- GIFCT
faqs
How does GIFCT define terrorism and violent extremism?
Read moreOur goal is to prevent terrorist and violent extremist exploitation of digital platforms. Recognizing there is no universally agreed-upon definition…
- GIFCT
faqs
What is the hash-sharing database?
Read moreGIFCT’s hash-sharing database (HSDB) is a cross-platform database that enables the sharing of “hashes” (or “digital fingerprints”) of known terrorist…
- GIFCT
faqs
Do governments have access to the database?
Read moreNo. Only tech companies have access to the hash-sharing database. Content found by a member company is “hashed” in its…
- GIFCT
faqs
What is the Incident Response Framework?
Read moreThe Incident Response Framework (IRF) is the mechanism that helps member companies respond to online dimensions of offline violence. The…
- admin_gifct
faqs
What is a Perpetrator Content Incident?
Read moreThe Perpetrator Content Incident is an activation type of the IRF. It is designed to coordinate a response to online,…
- GIFCT
faqs
What is GIFCT’s governance structure?
Read moreGIFCT’s Executive Director, Naureen Chowdhury Fink, and the team of experts pursuing our programming, technological, and strategic initiatives lead GIFCT’s…
- GIFCT
faqs
How is GIFCT funded?
Read moreGIFCT’s member companies provide financial contributions to fund GIFCT’s operations. Our four founding member companies and Operating Board members have…
- GIFCT
faqs
How does GIFCT involve civil society?
Read moreGIFCT believes that solutions developed to prevent terrorist and violent extremist exploitation of digital platforms can only work if they…
- GIFCT
faqs
How does GIFCT work with governments?
Read moreGIFCT regularly engages governments based on a shared interest to prevent terrorist and violent extremist exploitation of digital platforms. GIFCT…
- GIFCT
faqs
Does GIFCT take positions on legislation?
Read moreGIFCT is not a lobbying body but does create space for and facilitate multi-sector discussions around topics such as developing…
FAQs
GIFCT > FAQs