{"id":2700,"date":"2014-02-05T08:44:29","date_gmt":"2014-02-05T08:44:29","guid":{"rendered":"http:\/\/blogs.loucoll.ac.uk\/learningtechnology\/?p=2700"},"modified":"2014-02-05T08:44:29","modified_gmt":"2014-02-05T08:44:29","slug":"how-to-report-a-tweet","status":"publish","type":"post","link":"https:\/\/blogs.loucoll.ac.uk\/learningtechnology\/2014\/02\/05\/how-to-report-a-tweet\/","title":{"rendered":"How to report a Tweet"},"content":{"rendered":"<p>You can report Tweets that are in violation of the Twitter Rules or our Terms of Service. This includes spam, harassment, impersonation, copyright, or trademark violations. You can report <strong>any Tweet<\/strong> on Twitter, including Tweets in your home <strong>timeline<\/strong>, the <strong>Connect or Discover tabs<\/strong>, or in Twitter <strong>Search<\/strong>.<\/p>\n<p><b>To report a Tweet:<\/b><\/p>\n<ol>\n<li>Find the Tweet you\u2019d like to\u00a0report.<\/li>\n<li>Tap the \u2022\u2022\u2022 icon (or the\u00a0<b>\u22ee<\/b>\u00a0icon on Android)\u00a0to bring up the off-screen menu.<\/li>\n<li>Select <b>Report Tweet <\/b>and then\u00a0one of the options below.<\/li>\n<li>Select <b>Submit<\/b> (or <strong>Next<\/strong> if\u00a0reporting abuse; see below for details)\u00a0or <b>Cancel<\/b> to complete the report or block the user.<\/li>\n<\/ol>\n<p><b>Reporting options:<\/b><\/p>\n<ul>\n<li><b>Spam:<\/b>\u00a0this is the best option for reporting users who are using spam tactics. Please reference the\u00a0Twitter\u00a0Rules\u00a0for information about some common spam techniques, which include mass creation of accounts for abusive purposes, following a large number of users in a short time, and sending large\u00a0numbers of unwanted @replies.<\/li>\n<li><b>Compromised:<\/b>\u00a0if\u00a0you think the user\u2019s account has been compromised, and they are no longer\u00a0in control of their account, select this option, and we will follow up\u00a0with them to reset their password and\/or take other appropriate actions.<\/li>\n<li><b>Abusive: <\/b>for other types of violations, including harassment, copyright or\u00a0trademark violations, and impersonation, select this option. When you\u00a0select \u201cNext&#8217;\u201d, you&#8217;ll be taken to a form where you can complete and\u00a0submit your report to Twitter.<\/li>\n<li><b>Block account: <\/b>instead of reporting a user, you can select this option to block the user. If you block a user, they will not be allowed to follow you or add you to lists, and you won&#8217;t see any interactions with the user in your Connect\u00a0tab.<\/li>\n<\/ul>\n<p><b>What happens when I report a Tweet?<\/b><\/p>\n<ul>\n<li>The tweet will disappear from your\u00a0timeline.<\/li>\n<li>If you selected the option to block\u00a0the user, you will automatically <strong>unfollow<\/strong> the user if you were following them and they will no longer be able to follow you. For every other reporting option, your follow relationship won\u2019t be changed.<\/li>\n<li>Reporting a Tweet does not\u00a0automatically result in the user being suspended.<\/li>\n<\/ul>\n<p><b>What\u2019s the difference between reporting a user and reporting a Tweet?<\/b><\/p>\n<p>Reporting a Tweet allows you to indicate what specific Tweet you think is in violation of the Twitter Rules or policies.<\/p>\n<p>If the user is violating Twitter policies without posting a Tweet (for example, mass following large numbers of users), then you should report the user as spam.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>For more information, visit the Twitter help page: <a href=\"https:\/\/support.twitter.com\/\">https:\/\/support.twitter.com\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Content\u00a0extracted and developed using the\u00a0official Twitter Guidelines 2013<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You can report Tweets that are in violation of the Twitter Rules or our Terms of Service. This includes spam, harassment, impersonation, copyright, or trademark violations. You can report any Tweet on Twitter, including Tweets in your home timeline, the Connect or Discover tabs, or in Twitter Search. To report &hellip;<\/p>\n","protected":false},"author":82,"featured_media":2509,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[103],"tags":[102],"class_list":["post-2700","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-online-safety","tag-esafety"],"acf":[],"_links":{"self":[{"href":"https:\/\/blogs.loucoll.ac.uk\/learningtechnology\/wp-json\/wp\/v2\/posts\/2700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.loucoll.ac.uk\/learningtechnology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.loucoll.ac.uk\/learningtechnology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.loucoll.ac.uk\/learningtechnology\/wp-json\/wp\/v2\/users\/82"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.loucoll.ac.uk\/learningtechnology\/wp-json\/wp\/v2\/comments?post=2700"}],"version-history":[{"count":3,"href":"https:\/\/blogs.loucoll.ac.uk\/learningtechnology\/wp-json\/wp\/v2\/posts\/2700\/revisions"}],"predecessor-version":[{"id":2703,"href":"https:\/\/blogs.loucoll.ac.uk\/learningtechnology\/wp-json\/wp\/v2\/posts\/2700\/revisions\/2703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.loucoll.ac.uk\/learningtechnology\/wp-json\/wp\/v2\/media\/2509"}],"wp:attachment":[{"href":"https:\/\/blogs.loucoll.ac.uk\/learningtechnology\/wp-json\/wp\/v2\/media?parent=2700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.loucoll.ac.uk\/learningtechnology\/wp-json\/wp\/v2\/categories?post=2700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.loucoll.ac.uk\/learningtechnology\/wp-json\/wp\/v2\/tags?post=2700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}