Article

7_Nov_CTO_What is tech abuse 3 Organizations that are Combating Technology-Facilitated Abuse

Building Safer Workplaces: A CTO’s Guide to Preventing Tech Abuse

Mobile-first technology has changed how we work, communicate, and solve complicated problems. Indeed, technology has contributed more than anything to helping mankind live a life of luxury and convenience. However, this revolution has also given rise to serious issues like tech abuse and the ability for tech to be exploited to track, control, coerce, or harass individuals. This can include emotional, sexual, or economic abuse. 

Technology provides countless ways for perpetrators to abuse through various avenues, such as social media and messaging apps, personal accounts such as emails and online banking, and electronic devices like PCs, laptops, tablets, and phones.

According to a study done by The Safety Net Project, the leading organization working to raise awareness of and to stop technology abuse, 97 percent of domestic violence victims report experiencing harassment, monitoring, and threats by abusers through the misuse of technology. Members of the CTO team are uniquely responsible to take a robust safety-by-design approach so that they engineer out misuse at the front end, with specific interventions to prevent tech abuse.

Technology abuse in the workplace

Technology has totally changed the way we work, right? It’s made things faster. Communication is a breeze but it’s also given access to workplace abuse and harassment too.
Workplace tech-based sexual harassment can include a wide range of behavior, like:

  • Unwelcome or sexual comments and jokes on emails, chats.
  • Inappropriate behavior or abusive communication during virtual meetings 
  • Non-consensual distribution of intimate images of an important person in office
  • Cyberstalking to monitor and track a colleague’s online activities
  • Threat to share, delete, or misuse official files, images, or any kind of critical information etc, to harass someone

For example, an employee might receive unwelcome sexual messages, images, or videos through workplace email or instant messaging platforms like Slack or Microsoft Teams. These messages often create an uncomfortable and hostile work environment for the recipient, who may feel violated and anxious about further interactions with the sender.

Such kind of instances can create a surrounding of constant fear and uncertainty for victims. The persistent threat of harassment, whether clear or subtle, can lead to heightened levels of stress and anxiety, making it difficult for the employee to focus on his/her work and maintain their emotional well-being. Victims may internalize the negative messages and behaviors directed at them, leading to feelings of worthlessness, hopelessness, and depression. The shame, embarrassment, and fear of judgment associated with harassment can make individuals reluctant to seek support or disclose their experiences, leading to feelings of loneliness, isolation, and alienation. Over time, this can significantly impact their physical health and overall quality of life.

The role of a CTO in combating tech abuse in workspace

To create a healthy working environment, CTOs must develop and enforce clear policies that specifically address tech abuse or harassment, including guidelines for appropriate technology use and consequences for violations.

Here are some best practices to follow:

  • Implementing clear policies

CTOs must incorporate thorough policies that clearly address tech-based harassment, including guidelines for digital communication and behavior during virtual meetings.

  • Training and awareness 

Leaders must conduct regular training sessions to create awareness among employees regarding tech-based harassment. The importance of maintaining professional boundaries, and reporting tech-based abuse or harassment should be addressed clearly.

  • Offering support systems

CTOs and other business leaders must ensure employees have access to robust support systems, like confidential reporting mechanisms and counseling services.

  • Regular monitoring and zero-tolerance approach

By responsibly utilizing monitoring tools, CTOs should make it a point to detect any kind of inappropriate behavior while respecting employee privacy. They should also promptly address any reported incidents to demonstrate a zero-tolerance approach.

  • Staying updated on relevant laws and regulations

Leaders must stay updated on relevant laws and regulations to ensure their policies remain compliant and effective. This proactive approach will not only protect their organization from a bad image,  but will also foster a safe and respectful work environment for all employees.

In recent years, technology has emerged as a double-edged sword in this context. Understanding and addressing the complex interplay between technology and harassment is crucial for creating safer work environments. By leveraging the benefits of technology while mitigating its risks, employers can make significant strides in protecting their employees and fostering a culture of safety and respect.

Organizations that are combating tech abuse

These organizations are taking a stand against the dark side of tech and making efforts to prevent technology from being used as a tool for abuse.

Commonwealth Bank of Australia 

Commonwealth Bank of Australia (CBA) has announced its artificial intelligence technology, which is used to detect financial abuse, will be available for free to any bank worldwide.

The bank revealed that the AI model helps identify digital payment transactions that include harassing, threatening, or offensive messages. Through AI and machine learning, the lender’s model can detect more ‘insidious forms of abuse in transactions’, which the bank can then manually review the instances and take action. The bank further claims the AI model is fully operational and has been detecting more than 1,500 cases of potential financial abuse per year.

CBA Group Customer Advocate Angela MacMillan said: “We developed this technology because we noticed that some customers were using transaction descriptions as a way to harass or threaten others. By using this model we can scan unusual transactional activity and identify patterns and instances deemed to be high risk so that the bank can investigate these and take action.

Ditch the Label

A UK-based anti-bullying charity, Ditch the Label , works globally, providing support to young people affected by cyberbullying, by offering online mentors and conducting research to understand and prevent online abuse.

They have a team of trained mentors who work closely with senior moderation teams across leading social networks. You can report content to them from major platforms such as: TikTok, Instagram, Twitter, Facebook, YouTube, Tumblr, Google, and Snapchat. Simply chat with them, and they will zap the nastiest stuff off the internet within 48 hours. 

Without My Consent

A non-profit firm, ‘Without My Consent’ aims to fight against online privacy intrusions. This organization offers resources and legal support to individuals dealing with online privacy violations, including cyber exploitation and harassment. It empowers victims of egregious online privacy violations to lead the fight against online harassment.

In brief

Explore the dark side of technology with a focus on tech abuse, its impact in workplaces, and the crucial role CTOs play in combating digital harassment. Learn actionable strategies and best practices for fostering safe, respectful, and abuse-free digital environments.

Avatar photo

Gizel Gomes

Gizel Gomes is a professional technical writer with a bachelor's degree in computer science. With a unique blend of technical acumen, industry insights, and writing prowess, she produces informative and engaging content for the B2B leadership tech domain.