The Messaging Malware Mobile Anti-Abuse Working Group, M3AAWG (https://www.m3aawg.org), has published guidance to help organizations deal with objectionable content on their networks.
The document, available here, https://www.m3aawg.org/ObjectionableContentTakedownTemplate helps organizations understand the definition of objectionable content and how to assess the information and when appropriate, remove it from the network. Links also are provided for downloading associated tools.
The guide includes a specific checklist as a downloadable template that offers step-by-step actions and can be filled in with complete items and notes. Links also are provided for downloading the actual checklist and chart.
Objectionable content is defined by M3AAWG as video, still images, audio recordings or written text that is violent, produced by a perpetrator or accomplice or other that crosses legal thresholds. Materials may include terrorist acts, murder, sexual assault and kidnap. Guidance includes advising organizations to assess content and when necessary deal with appropriate government entities.
M3AAWG previously has published guidance in dealing with child sexual abuse material (CSAM) (available at https://www.m3aawg.org/sites/default/files/m3aawg-disposition-cam-2021-08.pdf) and that type of content is not covered in this new template.
The checklist also offers users guidance regarding prioritizing activities, communication with stakeholders, dealing with additional organizations that might also have the content, and investigating how the material got on the network. The document also addresses dealing with employee welfare dealing with these kinds of sensitive situations.
Noted the M3AAWG Public Policy Chairs, “This document template is intended to enhance what your company has in place. While the steps outlined in the document template are robust, users should consult their legal counsel to determine any required additional procedures along with which regulations and procedures are appropriate and applicable to their organization.”
The best practices document also includes a flowchart to help define the steps. The takedown template and more best practices to keep the internet safer can be found here, along with the checklist and flowchart: https://www.m3aawg.org/published-documents.