California Attorney General Kamala Harris has launched the Cyber Exploitation resource hub with information for victims and law enforcement dealing with so-called “revenge porn”
“Posting intimate images online without consent is a cowardly crime that humiliates and belittles victims,” said Attorney General Harris. “These new tools will assist law enforcement in combating cyber exploitation and support victims in seeking justice.”
The site includes steps that individuals can take after being a victim of cyber exploitation, and the “first-ever comprehensive collection of major technology platforms’ privacy policies and links to report improper use of intimate images and how to have them removed from social media sites and online search engines,” according to the Attorney General’s office.
The hub has the support of leading technology companies, including Facebook and Microsoft. “Sharing intimate images of someone without their consent can be both devastating and dangerous for the victim, said Facebook Head of Global Safety Police Antigone Davis. “Such activity is not allowed on Facebook and we are proud to support Attorney General Harris’ anti-cyber exploitation initiative to raise awareness of this abhorrent practice and promote tools to fight it.”
Jacqueline Beauchere, Chief Online Safety Officer, Microsoft added, “Non-consensual distribution of sexual content, commonly known as ‘revenge porn’, is a horrific violation of privacy that can damage nearly every aspect of a victim’s life. Microsoft commends Attorney General Harris‘ commitment to this issue and we are proud to support this effort to help ensure victims have easy access to the tools they need to regain control of their images and their privacy. We hope this new online hub, which includes reporting information for online services such as Microsoft’s new reporting site for Bing, OneDrive and Xbox Live, will prove to be a valuable resource for victims.”
In addition to resources for victims and law enforcement, the site also has an industry best-practices page that outlines what companies can do to help combat cyber exploitation.