Rules of the road

A moderation policy is an essential element of any online dialogue, experts say

A moderation policy is an essential element of any online dialogue, experts say. By defining the rules of engagement clearly and visibly, moderators protect themselves from charges of censorship if they need to remove postings.

That is how it worked during the brainstorming phase of the Open Government Dialogue when a group of individuals overwhelmed the site with comments challenging the legitimacy of Barack Obama’s presidency.

The system invited participants to flag entries that did not meet the criteria posted on the Web site. Moderators reviewed and, in some cases, removed the offending posts.

Here is the policy as posted:

This online dialogue allows you the opportunity to fill out custom text fields, which are publicly visible. The site therefore operates a moderation policy to ensure that your comments are appropriate and not harmful to others. Comments which include any of the following may be deleted:

  • Threats or incitements to violence.
  • Obscenity.
  • Duplicate posts.
  • Posts revealing your own or others' sensitive/personal information (e.g., Social Security numbers).
  • Information posted in violation of law, including libel, condoning or encouraging illegal activity, revealing classified information, or comments which might affect the outcome of ongoing legal proceedings.
  • Moreover, while we invite open participation and diverse viewpoints to be shared, the main goal of this dialogue is to answer the overarching question: How can we strengthen our democracy and promote efficiency and effectiveness by making government more transparent, participatory, and collaborative? Moderators therefore reserve the right to remove posts which are not "on topic" or do not address some aspect of that question. Our desire is to remove as few posts as possible while ensuring that a focused, constructive discussion takes place.

About the Author

John Monroe is Senior Events Editor for the 1105 Public Sector Media Group, where he is responsible for overseeing the development of content for print and online content, as well as events. John has more than 20 years of experience covering the information technology field. Most recently he served as Editor-in-Chief of Federal Computer Week. Previously, he served as editor of three sister publications: civic.com, which covered the state and local government IT market, Government Health IT, and Defense Systems.

Featured

  • Cybersecurity
    malware detection (Alexander Yakimov/Shutterstock.com)

    Microsoft targets copycat influence websites

    Microsoft went to court to take down websites it believes to be part of a foreign intelligence operation targeting conservative think tanks and the U.S. Senate.

  • Cybersecurity
    secure network

    FAA explores shifting its network to FISMA high

    The Federal Aviation Administration is exploring an upgrade to the information security categorization of IT systems as part of air traffic control modernization.

  • Cybersecurity
    Shutterstock photo id 669226093 By Gorodenkoff

    The disinformation game

    The federal government is poised to bring new tools and strategies to bear in the fight against foreign-backed online disinformation campaigns, but how and when they choose to act could have ramifications on the U.S. political ecosystem.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.