Cases

From Lordia
(Difference between revisions)
Jump to: navigation, search
(Created page with '== Bully Cases: == They are all handled via knowledge base on one of many way secure methodologies. The key name is "Cray" and other than that all relevant information are provid…')
Line 1: Line 1:
== Bully Cases: ==
== Bully Cases: ==
-
They are all handled via knowledge base on one of many way secure methodologies. The key name is "Cray" and other than that all relevant information are provided on official website.
+
They are all handled via database as one of many methodologies we posses.
 +
 
 +
Boarder cases of bully and harassment.
 +
 
 +
[[Case-0001]] Organized Attack
 +
[[Case-0002]] Sex Appeal
 +
[[Case-0003]] Prominence Leverage
 +
[[Case-0004]] Nominate Infraction
-
Few questions:
 
Penalties:
Penalties:
  A) Plain text with profanity and discrimination: Being warned multiple times and told in news or blogs to protect other individuals from general harassment and prevent their encounter.
  A) Plain text with profanity and discrimination: Being warned multiple times and told in news or blogs to protect other individuals from general harassment and prevent their encounter.
-
  B) Harrasment, Abuse and spam: Treated with reports to authorities.
+
  B) Harassment, Abuse and spam: Treated with reports to authorities.
  C) Information leakage and exploit: Treated with data record in knowledge base and percentage of danger ratio associated of methods such as hostile prevention or reports.
  C) Information leakage and exploit: Treated with data record in knowledge base and percentage of danger ratio associated of methods such as hostile prevention or reports.

Revision as of 17:42, 31 March 2023

Bully Cases:

They are all handled via database as one of many methodologies we posses.

Boarder cases of bully and harassment.

Case-0001 Organized Attack
Case-0002 Sex Appeal
Case-0003 Prominence Leverage
Case-0004 Nominate Infraction


Penalties:

A) Plain text with profanity and discrimination: Being warned multiple times and told in news or blogs to protect other individuals from general harassment and prevent their encounter.
B) Harassment, Abuse and spam: Treated with reports to authorities.
C) Information leakage and exploit: Treated with data record in knowledge base and percentage of danger ratio associated of methods such as hostile prevention or reports.
Personal tools