
The focus of this module:
- The prevalence and severe impacts of online violence against women journalists in SSA calls for concerted and wide-ranging efforts to protect them online and seek accountability for such harms.
- Litigation can be a particularly impactful way of doing so, but comes with particular requirements that warrant careful consideration, such as jurisdiction, standing, and admissibility.
- Alternatively, or in concert with litigation, supporters can consider law reform strategies as well as advocacy campaigns that can build public or targeted support for a particular issue or case.
- Finally, it is vital that journalists take practical steps to protect themselves online and to deal with online violence when it occurs to mitigate against the silencing effect of these attacks.
Introduction
The media, the government, the state, and civil society organisations are struggling to respond effectively to online violence against women journalists. This highlights the urgent need for policy reform and innovative legal, legislative and normative responses, in order to ensure compliance with international human rights law.(1)
Effectively countering online violence against journalists, particularly women journalists,(2) in sub-Saharan Africa (SSA) is a pressing global issue that demands:
- Localised;
- Contextualised;
- Intersectional; and
- Practical strategies.
This module focuses on the practicalities of litigation to protect and defend the rights of women journalists online, providing guidance from the initial phases of consideration of litigation through to the legal requirements. In addition to litigation, this module considers complementary strategies such as advocacy, which can support litigation by building public awareness and support, as well as digital security tacticsand tools for victims and survivors of online violence to protect themselves in the digital sphere.(3)
It is complemented by Module 6 in Media Defence’s Advanced Modules on Digital Rights and Freedom of Expression in sub-Saharan Africa which details how to litigate within several of the key human rights fora on the continent.
Litigation Strategies
- Strategic litigation: Strategic litigation, sometimes also referred to as impact litigation, is a method of seeking broad social change, beyond a remedy for an individual, by carefully selecting and bringing a case to court.(4) It has been used extensively around the world, including in SSA, to set progressive jurisprudence and achieve accountability for human rights abuses.
- Challenges and opportunities: While it can be risky — with the potential for a negative judgment or unforeseen externalities — and tends to require significant investments of time and resources, it can be a highly effective way of stimulating law reform, influencing public opinion, and having a real impact on the lives of people affected by rights violations.
- Key considerations: In assessing whether to launch litigation in a case of online violence, one should consider:
- The outcomes sought;
- Whether litigation can reasonably achieve these outcomes;
- Whether the victims, survivors or affected communities will be best served by litigation;
- What various potential paths the litigation could take; and
- How the outcomes of litigation could be leveraged for positive social change.
Strategic litigation in the context of digital rights and online harms poses unique challenges and opportunities that should also be considered when developing litigation strategies.(5)
The impact of strategic litigation in Sub-Saharan Africa
Strategic or impact litigation has played an important role in advancing freedom of expression in sub-Saharan Africa for many years. Media Defence has supported some key cases relating to journalists operating in both the offline and online realm including:
- Konaté v Burkina Faso (2013): the African Court on Human and Peoples’ Rights held that criminal defamation laws that imposed sanctions of imprisonment were incompatible with Article 9 of the African Charter of Human and Peoples’ Rights and other international human rights provisions.
- Media Council of Tanzania v Attorney-General of the United Republic of Tanzania (2019): the EACJ held that certain provisions of Tanzania’s Media Services Act relating to fake news and rumours violated the right to freedom of expression by their broad and vague wording.
- SERAP v Federal Republic of Nigeria (2022): the ECOWAS Court held that the government’s suspension of Twitter in the country in 2021 violated the rights to freedom of expression, access to information and the media.
- Amnesty International Togo v the Togolese Republic (2020): The ECOWAS Court held that the Togolese government violated the right to freedom of expression by shutting down the internet during protests in September 2017.
Forums
The selection of a suitable forum with jurisdiction is critical to the eventual success of litigation. Lawyers should consider what is effective and available at the national, regional, and international levels. Typically, regional and international fora are only available where national remedies have been exhausted or where non-binding decisions are being sought, although there are some exceptions.
There are a range of such fora to be considered, including:(6)
- The United Nations Human Rights Council (UNHRC);
- The African Court on Human and Peoples’ Rights (African Court);
- The African Commission on Human and People’s Rights (ACHPR);
- The Economic Community of West African States Community Court of Justice (ECOWAS Court); and
- The East African Court of Justice (EACJ).
Each of these has its own requirements for founding jurisdiction, which must be carefully considered before launching an application or a complaint.
Use of quasi-judicial fora
There are several quasi-judicial international and regional fora available that can also be valuable in providing progressive opinions and guidelines for states on regulating online harms and protecting freedom of expression.
For example, in Nyanzi v. Uganda (2017) the United Nations (UN) Working Group on Arbitrary Detention (WGAD) issued an opinion finding that the detention of a Ugandan human rights activist for violation of the Cybercrime Act was arbitrary and a violation of her rights. The WGAD condemned the broad and vaguely worded provisions under which Nyanzi was arrested, which were said to have a chilling effect on freedom of expression in the country.
While the WGAD’s opinions are not legally binding, its findings, in this case, that Stella Nyanzi’s arrest and detention amounted to a violation of the rights to freedom of expression, a fair trial, the presumption of innocence, liberty and security of person, and freedom from torture or to cruel, inhuman or degrading treatment nevertheless have significant persuasive power, and states against whom opinions are made are requested to provide follow-up information on the implementation of the recommendations within six months.(7)
Jurisdiction
Jurisdiction refers to the ability or competency of a court or forum to consider and decide a particular matter.
Defining jurisdiction
In the Kenyan case of Owners of Motor Vessel Lillian‘s’ vs Caltex Oil Kenya Limited (1989), the Court of Appeal at Mombasa confirmed that the term means: “The authority which a court has to decide matters that are before it or take cognisance of matters presented in a formal way for its decision. The limits of this authority are imposed by statute, charter or commission under which the court is constituted and may be extended or restricted by the like means.”
When determining whether a court has jurisdiction, it is important to look at several sub‑components:(8)
- Jurisdiction ratione personae: whether the court has jurisdiction over the person of both the complainant and the respondent.
- Jurisdiction ratione materiae: whether the subject matter falls within the scope and mandate of the forum concerned.
- Jurisdiction ratione temporis: whether the violations occurred within a time frame that allows the forum to exercise jurisdiction. Temporal jurisdiction usually refers to whether:
– the violation occurred after the relevant treaty establishing or granting the court authority had come into force for a particular country, and
– the victim brought the claim before the forum within a reasonable period after the violation occurred.
For more information on jurisdiction, admissibility and proceedings at regional fora in Africa, please see Module 6 on Litigating Digital Rights in Africa.
Standing
Standing refers to the ability of a party to bring a matter before the court. It involves a potential litigant demonstrating a sufficient connection between the issue and their interest in the issue. Different courts and fora may have different standing requirements, this should be considered and determined early on in strategic litigation.
- In domestic courts, standing is determined by national law and the subject matter of the suit.
- In regional and international courts, standing is determined by the rules of procedure of the forum.
The table below lists some examples of the standing requirements of different fora:
Standing in Domestic Courts
These differ by jurisdiction. For example Article 22 of the Kenyan Constitution allows a person to:
- act in their own interest;
- act on behalf of another who cannot bring the suit in their own name,
- act in the interest of a group or class, or
- act in the public interest to institute a suit claiming that a right or fundamental freedom has been violated, threatened, or infringed.
ECOWAS Court
The ECOWAS Court has fairly broad standing provisions. Articles 9 and 10 of the Supplementary Protocol provide that the following litigants may approach it:
- Member states.
- The Executive Secretary (now the President of the ECOWAS Commission).
- The Council of Ministers.
- Community Institutions.
- Individuals.
- Corporate Bodies.
- Staff of any Community Institution.
African Commission on Human and Peoples’ Rights
The ACHPR has broad standing provisions. Anyone can register a communication, including CSOs. This includes:
- a state claiming that another state party to the African Charter has violated one or more of the provisions in the African Charter;
- CSOs (which do not need to be registered with the AU or have observer status);
- victims of abuse; or
- interested individuals acting on behalf of victims of abuse. The matter can also be brought for the public good, as class or representative actions, under the actio popularis approach.(9)
Considerations on standing: When considering whether a party has standing, it is important to consider and assess:
- Whether an individual, community or civil society organisation is best placed to bring the matter to the court or forum?
- Would a combination of different applicants be strategic?
- What are the different interests in the matter?
- What are the different risks of instituting a matter on behalf of certain parties?
- What is in the best interest of the case and the affected parties?
- What are the resources or capacity constraints?(10)
Value of broader standing requirements
The use of Kenya’s expanded standing was successful in the case of Bloggers Association of Kenya v Attorney General & 3 others ARTICLE 19 Eastern Africa & another (2020) in which the Bloggers Association of Kenya (BAKE) launched a constitutional petition challenging the constitutionality of 26 sections of the Computer Misuse and Cybercrime Act.
In both Article 19 v Eritrea (2007) and Law Society of Zimbabwe and Others v Zimbabwe (2016), the ACHPR underscored the significance of broader standing provisions, adopting an actio popularisapproach. This approach allows individuals, NGOs, and groups with no direct relationship to victims to bring forth communications, ensuring that even marginalized victims of human rights violations can receive assistance from distant entities. While compliance with standing requirements is necessary, the ACHPR’s flexibility in allowing non-victim entities to file complaints emphasizes its commitment to promoting accountability and addressing human rights abuses across the continent.
Representation and Expertise
Different courts have their own rules on representation, and in some cases, legal representation may not be mandatory. It should be kept in mind that there are a range of organisations working to provide technical and legal support to legal efforts to protect journalists’ safety and freedom of expression, which can be drawn on if needed, particularly by providing access to experienced senior digital rights lawyers. These include, for example:
- The International Press Institute;
Admissibility
- Admissibility: This refers to the process applied by international human rights fora to ensure that only cases that need international adjudication are brought before them.
- Requirements: Usually, it is required that all local remedies have been exhausted, that consideration be given to whether there are rules relating to prescription, and whether the forum recognises the concept of ongoing harm.
- Exceptions: There are exceptions to the local remedies requirement, such as if local remedies are non-existent, unreasonably prolonged or inaccessible, etc.(11) Notably, the ECOWAS Court and the EACJ do not require local remedies to have been exhausted before bringing a matter,(12) although the ECOWAS Court does require that the matter has not been determined on the merits by domestic courts.(13)
Identifying the parties
It is important to consciously reflect on and identify the most appropriate respondent in a matter, especially in cases involving anonymous or pseudonymous users or multi-national technology companies based in foreign jurisdictions. To assist in this, a litigant may seek an order from the court for an intermediary to disclose the identity of the user or to provide clarity on business structures. Law enforcement officers may also send a legal request to an intermediary requesting them to disclose the identity of the user.
Case law examples
In Muwema v Facebook Ireland Ltd (2016), the plaintiff sought an order directing Facebook to provide details on the identities and location of the person or persons who operated a particular Facebook page that had posted allegedly defamatory materials, or the individual posters to that page.(14) The court granted this order and directed Facebook to disclose the identity of the owner of the page on terms agreed to between the parties.
In South Africa, a 13-year-old girl received threatening posts from an anonymous user on Instagram. She made several failed attempts to obtain the identity of the user from Facebook. She then obtained orders from the High Court in Johannesburg directing Facebook to disclose the identity of the user but had to instruct an advocate in the United States to serve the order to Facebook at their offices in California. Eventually, Facebook complied with the order, but this came at a great cost for the plaintiff.(15)
Amici curiae
Amicus curiae are friends of the court who, while not a main party to the litigation, instead offer advice to the court to assist in the determination of the matter. An amicus may petition the court to be granted leave to serve as an amicus or may be invited by the court to offer expertise. Thus, serving as an amicus can be an influential way to support strategic and impact litigation and to provide relevant guidance to the court, particularly on international human rights standards and comparative law, as well as by providing technical expertise on digital or technological questions.
Each court or forum will usually have its own rules regarding the admission of amici, but often this involves proving that one’s submission will be unique and additive to the litigation.
Domestic
In South Africa, for example, the Uniform Rules of Court provide that for a party to be admitted as an amicus curiae, the following requirements must be met:
- It must have an interest in the proceedings;
- The submissions to be advanced must be relevant to the proceedings; and.
- It must raise new contentions that may be useful to the court.
South African Courts have explained that the role of amici is to draw the court’s attention to relevant legal and factual matters not otherwise highlighted. Admission as an amicus requires demonstrating an interest in the proceedings, the relevance of submissions, and the introduction of new, beneficial contentions.(16)
East African Court of Justice
Amici curiae are allowed to apply to be involved in a matter per Article 36 of the EACJ Rules. An application must be made by notice of motion and provide the following information:
- A description of the parties.
- The name and address of the amicus curiae.
- A description of the claim or reference.
- The order in respect of which the amicus curiae is applying for leave to intervene.
African Court
Amici curiae are allowed in the African Court as per Rule 45(1) of the African Court Rules, which grants the Court the authority to hear from individuals or entities deemed likely to provide assistance in fulfilling its duties. Furthermore, Rule 45(2) empowers the African Court to request any person or institution to provide information, opinions, or reports as needed. The procedure for requesting to act as amicus curiae is outlined in sections 42 to 47 of the African Court’s Practice Directions:
- Individuals or organizations interested in acting as amicus curiae must submit a request to the African Court, specifying their intended contribution to the matter.
- If the request is granted by the African Court, the requester will be notified by the Registrar and invited to submit their contributions, along with all relevant pleadings.
- It’s important to note that the decision to grant a request to act as amicus curiae rests solely with the discretion of the African Court.
Administrative considerations
Litigation is costly, with implications for both the victim/affected party, relevant third parties, and lawyers themselves. It is important to ensure that any litigation that is pursued is adequately funded. This includes funding for all future potential stages of appeal and review.
Litigants should also, at an early stage, consider the most effective timing for launching litigation or important milestones in the case and evaluate the staff and capacity needs — both in terms of legal support and otherwise — to ensure the case can be managed effectively to its end.
Choice of remedy
Another key element for consideration, particularly in terms of evaluating the substantive goals of litigation, is the choice of remedy. Depending on a country’s legal framework, online violence can be both a criminal and civil offence, which would influence the practicalities of litigation.
Online Violence under Criminal Law
- In Ethiopia: article 13 of the Computer Crime Proclamation, No. 958 of 2016 criminalises online activities that intimidate; threaten, or cause fear, threat, or psychological strain.(17)
- In Kenya: section 27 of the Computer Misuse and Cybercrime Act, 2018 provides for the offence of cyber harassment and imprisonment for up to 10 years.
- In Uganda: the Computer Misuse Act, 2011 prescribes offences such as cyber harassment, cyber stalking and offensive communications that can be used to prosecute online violence.
Online Violence under Criminal Law
National law and common law can allow a victim of online violence to seek civil law remedies such as:
- A civil suit for defamation;
- An order for the payment of compensation;
- A declaration of rights;
- A declaration of invalidity of any law that denies, violates, infringes, or threatens a right or fundamental freedom; or
- A protection order that restrains an abuser from certain behaviour.
Several factors influence the appropriate relief to be pursued for an online violence case, including:
- Standard of proof: the standard of proof in criminal cases is beyond reasonable doubt, much higher than that in civil law, in which it is a balance of probabilities.
- Responsibility of the prosecution: Depending on national law, the responsibility to prosecute is usually placed on the state, state agency or independent institution created by national law. This means that criminal prosecution may be out of reach for would-be litigants. However, one can consider whether the country provides mechanisms for private prosecution or can act for a client either by watching brief or advancing a defence in the case of an accused person.
- Defences offered by the respondent/defendant: The available defences to the respondent or defendant will have an important impact on the prospects of success of the litigation. One should, therefore, consider the context and facts of a case to determine which defences might impact the relief being sought.
Defence of Innocent Publication
In Muwema v Facebook Ireland Ltd (2016), the Facebook account of a pseudonymous user published three articles about a Ugandan lawyer, Fred Muwema, on a Facebook page, which Muwema alleged were defamatory for falsely accusing him of various acts of fraud, bribery, and political subterfuge. Muema sought to have the posts removed by Facebook, based in Ireland, requests which were declined based on the argument that Facebook was not the publisher of the content and could only take down content following a valid order of court.
Muema brought proceedings in the High Court of England seeking an order prohibiting the publication or further publication of the content. According to the law, such order can only be granted where;
- the statement is defamatory, and
- the defendant has no defence to the action that is reasonably likely to succeed.
The court declined to grant the order on the grounds that the defendant had a reasonable chance of success in raising the defence against defamation of innocent publication, which would mean that it had taken “reasonable care” in publishing the material.
Gathering evidence
A central challenge facing proponents of safer digital spaces is the collection of admissible evidence. In sub-Saharan Africa, the ICT Policy Centre for Eastern and Southern Africa (CIPESA) reports that the quantification of instances of online GBV remains a challenge “due to several inhibitions, including the culture of silence.”(18)
Documenting abuse
Victims of online violence can also assist in gathering evidence by documenting the abuse they face. It is, therefore, important to inform victims of measures they can take to document their experiences. Of note in this regard are the following guidelines:
- Pen America has created a guide that one can use to document online harassment.(19)
- Open Global Rights has listed an array of modules, apps and tools that seek to assist human rights activists with the collection, preservation, and verification of online evidence of human rights violations.
Key considerations around evidence gathering include:(20)
- Balancing exercise: Lawyers must balance victims’ rights to digital anonymity with the anonymity of perpetrators while ensuring that evidence is admissible and collected legally.
- Domestic laws: Gathering evidence is crucial for litigating online violence, necessitating an understanding of domestic laws on electronic evidence to tender relevant and admissible evidence to the court.
- Experts: Obtaining specialist technical assistance may be necessary to gather and interpret digital information effectively.
- Requirements: Legal and technical requirements must be considered by litigants and courts when assessing the admissibility of evidence, including the digital forensics procedures and tools used, the digital laboratories where analyses occur, and the qualifications of digital forensics analysts and expert witnesses.
Gathering Electronic Evidence
Gathering electronic evidence appropriately often requires understanding a complex puzzle of various pieces of legislation.
- In Uganda, for example, in addition to the Evidence Act, one must also consider the Computer Misuse Act of 2011, the Electronic Signatures Act of 2011, and the Electronic Transactions Act of 2011. Section 9 of the Computer Misuse Act, 2011 allows an investigating officer to apply to court for a preservation order for the expeditious preservation of data that has been stored or processed by means of a computer system or any other information and communication technologies, where there are reasonable grounds to believe that such data is vulnerable to loss or modification.(21)
- In Kenya, section 78A of the Evidence Act provides requirements for how the probative value of the evidence must be determined,(22) which includes assessing the reliability of the manner in which the electronic and digital evidence was generated, stored or communicated and the manner in which the originator of the electronic and digital evidence was identified.
Safety and security considerations
Potential litigants also need to consider the virtual and physical risks associated with litigating issues of online GBV, including the risk of attracting negative attention from perpetrators and their supporters. Based on this, the protection of victims/survivors of online GBV, their family members, witnesses, and any other relevant third parties, such as colleagues, should be carefully dispensed with before a matter is instituted.(23)
This may require lawyers to deploy solutions to address safety and security concerns, deal with issues around anonymity and confidentiality, and take steps to prevent the potential re-traumatisation of the victim/survivor and other third parties.
Example: seeking accountability for NCII
Victims or survivors of the non-consensual dissemination of intimate images, (NCII) might consider the following practical elements in determining whether there is a legal remedy they could pursue, and how to do so:
- Check whether your country has a specialised legal framework on NCII or cyber harassment more broadly;
- Check whether your country has harassment or stalking laws which could be applied to the situation, such as those regarding protection orders or cybercrime laws;
- Determine whether domestic violence or family violence regulations could be applied to your situation;
- Check your country’s laws on requiring electronic service providers to identify individuals responsible for online crimes, which would allow for suing the perpetrator for damages.
Advocacy Strategies
Developing advocacy strategies
The potential impact of litigation can often be augmented and supported by accompanying advocacy campaigns that seek to bolster public support and awareness around the relevant issues. This may be particularly true in matters of online violence which involve technical elements and with which stakeholders, including magistrates or judges, may be unfamiliar.
Advocacy design and impact
Litigators should consider the ultimate goal of the litigation and design an appropriate advocacy strategy that works towards complementing this goal by, for example:
- Researching particular issues to shed greater light on the case;
- Aiming to educate specific or general audiences;
- Seeking to build public support for the case or an issue more broadly;
- Attempting to influence public perceptions of an issue;
- Instigating public protests or other forms of support;
- Advocating for policy or law reform; or
- Aiming to better understand the public’s position on a topic.
An effective advocacy campaign can also help to ensure that, even where a case is ultimately unsuccessful, other impact is achieved through greater awareness of an issue or the development of a network of allies.(24)
Keep in mind that advocacy campaigns typically require a different skillset from litigation and require building a compelling narrative or story that will resonate with large numbers of people.
Further, lawyers can refer to, and tailor, the guidance provided by the UN Women regarding the development of an advocacy strategy to tackle violence against women.(25) This strategy can be tailored with support from country-based individuals and groups to ensure that intersectionality guides the strategy development.
Literacy for the courts and media
Numerous commentators note that online GBV is still a relatively nascent area of consideration in the SSA region. There is a need for efforts to engage judicial officers, as well as the media, to sensitise them on the impact of digital security attacks on journalists’ human rights, media freedom, and democratic values.
Litigating online violence: South Africa
The case of South African Human Rights Commission v Matumba (2018), heard in the Equality Court of South Africa, provides some guidance on some of the practical challenges of litigating online violence matters in the lower courts in the region.
Matumba was accused of running a Twitter account in which he pretended to be a white woman and through which he made derogatory comments against black women, ostensibly in an attempt to sow racial discord and misogyny.(26) The South African Human Rights Commission sought an order that the posts constituted harassment in terms of the country’s Equality Act.
- Digital landscape: The SAHRC, in bringing forward the case, had to make use of a tracing agent to link the Twitter account to Matumba, as well as request information from Twitter through its legal representatives to link the account to Matumba’s cell phone number. An amicussubmission by media organisation Media Monitoring Africa provided extensive submissions on the context presented by social media platforms, including how that context affects the spread of the information, who constitutes the hypothetical reasonable reader on Twitter, and how to craft effective remedies in such a situation where harassment has been perpetrated online.(27)
- Terminology: Due to the contemporary nature of the mode of harassment, it was necessary for the parties to assist with court with definitions, guidance, and examples of terms associated with the online world such as “post”, “like”, “retweet”, “bitly”, and “account owner”.
Given that some of the terms and processes of the online world may be new to judicial officers it is important to provide useful explanations or comparative examples to ensure clarity and understanding of potentially novel terms.
This case illustrates those amici submissions, alongside those of the parties, can be an important and impactful way to enable and enhance the literacy of judicial officers on issues of online violence.
Legislative/policy reform
In addition to instituting litigation, efforts to seek legislative and policy reform can be simultaneously pursued as a measure to ensure that legal provisions are put in place to provide meaningful protection to women journalists online.(28)
The Organisation for Security and Co-operation in Europe (OSCE) provides guidance on how to ensure that legislative frameworks, most notably pre-existing harassment laws, can appropriately respond to the new challenges of online violence against women journalists. It recommends that these laws should be amended to explicitly apply to online harassment, so as not to create room for doubt as to the extension of their application, and that they should:
- Include indirect communication, such as the creation of fake social media accounts or photoshopped images of victims shared with third parties;
- Target online harassment that is sexual and/or sexist;
- Include language that addresses harassment campaigns perpetrated by multiple individuals; and
- Adopt tiered responses to punish online harassment of varying levels.(29)
Engaging with lawmakers to enhance protection
When the Domestic Violence Amendment Bill was first introduced in 2020 in South Africa, it gave some consideration to the role of technology in domestic violence. This sparked the interest of a diverse group of activists, technologists, policymakers, researchers, and feminists, who made submissions to Parliament.(30)
This enabled a robust engagement with lawmakers on emerging issues and ultimately paved the way for more detailed and enhanced protection against various online threats in the Domestic Violence Amendment Act. For example:
- The expanded definition of harassment now encompasses various forms of online harassment, including repeated electronic communication, unauthorized access to electronic devices or accounts, monitoring or tracking of individuals without consent, sending abusive or degrading messages, sharing private information or abusive content with others, and unwelcome sexual communications.
- The definition of sexual harassment includes sending unwanted electronic communications of a sexual nature and protects against “outing” individuals based on their sexual orientation, gender, or gender expression.
- The revised definition of electronic communications in the context of harassment now encompasses digital audio, text, video, and images, as well as simulated and manipulated information. This expansion enables protection against the dissemination of non-consensual manipulated and deep fake images—videos or images altered to appear authentic.
This law reform process highlights the value of engaging with lawmakers on contemporary issues to ensure more meaningful protection against online harms.
Digital Security
Personal protective techniques(31)
While no journalist should be responsible for preventing online violence or harassment against them, taking steps to manage one’s digital profiles and making it more difficult for perpetrators to act against them can be an effective way to protect against such harms before they occur
- Be conscious and cautious regarding the information you share with others
- Be careful not to give out your phone number, personal email address, identity numbers or location in both online and offline fora which could spread beyond your control and reach unintended audiences.
- Be careful about not tagging your location in social media posts, at least until you have left it, and closely monitoring followers on personal accounts on which you may share more personal information.
- Speaking to friends and family about not sharing images, videos, or other content online that provides sensitive information such as your location or your children’s school.
- Consider the legal terms and conditions of the content you share: Some social media and online platforms have conditions that enable the free use of any content posted online, enabling would-be attackers to reproduce or modify photos or other content you have shared online. Check the terms and conditions of the platforms you use and whether the settings on your account can be changed to prevent this kind of usage.
- Secure all your accounts: Online violence can sometimes take place through hacking or unauthorised access to your own accounts:
- Protecting against these risks requires you to always use secure passwords which are regularly changed and saved in a secure password manager, use two-factor authentication (2FA) whenever possible, and be careful about sharing passwords with others.
- Journalists should also educate themselves on phishing and malware to be able to identify such attempts and be careful to keep all software up to date, including browsers. Consider exploring encrypted email and document-sharing services as well as using encrypted messaging platforms.
- One can also consider using Virtual Private Networks (VPNs) to mask your physical location and encrypt your connection to the internet, particularly when using public WiFi networks or networks shared with other people.
Know what is out there and how to remove it
A quick online search of your name can be a useful tool to determine what information is currently available online about you and enable you to follow up with the hosts of any information you wish to have removed.
Keep in mind that once online, content can be rapidly shared, edited and stored on internet archive sites, so the most effective strategy is to prevent the information from getting online in the first place.
For more guidance see:
- The International Women’s Media Foundation course, Keep it Private, which provides further guidance on how to protect one’s data online.
- The Committee to Protect Journalists’ (CPJ) detailed guide on how to remove data from the internet.
Account security tips
The Rory Peck Trust Digital Security Guide provides detailed guidance on account security along with Media Defence’s Stay Safe Online Guide for Sub-Saharan African journalists.
Dealing with online violence
- It is important to emphasise the need to document the messages and communications you are receiving, both to share with others as well as in case of potential future legal action.
- Consider reporting the abuse to your employer, family, friends, and others who can provide support. Although this might be hard, it can be helpful to have others to lean on as well as to get advice from colleagues or others who may have experienced something similar.
- Consider blocking the perpetrator, logging off temporarily, or even closing your account in order to protect yourself from further violence.
- Do not hesitate to seek psycho-social support however it may be available. It is important to emphasise that although perpetrated online, such violence has very real and damaging real-world effects for its victims/survivors, and it is normal to experience these effects. Check whether your employer provides access to psycho-social support and consider reaching out to a professional who can assist.
Reporting to online platforms
Another critical step in managing online violence which deserves further attention is reporting to the online platforms on which the content is shared. All platforms have standard terms of use, and if you can show that someone has violated those terms, you can have the content removed and/or the person’s account suspended or deleted, which prevents additional harm in future.
Support tips
- See PEN America’s guide to reporting to platforms and Deconstruct: Online Gender Based Violence guidance on reporting to intermediaries for more detailed information about the requirements and steps for reporting content on each platform.
The difficulties of reporting to platforms
Unfortunately, many women journalists affected by this online violence report experiencing wholly ineffective responses from the digital platforms. Ferial Haffajee, an editor in South Africa, reported to UNESCO that she was “stonewalled” by Twitter (now X) when attempting to use the automated reporting system to report her abuse.(32)
Criticism has also gone further than individual cases to note that responses by the platforms are uneven, with proactive content moderation being notably poorer in countries outside of their major markets and in less prioritised languages due to a lack of contextual understanding and investment in content moderation capacity in their languages.(33)
For further guidance, as well as a list of other digital security resources, see the Practical Guide for Women Journalists on How to Respond to Online Harassment published by UNESCO, TrustLaw, the Thomson Reuters Foundation and the International Women’s Media Foundation.
Conclusion
Digital attacks on journalists can occur in a wide range of formats, all with extensive impacts on a wide range of human rights that are protected and promoted by international human rights law. This module provides lawyers with a practical but introductory guide to considering strategies to counter and seek accountability for online violence against journalists, including through litigation, advocacy, and pre-emptive digital security tactics. Litigation can be a highly impactful way of security progressive jurisprudence and real remedies but is also most likely to be effective and successful when coupled with non-legal strategies such as public advocacy campaigns and efforts to improve the responsiveness of online platforms to such violence.
- 1. UNESCO ‘The Chilling: Global trends in online violence against women journalists’ (2021) (accessible at https://en.unesco.org/sites/default/files/the-chilling.pdf”).
- 2. For conciseness, we refer hereafter to “women” to include all those who identify as women and those with marginalised or at-risk identities including members of the LGBTQI community, except where specific instruments or documents referenced refer explicitly to “women” or some other grouping.
- 3. The terms “victim” and “survivor” may be used interchangeably and refer to those who have experienced GBV and/or OGBV. These terms have different connotations and implications and do not intend to, by any means, impose a definition or response on any persons who have experienced some of the severe violations to their dignity and safety.
- 4. Child Rights International Network, ‘What is strategic litigation?’ (accessible at https://archive.crin.org/en/guides/legal/guide-strategic-litigation/what-strategic-litigation.html”).
- 5. Digital Freedom Fund, ‘Strategic Litigation Toolkit’ (2022) (accessible at https://digitalfreedomfund.org/support/strategic-litigation-toolkit/”).
- 6. See International Press Institute, ‘A resource toolkit of laws, commitments, and mechanisms protecting press freedom in Africa’ (2023) (accessible at https://ipi.media/wp-content/uploads/2023/08/Africa-resource-toolkit-2023.pdf”) for high-level guidance on international, regional, and sub-regional treaties, protocols, mechanisms, and commitments that comprise the frameworks for media freedom, the right to access information, and the safety of journalists in Africa. See further the Pan African Lawyers Union, ‘Manual for litigating when accessing the ECOWAS Court of Justice’ (2022) (accessible at https://www.lawyersofafrica.org/wp-content/uploads/20231203_Manual-For-Litigants-Before-The-Ecowas-Court-Of-Justice.pdf”) for technical guidance on litigating before the ECOWAS Court of Justice.
- 7. United Nations, ‘Opinions adopted by the Working Group on Arbitrary Detention,’ (accessible at https://www.ohchr.org/en/special-procedures/wg-arbitrary-detention/opinions-adopted-working-group-arbitrary-detention”).
- 8. Media Defence, ‘Digital Rights Litigation Guide, Litigating Digital Rights and Freedom of Expression in East, West and Southern Africa’ (2020) (accessible at https://www.mediadefence.org/wp-content/uploads/2020/06/MLDI-Digital-Rights-Litigation-Guide.pdf”).
- 9. For more on standing see Pedersen, ‘Standing and the African Commission on Human and Peoples’ Rights’ African Human Rights Law Journal (2006) (accessible at https://www.ahrlj.up.ac.za/pedersen-m-p”) and Mayer, ‘NGO Standing and Influence in Regional Human Rights Courts and Commissions’ Notre Dame Law School (2011) (accessible at https://scholarship.law.nd.edu/cgi/viewcontent.cgi?article=1053&context=law_faculty_scholarship”).
- 10. Media Defence, ‘Module 6: Litigating Digital Rights Cases in Africa,’ (2020) (accessible at https://www.mediadefence.org/ereader/wp-content/uploads/sites/2/2020/06/Module-6-Litigating-digital-rights-in-Africa.pdf”).
- 11. Media Defence, ‘Digital Rights Litigation Guide, Litigating Digital Rights and Freedom of Expression in East, West and Southern Africa’, June 2020 (accessible at https://www.mediadefence.org/wp-content/uploads/2020/06/MLDI-Digital-Rights-Litigation-Guide.pdf”).
- 12. Id.
- 13. Media Defence, ‘Digital Rights Litigation Guide, Litigating Digital Rights and Freedom of Expression in East, West and Southern Africa’ (2020) (accessible at https://www.mediadefence.org/wp-content/uploads/2020/06/MLDI-Digital-Rights-Litigation-Guide.pdf”).
- 14. Id.
- 15. Tania Broughton, ‘Joburg teen sues Facebook for name of Insta stalker who threatened rape & murder’ (2020) (accessible at https://www.timeslive.co.za/news/south-africa/2020-07-27-joburg-teen-sues-facebook-for-name-of-insta-stalker-who-threatened-rape-murder/”).
- 16. See for example Hoffman v South African Airways [2000] ZACC 17 (accessible at https://www.saflii.org/za/cases/ZACC/2000/17.html”) and In Re: Certain Amicus Curiae Applications; Minister of Health v Treatment Action Campaign [2002] ZACC 13 (accessible at https://www.saflii.org/za/cases/ZACC/2002/13.html”).
- 17. Computer Crime Proclamation 958 of 2016 of the Federal Democratic Republic of Ethiopia (accessible at https://www.ilo.org/dyn/natlex/docs/ELECTRONIC/103967/126636/F1922468791/ETH103967.pdf”).
- 18. CIPESA, ‘In Search of Safe Spaces Online: A Research Summary’ (2020) (accessible at https://cipesa.org/?wpfb_dl=404″).
- 19. PEN America, ‘Online Harassment Field Manual: Documenting Online Harassment’ (accessible at https://onlineharassmentfieldmanual.pen.org/documenting-online-harassment/”).
- 20. Media Defence, ‘Module 6, Litigating Digital Rights in Africa’, (2020) (accessible at https://www.mediadefence.org/ereader/wp-content/uploads/sites/2/2020/06/Module-6-Litigating-digital-rights-in-Africa.pdf”).
- 21. KTA Advocates, ‘Electronic Evidence, Legal Alert’, (2020) (accessible at https://www.ktaadvocates.com/wp-content/uploads/2020/10/ELECTRONIC-EVIDENCE-LEGAL-ALERT-KTA.pdf).”).
- 22. Rutenberg, Kiptiness & Sugow, ‘Admission of Electronic Evidence: Contradictions in the Kenyan evidence Act’, 2021 (accessible at https://cipit.strathmore.edu/wp-content/uploads/2021/05/Admission-of-Electronic-Evidence-Contradictions-in-the-Kenyan-Evidence-Act.pdf”).
- 23. European Human Rights Advocacy Centre (EHRAC) & Middlesex University London, ‘EHRAC Guide to Litigating Cases of Online Violence against Women, Domestic & Sexual Violence’, (2020) (accessible at https://ehrac.org.uk/wp-content/uploads/2021/09/EHRAC-Guide-to-Litigating-Cases-of-Violence-Against-Women-ENG.pdf”).
- 24. Digital Freedom Fund, 51, accessible at https://digitalfreedomfund.org/support/strategic-litigation-toolkit/.
- 25. UN Women, ‘Developing an Advocacy Strategy’ (2010) (accessible at https://www.endvawnow.org/en/articles/104-developing-an-advocacy-strategy.html).”).
- 26. SAHRC, ‘Trial of EFF councillor who allegedly masqueraded as a white woman on Twitter gets underway,’ (2022) (accessible at https://www.sahrc.org.za/index.php/sahrc-media/news/item/2946-trial-of-eff-councilor-who-allegedly-masqueraded-as-a-white-woman-on-twitter-gets-underway”).
- 27. Power & Associates, ‘South African Human Rights Commission v Matumba: Written Submissions,’ (2021) (accessible at https://powerlaw.africa/2022/03/16/south-african-human-rights-commission-v-matumba/”).
- 28. Mariana Valante, ‘Do we need laws to address non-consensual circulation of intimate images: the case of Brazil’, 17 June 2018 (accessible at https://genderit.org/articles/do-we-need-new-laws-address-non-consensual-circulation-intimate-images-case-brazil/”).
- 29. Dart Centre for Journalism & Trauma, ‘Journalism and Online Harassment’ (2020) (accessible at https://dartcenter.org/resources/journalists-and-online-harassment”).
- 30. See T Power, New law protects women against online abuse’ (2022) (accessible at https://groundup.org.za/article/new-laws-extend-protections-against-gender-based-violence-online-spaces/”).
- 31. Much of the guidance provided here is courtesy of the Practical Guide for Women Journalists on How to Respond to Online Harassment, published by UNESCO, TrustLaw, the Thomson Reuters Foundation and the International Women’s Media Foundation (accessible at https://trustdnsmanaging.com/wp-content/uploads/2023/10/TRFPracticalGuideJUL2021V15.pdf”).
- 32. UNESCO, accessible at https://en.unesco.org/sites/default/files/the-chilling.pdf.
- 33. Id.