- GIFCT
faqs
How does GIFCT define terrorism and violent extremism?
Read moreOur goal is to prevent terrorist and violent extremist exploitation of digital platforms. Recognizing there is no universally agreed-upon definition…
- GIFCT
faqs
What is the hash-sharing database?
Read moreThe GIFCT hash-sharing database is the safe and secure industry database of “perceptual hashes” of known terrorist content as defined…
- GIFCT
faqs
Do governments have access to the database?
Read moreNo. Only tech companies have access to the hash-sharing database. Content found by a member company is “hashed” in its…
- GIFCT
faqs
What is the Incident Response Framework?
Read moreGIFCT’s Incident Response Framework guides how GIFCT and members respond to a mass violent incident, streamlining how members can communicate…
- admin_gifct
faqs
What is the Content Incident Protocol?
Read moreThe Content Incident Protocol (CIP) is the highest level of our Incident Response Framework and is activated when the perpetrators…
- admin_gifct
faqs
What is the Christchurch Call?
Read moreThe Christchurch Call is a set of commitments supported by tech companies (including many GIFCT members) and over 50 governments…
- GIFCT
faqs
What is GIFCT’s governance structure?
Read moreGIFCT’s Interim Executive Director Naureen Chowdhury Fink and the team of experts pursuing our programming, technological, and strategic initiatives lead…
- GIFCT
faqs
How is GIFCT funded?
Read moreGIFCT’s member companies provide financial contributions to fund GIFCT’s operations. Our four founding member companies and Operating Board members have…
- GIFCT
faqs
How does GIFCT involve civil society?
Read moreGIFCT believes that solutions developed to prevent terrorist and violent extremist exploitation of digital platforms can only work if they…
- GIFCT
faqs
How does GIFCT work with governments?
Read moreGIFCT regularly engages governments that are part of the Freedom Online Coalition based on a shared interest to prevent terrorist…
FAQs
GIFCT > FAQs