FAQ für whistleblowers

hier klicken für eine deutsche Version

General

What is machtmissbrauch.help?

machtmissbrauch.help is an anonymous reporting platform for abuse of power, operated by KUPF OÖ – Kulturplattform Oberösterreich. It is aimed at people who have experienced or witnessed abuse of power, discrimination, harassment, or mobbing within participating cultural organizations.

Who can use the platform?

The platform is open to all people working in a participating cultural organization — regardless of whether they are employed, working on a fee basis, or volunteering.

Anonymity & Data Protection

Is my report truly anonymous?

Yes. The system stores neither IP addresses nor browser fingerprints or any other metadata that could be used to identify you. You do not need an email address and do not need to register.

Can KUPF OÖ read my report?

No. KUPF OÖ merely provides the technical infrastructure. KUPF staff members have no technical access to the decrypted contents of reports.

Who reads my report?

Your report is read exclusively by external, independent trusted persons. It is always ensured that the case handler is independent of all persons involved in the case.

What happens to my data after a case is closed?

Personal data that is not required for case processing is not collected. After the statutory retention period has expired, all data is automatically deleted.

Can I report even more anonymously?

Yes. For maximum anonymity, we recommend using the Tor Browser. The platform is also accessible as a Tor Hidden Service.

Tor (The Onion Router) is a free browser specifically designed for anonymity. It routes your internet connection through several encrypted relay stations worldwide, so that neither the platform nor your internet provider can identify who you are or where you are accessing the site from. The Tor Browser can be downloaded free of charge and without registration at torproject.org for Windows, macOS, Linux, and Android.

machtmissbrauch.help is accessible as a so-called Tor Hidden Service — meaning the connection remains entirely within the Tor network and even the location of the server cannot be traced. The Hidden Service address can be found directly on the platform’s homepage.

The Reporting Process

How do I submit a report?

Open the platform, select the affected organization, and describe the situation. You may also attach files — these are automatically stripped of metadata.

Digital files often contain invisible additional information, known as metadata, which could be used to identify you. A photo taken with a smartphone, for example, automatically stores the exact GPS location, date and time of capture, and the device model. A Word document may contain the author’s name, the computer name, or the editing history. The platform removes this metadata automatically before the file is saved. You do not need to do anything yourself.

What is the access code (Receipt)?

After submitting your report, you will receive a 16-digit access code. Keep this carefully — it is the only way to later check the status of your report, respond to follow-up questions from the case handler, or submit additional information. No contact address is required, though you may optionally provide one.

How long will it take to receive a response?

You will receive a confirmation of receipt in your anonymous inbox within 7 days. You will be informed about any measures taken within 3 months.

What happens to my report?

The assigned case handler reviews all reports and decides individually on the next steps for each case. All participating organizations are required, as part of developing an abuse-of-power prevention concept, to establish a compliance unit that can be contacted by the case handler to propose specific measures.

Responsibility for investigating incidents and for reviewing, deciding on, and implementing appropriate measures lies with the respective organization. The reporting platform receives tips, reviews them within the scope of its mandate, and proposes measures. It does not, however, assume operational or legal responsibility for resolving the issues.

Case handlers are bound to absolute confidentiality regarding the identity of whistleblowers. This obligation can only be waived by the whistleblowers themselves.

Case handlers are trained coaches with many years of experience in organizational consulting and the processing of abuse incidents.

What happens if the trusted person has a conflict of interest?

The trusted person checks for potential personal or professional conflicts of interest at the outset. If a conflict exists, the case is automatically transferred to a second, independent person from the pool of case handlers.

What happens to a report that is not relevant?

If a report is found to be irrelevant or classified as spam after review, the case is closed and all data is deleted.

Participating Organizations

Which organizations participate in the reporting platform?

A current list of participating cultural organizations, as well as the topics on which reports can be submitted, is available on the platform.

What topics can I report on?

This depends on the respective organization. Typical topics include abuse of power, discrimination, harassment, and mobbing. The topics applicable to your organization are displayed when you make your selection.

Technical

What software is used?

The platform is based on GlobaLeaks, an open-source software used worldwide by NGOs and authorities for secure whistleblowing and recommended by Transparency International.

Where is the data stored?

All data is stored on GDPR-compliant servers within the European Union.

Do I need any special software?

No. The platform is accessible via any current web browser, 24 hours a day, 7 days a week. For maximum anonymity, we recommend the Tor Browser.