大象传媒

Guidance: Anonymity

Editorial Guidelines issues

This guidance note relates to the following Editorial Guidelines:

  • Accuracy

See Editorial Guidelines Section 3: Accuracy: Sources 3.3.17 鈥 3.3.20

  • Fairness, Contributors and Consent

See Editorial Guidelines Section 6: Fairness, Contributors and Consent : Anonymity 6.3.26 鈥 6.3.31

  • Reporting Crime and Anti-Social Behaviour

See Editorial Guidelines Section 8: Reporting Crime and Anti-Social Behaviour: Disguising Identities 8.3.29 鈥 8.3.30

Key points

  • The decision to grant anonymity should be taken with great care.  The programme maker must consider why the person wishes to remain anonymous
  • When we promise anonymity, we should make sure that we are in a position to honour that promise 
  • The most important question to pose to someone requesting anonymity is 鈥淲hom do you want to be anonymous from - from the general public or from people who know you well? 鈥 
  • When disguising identities, be aware that some technical solutions can be reversed. Also that what may appear as insignificant detail to you (e.g. a piece of jewellery or the way a person walks ) may reveal identity to those familiar with the person 
  • Care should be taken not to reveal several pieces of information that could compromise a person鈥檚 anonymity when put together: so-called 鈥渏igsaw identification鈥 

Guidance in full

Introduction

Granting anonymity is not ideal for programme makers or for our audiences.  Sources and contributors should speak on the record whenever practicable and their identities and credentials made known to the audience so that they can judge the source鈥檚 credibility, reliability and whether or not they are in a position to have sufficient knowledge of the subject or events.  It should also be remembered that the methods by which we disguise identities can sometimes compromise the content we publish visually and/or aurally through blurring the image or distorting the sound, for example.

There are, however, occasions where the reporting of a story or securing a contribution depends upon using a source or contributor who wishes to remain anonymous.  The decision to grant anonymity should be taken with great care.  The programme maker must consider why the person wishes to remain anonymous. Do they have something to hide beyond their identity?

When it is not self-evident to the audience we should explain to them the reasons why the production granted anonymity to a source.  The strongest rationale for granting anonymity is simply to protect the contributor from illegitimate retaliation, harassment or undesirable consequences for providing information. 

Granting Anonymity: Best Practice

When we promise anonymity, we should make sure that we are in a position to honour that promise

We should give careful consideration before offering a blanket guarantee of anonymity because disguising someone鈥檚 identity completely is difficult to achieve. 

The most important question to pose to someone requesting anonymity is 鈥淲hom do you want to be anonymous from - from the general public or from people who know you well? 鈥

We should keep accurate and contemporaneous notes of conversations with sources and contributors about anonymity.  A recording is preferable if possible.

We must ensure when promising anonymity we take into account the implications of any possible court order demanding the disclosure of our untransmitted or unpublished material.  We should be aware that materials that name them might have to be disclosed and could compromise anonymity.  (This includes notebooks, administrative paperwork, computer files, emails, as well as video and audio rushes.)   Before taking any action, a court order should be referred to Litigation to discuss which materials might compromise the anonymity of a contributor or source.

Anonymity also becomes an issue when we are unable to gain consent to show someone identifiably, for example when we are secretly filming for consumer or social research to expose anti-social or criminal practice but the individuals involved are simply illustrative of the behaviour, or not sufficiently culpable or responsible for their actions.  In these instances when the person filmed either refuses to give consent or when we are unable to contact them to secure consent, then the effort to disguise their identity should be proportionate to the private information that we might inadvertently reveal.

Making Anonymity Effective

Footage and photos of people who wish to remain anonymous can be used provided the person鈥檚 face and hair are thoroughly blurred or obscured.  Blurring is preferable to pixilation as the latter can be reversed.  Filming someone from behind or placing an object to obscure a person鈥檚 distinctive features can be effective but again it must be done sufficiently to ensure the level of anonymity required.  And finally the contributor or source鈥檚 identity can be disguised through lighting them so that their face is not visible.

When disguising identities, be aware that some technical solutions can be reversed. Also that what may appear as insignificant detail to you (e.g. a piece of jewellery or the way a person walks) may reveal identity to those familiar with the person

A tattoo, an unusual watch, a distinctive item of clothing, the particular way in which someone gestures, or even the location in which we are filming 鈥 can all reveal identity.  Be cautious of using footage of someone walking filmed from behind as a person鈥檚 gait can be particularly distinctive.

When disguising a voice, recording a 鈥渧oice over鈥 by another person is usually more effective than technically induced distortion or manipulation of voice pitch 鈥 both of which can be reversed.  Audiences should be told when another person鈥檚 voice has been used in place of the source or contributor.  Whilst programme makers sometimes find that replacing a voice in this way can reduce the emotional impact, this loss should be weighed against the level of anonymity promised.

In relation to reversals as described above, we should consider the likelihood of this happening as most people鈥檚 identities are revealed by casual viewers.  It is rare that someone will employ technical means to try to discover the identity of sources or contributors in our recordings or images, usually only in the case of a criminal or serious whistleblower. 

We should remember that whilst the story we are producing may be intended for transmission or publication on a particular 大象传媒 outlet or outlets, the story may well be transmitted or reproduced globally on other outlets without our knowledge or consent.  We should always consider the safety of contributors or sources whose identity may be inadvertently revealed internationally, in all media, in perpetuity.

Jigsaw Identification

Care should be taken not to reveal several pieces of information that could compromise a person鈥檚 anonymity when put together: so-called 鈥渏igsaw identification鈥

Care may also need to be taken to scrutinise other media as well as our own, to minimise the 鈥渏igsaw effect鈥 鈥 where the 大象传媒 publishes certain facts, and another media organisation releases others and the reports, taken together, reveal identity. 

It is advisable to copy the details that are in the public domain having already been used on other radio, TV and internet news outlets. But editors need to check that the outlet they are copying from has not used too many details. If it has, subsequent stories should use the same details, but fewer of them... and avoid adding any new information of their own.

We should take particular care across the 大象传媒鈥檚 news outlets. For instance, a web editor for bbc.co.uk might use someone鈥檚 age and the town that he lives near. But the news editor of the 6 o鈥檆lock bulletin on 大象传媒 One might opt to leave out his age, but name the small village he lived in unless there was close liaison between the two editors.  Putting the two stories together could complete the jigsaw. 

Guarantees to Contributors relating to Anonymity

When we grant anonymity it is important that the contributor is given sufficient information to be able to understand in advance what steps we propose to take, including the degree of protection that will result from any steps taken.

It should not be assumed that a contributor will necessarily appreciate the fine distinction between not identifying them in 大象传媒 content and making sure they are not identifiable. We should judge the sensitivity of the particular circumstances when considering what level of protection is appropriate to protect a contributor鈥檚 identity.

To reduce the possibility of any subsequent misunderstanding, we should ensure that contributors understand exactly how their voice and/or image will be disguised (eg by using an actor鈥檚 voice, by blurring, pixilation or silhouetting.

Guidance last reviewed July 2022


Where next?

Rebuild Page

The page will automatically reload. You may need to reload again if the build takes longer than expected.

Useful links

Theme toggler

Select a theme and theme mode and click "Load theme" to load in your theme combination.

Theme:
Theme Mode: