What content moderation rules should I implement?

What content moderation rules should I implement?

Julie Pearl Published on March 25, 2014

eyeglasses-pen-paper-sheet
Content moderation rules sometimes differ from site to site. The leniency and strictness of the guidelines depend on the types of content being moderated and the overall image that the website wants to project.

Posting rules of image-sharing communities, for example, lean more on the technical aspects to ensure that submissions pass the photo quality standards. The same image moderation rules could apply to other types of visual content.
Moderating written content, for instance, commonly has stricter rules that focus on accuracy. If you allow various types of content on your online community, you could implement different rules for each of them. It could also be wise to impose a set of general guidelines that is applicable to all kinds of posts and all content authors.

Etiquette

As everything that the users submit will be viewable on public space, Internet etiquette should be observed. Here are some basic guides for your community to remember:

content-moderation-outsourcing

•     Respect the view of others. Bullying and “trolling” (inciting offense or annoyance) are not allowed.

•     Comments should always be constructive. Debates are allowed as long as the dialogues remain positive.

•     Keep things civil. Discussions must stay on topic and not focus on personal issues between authors.

•     Report offensive content. Let moderators handle violators; members should never perpetuate conflicts, especially on the public pages of the site.

Restrictions

Certain themes, ideas, or opinions should be weeded out of your community to maintain your brand’s image and to avoid getting involved in legal charges. Some of the things that your community should refrain from posting are:

•     Personal contact information of other members

•     Defamatory claims

•     Content that reflects intolerance of a person’s culture, race, sexual preference, gender, age, or religion

•     Obscene or foul language

•     Advertisements

Sanctions

Breaching any of the content moderation rules could subject the violator to these sanctions:

content-moderation-outsourcing

•     Removal of content - if the author unintentionally or purposely posts material that is inappropriate to the website theme or discussion subject, the content is subjected to removal.

•     Temporary Suspension - a user who has repeatedly breached the posting rules should be suspended for a certain period, depending on the severity of the violation.

•     Permanent Blocking - a member could permanently lose access to the community if he continues violating the rules despite previous warnings or after his suspension has been lifted.

•     Automatic Blocking - submitters of illegal content should be immediately blocked.

Managing a massive online community is not an easy task, as it requires active monitoring and vigilance. However, the community members themselves could help make the content moderation process a breeze if they acknowledge their role in keeping the website high quality.

As one of Open Access BPO's content writers, Julie Pearl shares her BPO knowledge through her blog posts, research papers, and other resources. She writes about outsourcing news and call center management tips and insights.
JOIN US ON FACEBOOK
Open Access BPO
Open Access BPO7 hours ago
China is the second-largest consumer market in the world. However, its strict business protocols make it difficult for many foreign brands to establish a local presence in the region. Open Access BPO 𝗫𝗶𝗮𝗺𝗲𝗻 enables businesses to penetrate and thrive in the billion-strong Chinese global market.

Open Access BPO's expanding campus in Xiamen offers #CustomerSupport in Chinese dialects including Mandarin, Hokkien, and Cantonese.

𝗣𝗲𝗻𝗲𝘁𝗿𝗮𝘁𝗲 𝘁𝗵𝗲 𝗖𝗵𝗶𝗻𝗲𝘀𝗲 𝗺𝗮𝗿𝗸𝗲𝘁 𝗮𝗻𝗱 𝗲𝗻𝗵𝗮𝗻𝗰𝗲 𝗰𝗹𝗶𝗲𝗻𝘁-𝗰𝗼𝗻𝘀𝘂𝗺𝗲𝗿 𝗿𝗲𝗹𝗮𝘁𝗶𝗼𝗻𝘀𝗵𝗶𝗽𝘀: https://buff.ly/3WVldvs

----------
𝗘𝘅𝗽𝗹𝗼𝗿𝗲 𝗢𝗽𝗲𝗻 𝗔𝗰𝗰𝗲𝘀𝘀 𝗕𝗣𝗢
• Our Solutions: https://buff.ly/3XOmOEt
• Our Other Locations: https://buff.ly/3XRmtRt

#WeSpeakYourLanguage
Open Access BPO
Open Access BPO10 hours ago
Open Access BPO's standard recruitment is a seamless process, from job announcement to contract signing.

Here are some of our recruitment best practices: https://buff.ly/3HkhKRs

---------
We hyper-customizable solutions that fit your needs—from staff to its everyday ops: OpenAccessBPO.com/get-started

#WeSpeakYourLanguage
Open Access BPO
Open Access BPO1 day ago
Compared to most industries, #CallCenters are known for providing a fun and positive workplace for their employees.

But more than just making daily ops light and dynamic, the agents, the contact center, and the clients benefit from this: https://buff.ly/3kIaKWM

----------
Let's hyper-customize a program for your brand's goals, needs, budget, and customer demands: OpenAccessBPO.com/get-started

#WeSpeakYourLanguage
#CustomerService #EmployeeEngagement
Open Access BPO
Open Access BPO1 day ago
Keeping your customers' data secure is one of the best ways to earn their trust.
Here's an in-depth look on how it can be achieved: https://buff.ly/3HjQYIK

----------
Only trust an #outsourcing firm with a robust #DataSecurity strategies and solutions to ensure #InformationSecurity: OpenAccessBPO.com/get-started

#WeSpeakYourLanguage
#cybersecurity #infosec
Open Access BPO
Open Access BPO5 days ago
#𝗗𝗮𝘁𝗮𝗣𝗿𝗶𝘃𝗮𝗰𝘆𝗪𝗲𝗲𝗸 aims to raise awareness about #DataSecurity and privacy and how we all must be mindful of what we share online. Let's stay vigilant against malicious activities that may exploit our information.

#WeSpeakYourLanguage
#InfoSec #DataPrivacy
Open Access BPO
Open Access BPO7 days ago
#CustomerService providers have the responsibility to protect their partners against data intrusions that may interrupt operations and steal sensitive information. If your

Check out these best practices for protecting your data: https://buff.ly/3Jj7cEV

----------
Ensure utmost #InformationSecurity for your customers with our #DataSecurity strategies: OpenAccessBPO.com/get-started

#WeSpeakYourLanguage
#InfoSec #DataManagement
#DataPrivacyWeek
Open Access BPO