GIFCT and Member Resources

Resources in this Guide

This guide to GIFCT and Member Resources discusses the different ways tech companies approach and fulfill GIFCT’s membership criteria and presents links to all relevant member company resources related to this criteria. This guide is designed to support tech companies, civil society groups, governments, and academic researchers interested in learning about GIFCT member company efforts to prevent terrorists and violent extremists from exploiting digital platforms. In addition to resources developed by members, this guide also highlights resources produced by GIFCT, and its partners where relevant, that have helped guide companies in furthering their commitment to the GIFCT membership criteria.

Section 1: GIFCT Member Efforts to Counter Terrorism and Violent Extremism Online and GIFCT Support

Publicly Available Policies

This section provides an overview of GIFCT and member efforts in support of GIFCT’s first membership criterion: terms of service, community guidelines, or other publicly available policies that explicitly prohibit terrorist and/or violent extremist activity. 

Links to member company policies can be found in Appendix B, showing the diversity of ways in which member companies approach this criterion.

Safety and Reporting

This section provides an overview of GIFCT and member efforts in support of GIFCT’s second membership criterion: the ability to receive, review, and act on both reports of activity that is illegal and/or violated terms of service and user appeals.

Links to member company safety hubs and reporting information can be found in Appendix B, showing the diversity of ways in which member companies approach this criterion.

Exploring New Technical Solutions

This section provides an overview of GIFCT and member efforts in support of GIFCT’s third membership criterion: a desire to explore new technical solutions to counter terrorist and violent extremist activity online.

GIFCT member companies often seek to utilize automated tools to detect and deter terrorist and/or violent extremist activity on their platforms. For many GIFCT member companies, the majority of terrorist or violent extremist activity on their platforms is detected, and removed, through automated tools rather than user reporting. GIFCT member companies utilize or express interest in engaging with a variety of technical tools to detect and deter terrorist and violent extremist activity online.

Transparency

This section provides an overview of GIFCT and member efforts in support of GIFCT’s fourth membership criterion:  regular, public data transparency reports.

Links to member company transparency reports can be found in Appendix B, showing the diversity of ways in which member companies approach this criterion. 

Transparency is a core value in both principle and practice across GIFCT’s efforts to prevent, respond to, and share knowledge about terrorist exploitation of digital platforms. Accordingly, GIFCT members must publish an annual transparency report that reviews elements of how their policy guidelines are upheld and enforced.

Commitment to Human Rights

This section provides an overview of GIFCT and member efforts in support of GIFCT’s fifth membership criterion: a public commitment to respecting human rights in accordance with the United Nations Guiding Principles on Business and Human Rights (UNGPs).

Links to member company commitments to human rights can be found in Appendix B, showing the diversity of ways in which member companies approach this criterion.

Counterterrorism and human rights are complementary and mutually reinforcing goals. Preventing terrorists and violent extremists from exploiting digital platforms enhances the protection, fulfillment, and realization of human rights. Achieving this alignment is not automatic, but requires a deliberate, inclusive, and sustained effort to embed human rights throughout counterterrorism efforts.

Supporting Civil Society Organizations to Challenge Terrorism and Violent Extremism

This section provides an overview of GIFCT and member efforts in support of GIFCT’s sixth membership criterion: support for expanding the capacity of civil society organizations to challenge terrorism and violent extremism.

Links to member company counterspeech, counter-narrative, and digital literacy resources can be found in Appendix B, showing the diversity of ways in which member companies approach this criterion.

Section 2: Resource Links and GIFCT Membership

Appendix A: GIFCT Resources

GIFCT Resource

Link

Resources and Publications

Click to view

Transparency Reports

Click to view

Working Groups and Working Group Outputs

Click to view

GIFCT’s Academic Research Arm: Global Network on Extremism and Technology

Click to view

Human Rights Policy

Click to view

2019 Human Rights Impact Assessment

Click to view

GIFCT’s Hash-Sharing Database

Click to view

Definitions and Principles Framework Project

Click to view

Campaign Toolkit

Click to view

Events

Click to view

Technical Solutions Code of Conduct

Click to view

News

Click to view

Subscribe to Emails

Click to view

Appendix B: Member Company Resources

Click HERE to view GIFCT Member Company Resources. 

This webpage provides a list of member company policies and resources in alignment with GIFCT’s membership criteria. Resources can be filtered by member company, member type, and membership criteria.

GIFCT Membership

Interested in GIFCT Membership?

Digital platforms seeking to join GIFCT must meet six criteria that allow us to deliver on our mission while maintaining our values. If your company does not meet certain requirements, GIFCT offers free development support towards meeting the following criteria:

  1. Terms of service, community guidelines, or other publicly available policies that explicitly prohibit terrorist and/or violent extremist activity.
  2. The ability to receive, review, and act on both reports of activity that is illegal and/or violated terms of service and user appeals.
  3. A desire to explore new technical solutions to counter terrorist and violent extremist activity online.
  4. Regular, public data transparency reports.
  5. A public commitment to respecting human rights in accordance with the United Nations Guiding Principles on Business and Human Rights (UNGPs).
  6. Support for expanding the capacity of civil society organizations to challenge terrorism and violent extremism.

Membership Benefits

  • Potential access to GIFCT’s hash-sharing database and URL sharing program
  • Participation in crisis response communications around international terrorist and violent extremist events with online implications
  • Briefings from scholars associated with the Global Network on Extremism and Technology (GNET), the academic research arm of GIFCT
  • Briefings on technological approaches and solutions
  • Priority participation in topical workshops, e-learnings and webinars with global experts

For questions contact us at [email protected].

Apply for GIFCT Membership here.

To receive email updates from GIFCT, sign up here.