How do you protect confidential sources?
Created by: Brandon Bell
Modified on: Fri, 19 Mar, 2021 at 3:42 PM
- We permit undercover reporting only when we feel a story is important enough to justify doing so, and we have exhausted all other reasonable methods.
- We use confidential sources sparingly to provide important information that cannot be obtained through on-the-record sources. Our reporters may disclose the identity of unnamed sources to at least one editor.
- We publish information from confidential sources that we consider reliable but do not publish the opinions of unnamed sources.
- We do not attend “background briefings” where officials try to spoon-feed information to the media without speaking for the record.
- We are more open to granting confidentiality to sources we approach for interviews than to sources approaching us with tips or with dirt about political opponents or business rivals.
- We always assume that government snoops, law enforcement or hackers might access our regular communication channels when we grant confidentiality to a source. We should use technology such as encryption software or “burner” cell phones to protect confidentiality.
If you have any questions or would like more information, you can consult our Code of Ethics or contact us by submitting a ticket.
Did you find it helpful?
Sorry we couldn't be helpful. Help us improve this article with your feedback.