Read this post also in: German
305 million active users who post 500 million tweets a day. Twitter is undoubtedly one of the most important social networks. Founded in March 2006, Twitter serves as a communication platform for individuals, businesses, organizations, etc.
„We believe in freedom of expression and in speaking truth to power (…). In order to ensure that people feel safe expressing diverse opinions and beliefs, we do not tolerate behavior that crosses the line into abuse (..).“
For Twitter, the freeedom of expression is precious. In hardly any other network it is that easy to spread unfiltred information.
In the Twitter Rules, Twitter shows also the limits of the freedom of expression. Copyright violations, ulawful use, violent threats, harassment, hateful conduct, multiple account abuse, publication of private information and impersonation.
In the US American Comedy Show „Celebreties read mean tweets“ presented by Jimmy Kimmel, celebreties read hate messages and insults of Twitter users. Most of them can laugh about it, because hateful comments have become commonplace and they can, for example, react against it on television. But not everyone can easily deal with those comments and victims suffer a lot from the insulting messages. Often they do not know what to do, because in most cases, the platform operators do not offer a good support.
The difficulty to prove threats in social networks
Not only in cases of bullying, but also for example when someone tries to ruin your or your company’s reputation, digital evidence should be generated. Even if you do not think of suing the person right now, it is highly recommended to gather facts. It would be annoying to lose a court case because of a lack of evidence.
How can you generate an evidence? We advise you against doing a simple screenshot, because screenshots have a low probative value. In a previous blogpost we show how easy it is to manipulate a screenshot in 30 seconds. Therefore, the authenticity of a screenshot may be doubted by the opposite side in court.
Terminis offers the opportunity to generate evidence that can not be rejected in court. We first take a screenshot and with the help of a timestamp authority, we apply a timestamp to the screenshot. Timestamps are always used when the timing and the unadulteratedness of documents need to be confirmed.
In addition, we continously monitor the registred URL with the content you want to prove. Specifically this means that you can pursue and prove the activities of the person that spreads information about you. If the person modifies or deletes the message, you can prove how and when the content changed. If the message is deleted, you get a proof of when the message was available and when it has been removed from the internet. This can be really useful when the writer deletes the messages and rejects the reproach. Everytime the registred content changes, we generate a new version of your content. The version comparator on your Dashboard helps you to recognize the changes in your registred content.
How does it work?
- Open the timeline of the profile with the content you want to register with Terminis. In this example, we have decided to register a Tweet published by Terminis.
- Locate the post and click on the corresponding date.
- Copy the link or the web adress and paste it in the following link.
- Click on „Accept“ and complete the buying process.