Temporary account IP reveal policy
More actions
| This is a draft for a new global policy with legal considerations. The WickedGov office collaborates with the community in maintaining this page. |
Access
edit sourceGlobal access
edit sourceCertain users, for the satisfactory performance of their duties, require access to temporary account IP addresses on all WickedGov projects.
Stewards
edit sourceStewards have automatic access to reveal temporary account IP addresses across all projects, without any need to check a preference. Stewards are expected to use this access in accordance with this policy and the access to nonpublic personal data policy.
Staff
edit sourceMembers of the Staff global group also have automatic access on all projects. Staff members with this access are expected to use it in accordance with internal policy.
Global sysops
edit sourceMembers of the global sysop and global rollbacker groups may opt into global access at Special:GlobalPreferences. Members of these groups, if opted in, are expected to use this access in accordance with this policy, solely for the prevention and investigation of vandalism and other abuse of the projects or violations of applicable policies.
Alternatively, global sysops may choose not to opt-in; access will then not be granted so long as the users are not also members of user groups that have automatic access.
Checkusers and suppressors
edit sourceTo aid their local investigations, checkusers and suppressors on local wikis may also opt into global access at Special:GlobalPreferences. Members of these groups, if opted in, are expected to use this access in accordance with this policy and the access to nonpublic personal data policy.
Alternatively, checkusers and suppressors may choose not to opt-in to global access; access will then not be granted so long as the users are not also members of user groups that have automatic global access.
Local access
edit sourceThe following users are granted special access on a specific project to help prevent and investigate abuse on that project.
Checkusers and suppressors
edit sourceCheckusers and suppressors have automatic access to reveal temporary account IP addresses on the project where they hold their privileges, without any need to check a preference. Users in these groups are expected to use their access in accordance with this policy and the access to nonpublic personal data policy.
Administrators and bureaucrats
edit sourceAdministrators and bureaucrats may opt into local access by visiting Special:Preferences on the project where they hold their access. Members of these groups, if opted in, are expected to use this access in accordance with this policy, solely for the prevention and investigation of vandalism and other abuse of the relevant project or violations of applicable policies.
Alternatively, administrators and bureaucrats may choose not to opt-in; access will then not be granted so long as the users are not also members of user groups that have automatic access.
Other users
edit sourceUsers who are not members of any above group may still need to be granted local access to IP reveal for assistance with protection of a project.
All such users must meet the following requirements:
- Have had an account for at least 6 months.
- Have made a minimum of 300 edits to the project on which they have access.
- Meet any additional requirements specified by consensus of the local community or, in the case of a request to the Stewards, any additional procedures established by the Stewards.
- Make a successful request to administrators or bureaucrats, or, if no local privileged users are available, to Stewards.
- Opt in through Special:Preferences on the local project.
- Agree to use the IP reveal tool in accordance with this policy, solely for the prevention and investigation of vandalism and other abuse of the relevant project or violations of applicable policies.
The privileges of such users shall be suspended if they have not made any edits or publicly logged actions on the local project for 2 years. Once suspended, the privileges may only be restored by meeting all requirements above.
Exception to requirements
edit sourceIf the Stewards are presented with compelling reasons to do so, they may, on a case-by-case basis, and unless prohibited by local procedure, grant special access to users who do not meet the first or second requirement but nevertheless have the confidence of local community members. Administrators and bureaucrats are not authorized to use this exception.
IP auto-reveal tool
edit sourceThe IP auto-reveal tool allows privileged users to easily see IP addresses of temporary accounts without needing to click buttons, assisting them in patrolling and investigations.
The IP auto-reveal tool can only be enabled for a limited time, after which it will automatically be disabled. This time may be extended if needed.
Due to the elevated potential for misuse of the IP auto-reveal tool, access to such tool will only be granted to those who have automatic access to the IP reveal tool (without needing to check a preference).
Logging
edit sourceTo ensure responsible and judicious use of the tool, Stewards and staff members shall have access to view an IP reveal log on all wikis. Checkusers shall have access to the log on the wiki where they have their access. The log shall record the following actions:
- Viewing IP addresses used by a temporary account,
- Viewing temporary accounts associated with an IP address or IP address range,
- Enabling or disabling the IP auto-reveal tool, and
- Enabling or disabling the preference controlling access to the IP reveal tool.
Removal of access
edit sourceUsers who are sitewide blocked on a project cannot use the IP reveal tool on that project. Users who are globally blocked are also blocked from using the IP reveal tool on all projects except Meta.
In cases of misuse of the IP reveal tool, Stewards are authorized to remove access.
Privileged local users or, if none are available, Stewards are also authorized to remove access if local consensus so dictates.
Violations of user privacy may be reported to office
wickedgov.org, and office actions may be taken to remove access to the tool.