine how and if someone feels that they can intervene.&nbsp;<\/li>\n\n\n\n<li>\u201cMake an honest evaluation of your own relationship to injustice. Keep in mind that the people being targeted might have a history of being exposed to injustices that you haven\u2019t personally encountered. Making an honest evaluation of your own relationship to injustice, or lack thereof, is an important part of being a supporter\u2014not a savior.\u201d (<a href=\"https:\/\/onlineharassmentfieldmanual.pen.org\/best-practices-for-allies-and-witnesses\/\">Online Harassment Field Manual for Allies<\/a>)<\/li>\n<\/ul>\n\n\n\n<p><strong>2. Remember the list of terms? Here\u2019s where that may be helpful!&nbsp;<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>First, assess for and establish safety\u2013for you, and for one being harmed.&nbsp;<\/li>\n\n\n\n<li>Second, know what type of abuse is happening. Identify the abuse that is taking place. Define and be familiar with different tactics the harassers may be using.&nbsp;<\/li>\n\n\n\n<li>Once you know the tactics and type of abuse that is happening, you can make a plan about how you want to intervene.&nbsp;<\/li>\n\n\n\n<li>Now, there are many ways you may choose to intervene! There are five strategies listed below. It\u2019s okay to choose one, and then do another, etc. The most important thing is that you do <em>something<\/em>.<\/li>\n<\/ul>\n\n\n\n<p>3. <strong>Bystander intervention, The Five D\u2019s: Distract, Delegate, Document, Delay, and Direct. (SHARE has a whole other blog post just about bystander intervention too!) You don\u2019t have to interact directly; there are four other ways to intervene:<\/strong><\/p>\n\n\n\n<ol style=\"list-style-type:upper-roman\" class=\"wp-block-list\">\n<li style=\"font-size:17px\">\u201cDirect: If you feel prepared to intervene directly, here are some options you might want to consider:<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Chime in with supportive, affirming, or constructive comments, messages, or hashtags in response to the content of the person targeted by abuse.<\/li>\n\n\n\n<li>Practice counter speech by publishing a statement of solidarity that backs the target and condemns online abuse, on the platform where it appears. Name the harassment, state why it\u2019s wrong, and offer a rallying cry enlisting others to reject it. If you\u2019re part of a group or organization affiliated with the target of the abuse\u2014or with a group or organization that condemns hate generally\u2014put out an official statement that explicitly states why you condemn this particular form of online harassment.<\/li>\n\n\n\n<li>Expose impersonation and ask for help reporting it to the platforms.<\/li>\n\n\n\n<li>Use your privilege or power to fact check a false claim.<\/li>\n\n\n\n<li>Use humor.<\/li>\n\n\n\n<li>You can condemn hate and harassment without interacting with the abuser. Condemn the <em>behavior,<\/em>not the individual, and set an example for others that such behavior can\u2019t and shouldn\u2019t be tolerated.<\/li>\n\n\n\n<li>Do not engage in abuse yourself, not only because bystander intervention is about breaking the cycle of vitriol and violence, but because the abuser may be deliberately trying to goad you as a tactic to do you harm.<\/li>\n\n\n\n<li>Rally others to intervene with you and organize peer support networks. There\u2019s strength in numbers.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:17px\">II. Distract: You can push back by:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Amplifying the original content posted by the person under attack (liking, upvoting, retweeting, etc.).<\/li>\n\n\n\n<li>Drawing attention away from the abuse and the abuser by (for example) responding with a flood of memes.<\/li>\n\n\n\n<li>Reporting the abusive content and the abuser\u2019s account to the platform on which it appears. While platforms do not always take action, it\u2019s always worth a shot. Follow these <a href=\"https:\/\/onlineharassmentfieldmanual.pen.org\/cyber-safety\/reporting-online-harassment-to-platforms\/\">guidelines for reporting online abuse<\/a>.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:17px\">III. Delegate: This supportive community can help you:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Amplify the content of the person being abused.<\/li>\n\n\n\n<li>Draw attention away from an abuser via funny or unrelated content.<\/li>\n\n\n\n<li>Report the abuse to the platform where it happened \u2013 and even tag the platform to draw extra attention.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:17px\">IV. Document: Keep in mind, looking at screenshots of abuse can be retraumatizing for those on the receiving end, so when you share the information you\u2019ve collected, be sure to offer a clear trigger warning. You can try something like: <em>\u201cHey, documenting abuse is really important, but I realize it can also be traumatic, so I\u2019ve taken screenshots and saved hyperlinks for you in this folder. You can just store it somewhere safe in case you need it later.\u201d<\/em><\/p>\n\n\n\n<p style=\"font-size:17px\">V. Delay: You can:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Offer a listening ear and provide emotional support. Always listen to the target without judgment. Be sure to exercise patience and empathy, and defer to their wishes.<\/li>\n\n\n\n<li>Affirm that what\u2019s happening to them is not OK and not their fault. Remind them they\u2019re not alone.<\/li>\n\n\n\n<li>Share resources\u2014including this Field Manual.<\/li>\n\n\n\n<li>Offer specific support (\u201cCan I help you report or document the abuse, or tighten your digital security?\u201d).<\/li>\n\n\n\n<li>If you have a close relationship with the target and know that they\u2019re afraid for their safety or the safety of their loved ones, consider offering them a safe place to stay, such as your home or the home of a mutual friend.\u201d (<a href=\"https:\/\/onlineharassmentfieldmanual.pen.org\/best-practices-for-allies-and-witnesses\/\">citation<\/a> for all of the above from Field Guide for Allies)<\/li>\n\n\n\n<li>If possible, it\u2019s best to check in with the person being harassed. It helps to validate their experience (\u201cit\u2019s not your fault\u201d) and reflect what you\u2019re hearing (\u201cit sounds like\u2026I\u2019m hearing you\u2019re\u2026\u201d). You can steer them towards some resources (like this page!) if they want to just talk about it with an advocate or therapist, or if they want to report to law enforcement or the social media site. There are many options for them, and it is their choice what they choose to do. It\u2019s important you are there to support them and help make sure they are safe.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">What to do when <strong>you<\/strong> face harassment:<\/h2>\n\n\n\n<p>There\u2019s a wide range of ways you might be harassed online. This section is if the harassment you face is stalking, bullying, sharing intimate or private images without permission, or spreading misinformation about you. This is still pretty broad, so there\u2019s a section for each of these along with general information about taking care of yourself after facing harassment.&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Stalking\/Doxxing<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Make sure you are physically safe<\/strong><\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Some online harassers can stalk or track location, so make sure you\u2019re in a safe place and turn off location tracking. Call 911 if it\u2019s an emergency and if you are comfortable working with the law enforcement.<\/li>\n<\/ul>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>Document<\/strong><\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You may want to consider documenting the abuse. This can help you seek legal action in the future and will be digital evidence. It can also help you figure out where the information is coming from and where else it might be going.<\/li>\n<\/ul>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>Consider keeping open existing accounts while also setting up new ones. You can use them as &#8220;trap&#8221; accounts. If the harasser thinks they&#8217;re reaching you, they&#8217;ll be less likely to dig deeper to try to find your new ones.<\/strong><\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Open new accounts with a different name or number; avoid posting personal photos (facial recognition software is getting more accurate); and share the new contact info only with people you know personally and trust 100%.&nbsp;<\/li>\n\n\n\n<li>You may also want to review what information is available online about you, including images or clues that a harasser could use. (For example: pictures that have distinct landmarks, being mentioned or tagged in someone else\u2019s photos, mentioning your place of work, etc.)<\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\">Bullying\/Spreading Misinformation<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Make sure you are physically and emotionally safe (it\u2019s worth repeating)<\/strong><\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\">\n<li><\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Whether this means taking a break and going for a walk, telling a friend\/ally (make sure you don\u2019t feel alone and others know what you\u2019re going through and they can also help document\/monitor\/or report), deciding if you want a break from being online.<\/li>\n\n\n\n<li>If you ask for help from friends, family, SHARE, and others your trust. You are not the first person this has happened to, and there are options for what to do next. set up what is helpful versus harmful.<\/li>\n\n\n\n<li>It\u2019s best to not \u201ctake on\u201d harassers, though the intent is good, the impact is less so. Engaging with harassment can prolong the harassment.&nbsp;<\/li>\n\n\n\n<li>You can ask them to monitor your feeds and delete and report comments or just to screenshot and document.<\/li>\n\n\n\n<li>There\u2019s also the Five D\u2019s for them to intervene. You can point out which ones feel most helpful to you.&nbsp;<\/li>\n\n\n\n<li>You may want to let landlords, employers, or your school know you are being harassed and to save\/screenshot any messages they receive about you.<\/li>\n<\/ul>\n\n\n\n<p>2. <strong>As mentioned before, documenting is a good idea for potential future evidence or reporting, along with possibly finding out where the information is coming from and where else it may be going.<\/strong><\/p>\n\n\n\n<p>3. <strong>You can also report the harasser to the social media platforms and ask friends\/family\/followers to do the same<\/strong>.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Sharing Intimate or Private Images<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Make sure you are safe, physically and emotionally<\/strong><\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>We mentioned this already, but it\u2019s worth repeating to make sure you are taking care of yourself during this potentially scary time.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>Documenting the Abuse<\/strong><\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>This is especially helpful if you plan on filing a report later. We have more details under the \u201cstalking\u201d section<\/li>\n<\/ul>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>If there are images of you shared without your permission, you can remove them<\/strong><\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Visit the <a href=\"https:\/\/cybercivilrights.org\/ccri-safety-center\">CCRI Safety Center<\/a> or call the CCRI Image Abuse Helpline at 1-844-878-2274, which is available free of charge, 24\/7<\/li>\n<\/ul>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li><strong>Consider keeping open existing accounts while also setting up new ones. You can use them as &#8220;trap&#8221; accounts. If the harasser thinks they&#8217;re reaching you, they&#8217;ll be less likely to dig deeper to try to find your new ones.<\/strong><\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Open new accounts with a different name or number; avoid posting personal photos (facial recognition software is getting more accurate); and share the new contact info only with people you know personally and trust 100%.<\/li>\n<\/ul>\n\n\n\n<p>There are different options going forward, whether to report to law enforcement or the social media platform, conduct an assessment about who&#8217;s making the comments or threats, or just securing your profiles.&nbsp;<\/p>\n\n\n\n<p>We know that reaching out to law enforcement is not a viable option for everyone. \u201cThe benefit of reporting a threat to law enforcement is that it starts a trail of evidence for your case, in case further threats are made and you decide to take further action in the future.\u201d (<a href=\"https:\/\/static1.squarespace.com\/static\/642a4483efd0ce42e3a2c9f3\/t\/6445da90ec9d64259fd0fce7\/1682299537108\/Gendered+Threats+-+OnlineSOS.pdf\">OnlineSOS<\/a>) You can report with a trusted friend or family member if you do not want to go alone. If you do not immediately report, you can always hold onto the evidence and documentation if you decide to report in the future.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>You may consider reporting to the college if the harasser is a Reed community member, or to law enforcement if you are being threatened (laws vary by jurisdiction). The college will help you make a report if you want to.<\/strong><\/li>\n\n\n\n<li><strong>You can contact an advocate, attorney, image monitoring service, and therapists.\u00a0 You can seek support and help wherever it feels best for you.<\/strong><\/li>\n\n\n\n<li><strong>More options<\/strong><\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Review any information or photos stored on dormant or alias accounts<\/li>\n\n\n\n<li>Takedown your contact information online from social media platforms (your posts,your friends or colleagues posts, etc) which you can do through data broker websites like Spokeo or InstantPeopleFinder<\/li>\n<\/ul>\n\n\n\n<p>These methods to respond are not exclusive to one type of harassment and can be used however you feel safest and is what you want to do.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>You can<a href=\"https:\/\/www.techsafety.org\/hotline-services\"> also contact a national helpline<\/a> to be connected with local resources<\/strong><\/li>\n\n\n\n<li><strong>Here\u2019s some <a href=\"https:\/\/www.onlinesos.org\">Plans of Action<\/a> for different types of online harassment<\/strong><\/li>\n\n\n\n<li><a href=\"https:\/\/onlineharassmentfieldmanual.pen.org\/respond\/\"><strong>Other ways to respond<\/strong><\/a><\/li>\n\n\n\n<li><strong>Cyber Civil Rights has a <a href=\"https:\/\/cybercivilrights.org\/ccri-safety-center\/#document\">step-by-step guide<\/a> to help you respond<\/strong><\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">How to keep yourself <strong>safe<\/strong> online:<\/h2>\n\n\n\n<p>There are also basic steps you can do to keep yourself safe from harassment and to be more safe on the internet in general<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Set up a plan for if you face harassment, if you want friends to monitor social media for you, what ways you want to take care of yourself, and know where to find resources to help.\u00a0<\/strong><\/li>\n\n\n\n<li><strong>Know what you want to share<\/strong><\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You might want to think about turning off location tracking, be careful about who is direct messaging (DMing) you and what information you share online.<\/li>\n\n\n\n<li>What information is available online? What photos? Consider information that could be shared and if it makes it easier for an attacker to find you. Have you shared your name and birthday? What about your city? Does this make your accounts easy to compromise?<\/li>\n\n\n\n<li>What photos have you shared and how would you feel if they were used against you? Does this picture contain any distinctive landmarks that someone can use to find your location?<\/li>\n<\/ul>\n\n\n\n<ol style=\"list-style-type:lower-roman\" class=\"wp-block-list\">\n<li>\u201cMinimizing the amount of information that is freely available about you, especially on your basic and public social media profiles, is going to make you more secure, though it\u2019s also a sacrifice in that it limits what you can share with your community. There\u2019s no right or wrong answer about how much to share, but do make the risk\/reward assessment deliberately\u201d (<a href=\"https:\/\/gameshotline.org\/online-free-safety-guide\/\">Digital Safety Guide&#8211;Games Hotline<\/a>)<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>If you\u2019re worried that information about you is already public, you can monitor for mentions of your information and use information removal companies.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>Set up accounts with two factor authentication, make passwords hard to guess and save them in a password manager rather than in a document or spreadsheet. Keep your devices updated and backed up.<\/strong><\/li>\n\n\n\n<li><strong>Here\u2019s a list of resources (some of these are consolidated from above)<\/strong><\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/onlineharassmentfieldmanual.pen.org\/defining-online-harassment-a-glossary-of-terms\/\">Defining Online Harassment<\/a><\/li>\n\n\n\n<li>&nbsp;General safety <a href=\"https:\/\/www.techsafety.org\/onlineprivacyandsafetytips\">guides<\/a>, <a href=\"https:\/\/onlineharassmentfieldmanual.pen.org\/prepare-for-online-harassment\/\">preparation manual<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/righttobe.org\/guides\/understanding-online-harassment\/\">Understanding Online Harassment&nbsp;<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/onlineharassmentfieldmanual.pen.org\">Online Harassment Field Manual<\/a> and <a href=\"https:\/\/onlineharassmentfieldmanual.pen.org\/respond\/\">Responding to Online Abuse<\/a> (including&nbsp; <a href=\"https:\/\/www.onlinesos.org\">Plans of Action<\/a>)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.techsafety.org\/hotline-services\">National Hotlines<\/a> and <a href=\"https:\/\/www.techsafety.org\/resources-survivors\">Toolkit for Survivors<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/cybercivilrights.org\/ccri-safety-center\">CCRI Safety Center<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/gameshotline.org\/online-free-safety-guide\/\">Digital Safety Guide<\/a><\/li>\n\n\n\n<li>Reed Technology Survival <a href=\"https:\/\/www.reed.edu\/it\/help\/TSGs\/TSG%20Final.pdf\">Guide<\/a>, Computer User Service\u2019s Safe Computing <a href=\"https:\/\/www.reed.edu\/it\/help\/safe-computing\/\">Guide<\/a>, and Cybersecurity <a href=\"https:\/\/www.reed.edu\/it\/help\/security\/\">Guide<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">What you can do at Reed<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>SHARE has a survivor Survivor support <a href=\"https:\/\/www.reed.edu\/share\/survivors-resources\/\">page<\/a><\/strong><\/li>\n\n\n\n<li><strong>If you believe you&#8217;ve experienced bias you are strongly encouraged to file a <a href=\"https:\/\/www.reed.edu\/institutional_diversity\/bias\/index.html\">bias incident report<\/a> or contact the <a href=\"https:\/\/www.reed.edu\/institutional_diversity\/dean.html\">Office for Institutional Diversity<\/a>.<\/strong><\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.reed.edu\/guidebook\/comm_pol\/dhsm_policy.html\">Discriminatory Harassment and Misconduct Policy<\/a> and <a href=\"https:\/\/www.reed.edu\/governance\/title-ix-policy\/\">Title IX Policy<\/a>. Use <a href=\"https:\/\/www.reed.edu\/institutional_diversity\/bias\/reporting-process.html\">this form<\/a> to report a bias incident or discriminatory harassment.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.reed.edu\/guidebook\/comm_pol\/honor_prin.html\">Honor Principle<\/a><\/li>\n<\/ul>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>Reed Technology Survival <a href=\"https:\/\/www.reed.edu\/it\/help\/TSGs\/TSG%20Final.pdf\">Guide<\/a><\/strong><\/li>\n\n\n\n<li><strong>Computer User Service\u2019s Safe Computing <a href=\"https:\/\/www.reed.edu\/it\/help\/safe-computing\/\">Guide<\/a> and Cybersecurity <a href=\"https:\/\/www.reed.edu\/it\/help\/security\/\">Guide<\/a><\/strong><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Dealing with Online Harassment&nbsp; What is online abuse? Online abuse is an umbrella term that encompasses many types of&nbsp; behaviors and interactions that are intended to provoke fear, threaten, intimidate, or otherwise harm their targeted person or group. There\u2019s a wide variety of online abuse and harassment, and has impacts outside of the online world &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blogs.reed.edu\/share\/digital-and-tech-safety\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Digital and Tech Safety&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2886,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-438","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blogs.reed.edu\/share\/wp-json\/wp\/v2\/posts\/438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.reed.edu\/share\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.reed.edu\/share\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.reed.edu\/share\/wp-json\/wp\/v2\/users\/2886"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.reed.edu\/share\/wp-json\/wp\/v2\/comments?post=438"}],"version-history":[{"count":4,"href":"https:\/\/blogs.reed.edu\/share\/wp-json\/wp\/v2\/posts\/438\/revisions"}],"predecessor-version":[{"id":443,"href":"https:\/\/blogs.reed.edu\/share\/wp-json\/wp\/v2\/posts\/438\/revisions\/443"}],"wp:attachment":[{"href":"https:\/\/blogs.reed.edu\/share\/wp-json\/wp\/v2\/media?parent=438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.reed.edu\/share\/wp-json\/wp\/v2\/categories?post=438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.reed.edu\/share\/wp-json\/wp\/v2\/tags?post=438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}