TED TALK Video Recap
The topic of discussion does not specifically affect me as I have never been in Darieth Chisholms shoes, but there is a constant cycle of women being taunted with this shameful tactic. Throughout my years of living, I have seen and heard of multiple stories of women I know or know of having to experience going through someone personally releasing graphic personal photos of them due to conflicts with another person. This affects not only the individual physically and mentally, but also hinders that persons privacy which should be protected at all costs. If the person did not consent to another person sharing graphic personal photos of them, how can they be guaranteed safety. Not only that, but how can other current and future generations of women be protected as well. It is time to have implemented laws that guarantee a reasonable punishment for perpetrators. Throughout the media, they use the term "Revenge Porn," to describe such heinous acts. Darieth describes it exactly as it should be "Digital Domestic Violence." She defines it as someone who can not physically break you down, so they use other weapons through technology to get to you. Within her TED TALK she provides research stating that 1 in 25 women are impacted by revenge porn daily. In addition to that, 1 in 10 women under the age of 30 years old suffer this consequence as well. Women are known to be the main victims of this, but even if roles were reversed it would not be acceptable either.
Overall, there is lack of legislation and laws to protect victims and punish individuals. Some states have laws in place such as civil misdemeanors, but is that really enough. Suspects end up paying a small fine and leave free potentially not learning from their mistake and doing it again. The government should have implemented laws for situations like Darieth Chrisolm's stating the offense, how much time you will get in prison, and a much heftier fine. In order to protect ourselves and invasions of privacy, there should be contracts in place, tracking and trace devices, to name a few.
No comments:
Post a Comment