Report a problem
Judy's Book takes violations of our Terms of Use very seriously. We encourage
you to read through our
Terms of Use
before filling report with us.
After careful review, we may remove content or replace a content warning page before
viewing content deemed offensive, harmful, or dangerous.
Additionally, we are aware that there may be content on Judy's Book that is personal
in nature or feels invasive. Please note that Judy's Book is a provider of content
creation tools, not a mediator of content. We allow our users express their opinions,
but we don't make any claims about the content of these pages. We strongly believe
in freedom of expression, even if a review contains unappealing or distasteful
content or present negative viewpoints. We realize that this may be frustrating,
and we regret any inconvenience this may cause you. In cases where contact information
for the author is listed on the page, we recommend that you work directly with this
person to have the content in question removed or changed.
Here are some examples of content we will not remove unless provided with a court
order:
Personal attacks or alleged defamation
Political or social commentary
Distasteful imagery or language
If we've read the Terms of Use and believe that this review below violates our Terms
of Use, please complete the following short form.
Businiess name:
Community Healthlink
|
Review by:
citysearch c.
|
Review content:
Cyberstalkers use posts, forums, journals and other online means to present a victim in a false and unflattering light. The question of liability for harassment and character assassination is particularly salient to legislative protection since the original authors of the offending material are, more often than not, not only anonymous, but untraceable. Nevertheless, abuse should be consistently brought to company staffers' attention.
Recognition of adult and workplace cyberbullying tactics
Common tactics used by cyberstalkers is to vandalize a search engine or encyclopedia, to threaten a victim's earnings, employment, reputation, or safety. Various companies provide cases of cyber-stalking (involving adults) follow the pattern of repeated actions against a target. While motives vary, whether romantic, a business conflict of interest, or personal dislike, the target is commonly someone whose life the stalker sees or senses elements lacking in his or her own life. Web-based products or services leveraged against cyberstalkers in the harassment or defamation of their victims.
The source of the defamation seems to come from four types of online information purveyors: Weblogs, industry forums or boards, and commercial Web sites. Studies reveal that while some motives are personal dislike, there is often direct economic motivation by the cyberstalker, including conflict of interest, and investigations reveal the responsible party is an affiliate or supplier of a competitor, or the competitor itself.
|
Reasons for reporting (512 characters left):
|
Reasons are required.
|
or
Cancel
|