{"id":245,"date":"2015-06-21T20:57:08","date_gmt":"2015-06-21T20:57:08","guid":{"rendered":"http:\/\/confdev.journalists.org\/ethics\/?page_id=245"},"modified":"2016-05-26T21:14:59","modified_gmt":"2016-05-26T21:14:59","slug":"confidential-sources","status":"publish","type":"page","link":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/topics\/confidential-sources\/","title":{"rendered":"Confidential sources"},"content":{"rendered":"<ul>\n<li>What does an \u201canonymous source\u201d mean?<\/li>\n<li>On what basis should we grant confidentiality to a source?<\/li>\n<li>What understandings should you have when granting confidentiality?<\/li>\n<li>What if a spokesperson doesn\u2019t want to be identified?<\/li>\n<li>Should you take part in background briefings?<\/li>\n<li>How can you protect confidentiality if you or the source might be subject to electronic surveillance?<\/li>\n<\/ul>\n<p>Use of confidential sources is an area where many news organizations\u2019 policies and practices don\u2019t necessarily match up. Many news organizations have policies that say they rarely use confidential sources, but in practice they frequently use them. Whether you favor using confidential sources heavily because of the tips and information people will provide if you don\u2019t name them, or whether you favor seldom or never using confidential sources, because you don\u2019t consider them credible, top editors in any news organization should discuss their standards with their staffs and try to achieve consistency in how and why you grant confidentiality.<\/p>\n<h3>Terminology<\/h3>\n<p>Often among journalists and especially among our critics, the term for sources we don\u2019t name is \u201canonymous sources,\u201d or we explain in a story that the source requested \u201canonymity.\u201d But this term can be misleading or even inaccurate in ways that undercut the news organization\u2019s credibility. The truth is that few, if any, news stories ever actually use any information from truly anonymous sources: people whose identities are unknown to the journalists or the news organization.<\/p>\n<p>Truly anonymous sources would be people who call us on the telephone with tips and refuse to give their names, anonymous commenters on our websites or someone contacting us through email or social media (or even in person) who refuse to identify themselves to us. Journalists get valuable tips in these ways but shouldn\u2019t publish anything based on these sources. If you publish a story at all, you should use the tip as a starting point and find sources you trust &#8212; whether they will go on the record or not &#8212; on which to base a story.<\/p>\n<p>This may appear a matter of semantics, but anything involving unnamed sources affects the credibility of your stories. And every tiny step you can take to assure the reader or viewer that you have tried to use reliable sources is important. Using terms such as \u201cconfidential\u201d sources probably doesn\u2019t build much confidence, but the word \u201canonymous\u201d or \u201canonymity\u201d can hurt your credibility, and isn\u2019t accurate from your standpoint. So consider avoiding those terms.<\/p>\n<p>Journalists using unnamed sources usually know the sources well. If they are not sources you have used before, you should question them extensively about how they know what they are telling you and why they can\u2019t go on the record. You might research their credentials to judge their veracity. Because of your pledge of confidentiality, you generally can\u2019t vet sources by asking others about their credibility, but sometimes a confidential source can put you in touch with a trusted contact of yours who can vouch for her credibility. Sometimes a source you trust leads you to a good source that insists on remaining confidential.<\/p>\n<p>Steve Buttry discussed this issue at greater length in his blog post <a href=\"https:\/\/stevebuttry.wordpress.com\/2013\/12\/19\/a-2005-handout-on-confidential-sources-you-can-quote-me-on-that\/\">\u201cYou didn\u2019t hear this from me\u2026\u201d<\/a><\/p>\n<h3>When to grant confidentiality<\/h3>\n<p>Here are other factors to consider when determining whether to grant confidentiality and how to handle such requests:<\/p>\n<h4>What is the source\u2019s reason for wanting not to be identified?<\/h4>\n<p>Paul Farhi of the Washington Post <a href=\"http:\/\/www.washingtonpost.com\/lifestyle\/style\/anonymous-sources-are-increasing-in-news-stories-along-with-rather-curious-explanations\/2013\/12\/15\/5049a11e-61ec-11e3-94ad-004fefa61ee6_story.html\">wrote a story in 2013<\/a> about the weak explanations news reports give of sources\u2019 reasons for not being identified.<\/p>\n<p>Before a journalist grants confidentiality, you should have a detailed discussion of the source\u2019s reasons for wanting to avoid accountability, which is what happens when you don\u2019t name sources. Tell the source that your stories are more credible and your sources more accountable when you use their names and gain a thorough understanding of the source\u2019s motivation.<\/p>\n<p>Sometimes this discussion reveals that the source isn\u2019t confident enough in what he is saying to stand behind it. You need to know that. Maybe the source isn\u2019t sharing first-hand information. In that case, you need to ask the source to help you get to the original source. You can build credibility with the source by saying that you don\u2019t use second-hand sources, and ask this person\u2019s help in identifying and\/or reaching the original source.<\/p>\n<p>If the source\u2019s reason for wanting anonymity sounds weak, push back on the source and see whether you can talk her into going on the record. Be willing to walk away from a source whose reason is so poor that you doubt the source\u2019s credibility.<\/p>\n<h4>Is the information available elsewhere?<\/h4>\n<p>Ask the source who else might have the information or whether documentation exists. If the source can give you the documentation, you never have to name the source or use an unnamed source, just cite the documents.<\/p>\n<p>If someone else has the information, try that person to see if she will speak for the record.<\/p>\n<p>If a person is the only source for a piece of information, you might have a stronger reason to grant confidentiality.<\/p>\n<p>You may wish to write, when quoting unnamed sources, that the person \u201cinsisted\u201d on not being named. Saying that, rather than \u201crequested not to be named,\u201d emphasizes that you do not grant anonymity easily. It makes clear that if you had not granted confidentiality, you would not have the information.<\/p>\n<h4>What information is the source providing?<\/h4>\n<p>The more important the information is, the more willing a journalist will normally be to make a deal. If the information doesn\u2019t seem very important, consider taking one of two approaches:<\/p>\n<p>Tell the source you don\u2019t want to talk unless it\u2019s on the record.<br \/>\nTell the source you\u2019d like to hear the information for background purposes but you\u2019re not likely to use it without a name. It might help you understand the issue better or lead you to another source.<\/p>\n<p>You can\u2019t always get a good idea before granting confidentiality about what the information is. Sometimes you can opt for the first option during the interview, saying that if this is as good as it gets, you don\u2019t want to continue talking off the record. It\u2019s more likely in this case that you will end up going to the second option, thanking the source but saying you\u2019re not likely to use this information unless you can attribute it by name.<\/p>\n<h4>Is the source dishing opinion?<\/h4>\n<p>Information from unnamed sources has some value if they are telling the truth. If a source gives you information, you can seek documentation or verification from other sources. You can describe how the source knows the information, giving credibility to the information.<\/p>\n<p>But the value of an opinion is entirely dependent on the person holding the opinion. A person who criticizes others and won\u2019t stand behind the opinions with his name is a coward, and journalists shouldn\u2019t honor those opinions by publishing them.<\/p>\n<p>Steve Buttry addressed this issue at greater length in a 2005 blog post <a href=\"http:\/\/stevebuttry.wordpress.com\/2012\/03\/15\/from-2005-unnamed-sources-should-have-unpublished-opinions\/\">\u201cUnnamed sources should have unpublished opinions.\u201d<\/a><\/p>\n<h4>Is the source eager or reluctant?<\/h4>\n<p>You should be more willing to grant confidentiality to a source you approach but is reluctant to talk than to a source who approaches you with information he hopes you\u2019ll publish.<\/p>\n<p>When you initiate the conversation, you are trying to persuade the source to help you with your story. Confidentiality is a technique you can use to start the conversation. You may already understand why the source is reluctant to be identified. You may be able to talk the person into going on the record about some or all of the interview if you use confidentiality to start the conversation and then get time to build some trust.<\/p>\n<p>But when a source approaches you with a tip and wants to stay unnamed, it may be that you\u2019re being played. In many cases, the source who approaches you isn\u2019t the real source, but a pawn. This doesn\u2019t mean you shouldn\u2019t grant confidentiality. The source might give you important information that you can verify elsewhere. One approach when dealing with an eager source who initiates a conversation is to grant confidentiality for the conversation but make clear that you may not publish the information unless the person will go on the record or unless you can verify it independently. Push back, and ask the person why she won\u2019t be identified if she is so eager to get this information published.<\/p>\n<p>Steve Buttry wrote more about these issues in a 2013 post <a href=\"http:\/\/stevebuttry.wordpress.com\/2013\/12\/19\/updated-lessons-from-old-stories-use-confidential-sources-to-get-on-the-record-interviews\/\">\u201cUse confidential sources to get on-the-record interviews\u201d<\/a> and in a 2010 post <a href=\"http:\/\/stevebuttry.wordpress.com\/2010\/06\/30\/power-and-eagerness-should-guide-reporters-confidentiality-decisions\/\">\u201cPower and eagerness should guide reporters\u2019 confidentiality decisions.\u201d<\/a><\/p>\n<h4>Is the source powerful or vulnerable?<\/h4>\n<p>Journalists should be more willing to grant confidentiality to a vulnerable source than a powerful one. But keep in mind that power and vulnerability are both relative.<\/p>\n<p>Mark Felt was a powerful man as associate director of the FBI. But he also was vulnerable, <a href=\"http:\/\/www.washingtonpost.com\/politics\/how-mark-felt-became-deep-throat\/2012\/06\/04\/gJQAlpARIV_story.html\">as Bob Woodward\u2018s famed \u201cDeep Throat\u201d source in the Watergate stories<\/a>, when he was confirming information about wrongdoing that involved the White House. Also, he was reluctant rather than eager.<\/p>\n<p>But other officials abuse their power by leaking classified information for political purposes.<\/p>\n<p>Journalists have been lenient with many powerful people who seek to avoid accountability by doing their sniping from behind journalists. You may be better off missing a few stories than getting into this kind of abusive relationship. Keep in mind that some of the stories you get from these sources may be false or misleading; the sources are leaking partial or even false information because they aren\u2019t accountable.<\/p>\n<p>Steve Buttry discussed this issue in a 2010 post <a href=\"http:\/\/stevebuttry.wordpress.com\/2010\/06\/30\/power-and-eagerness-should-guide-reporters-confidentiality-decisions\/\">\u201cPower and eagerness should guide reporters\u2019 confidentiality decisions.\u201d<\/a><\/p>\n<h4>Are the source and information worth going to jail for?<\/h4>\n<p>If good laws to protect confidential sources do not exist in your region, you need to consider whether law enforcement or someone in a civil court case will try to force you to reveal your source. Then you need to decide whether this story, the information the source is providing and the source himself is worth going to jail for.<\/p>\n<p>Keep in mind that this is a calculation you need to make before granting confidentiality, not just before you publish. Reporters have been ordered by courts to reveal sources they did not even cite in stories.<\/p>\n<p>It\u2019s also worth noting that not every story based on confidential sources presents the threat of going to jail. Many stories present no risk at all (e.g. your local team is going to hire a new coach, and you have the news from unnamed sources before the official announcement).<\/p>\n<h4>How well can you protect the source?<\/h4>\n<p>A good rule of journalism and life is that you shouldn\u2019t make promises you can\u2019t keep. So, if you\u2019re promising confidentiality to a source, especially one who might draw the attention of law enforcement or intelligence agencies, consider whether you can keep that promise.<\/p>\n<p>If a law enforcement agency seizes your phone records, will they lead directly to your source? If an intelligence agency eavesdrops on your phone calls or snoops in your emails, will that lead to the source? What if the source\u2019s employer checks the records for her company cell phone or checks her emails on her company account?<\/p>\n<p>A journalist who promises confidentiality in a situation that could attract scrutiny by law enforcement, intelligence agencies or employers should learn about secrecy technology and then take simple steps to protect relationships with your sources. Meet in person when you can, in places where you can have some privacy. Discuss how to communicate, if at all, electronically. The situation will determine which options are best for you:<\/p>\n<ul>\n<li>Is it best (and sufficient) for either or both of you to communicate using personal (rather than work) computers and\/or phones?<\/li>\n<li>Do you need to set up special email and\/or social media accounts for communicating?<\/li>\n<li>Do you need to use a \u201cburner\u201d cell phone? (Don\u2019t be too sure that it will protect your source.)<\/li>\n<li>Do you need to use encryption in any emails or documents you share?<\/li>\n<li>Is there a danger, in your country, that using encryption or other secure technologies could raise officials\u2019 suspicions and lead to increased monitoring of your activities? Alternatively, might a court rule that if you use encryption for some messages, you have no expectation of privacy for those you don\u2019t encrypt?<\/li>\n<\/ul>\n<p>Jeremy Barr wrote a helpful piece for Poynter, <a href=\"http:\/\/www.poynter.org\/how-tos\/digital-strategies\/234005\/how-journalists-can-encrypt-their-email\/\">\u201cHow journalists can encrypt their email.\u201d<\/a> However, technologies are constantly changing, so make sure you are using the latest advice available.<\/p>\n<h4>Do you trust the source?<\/h4>\n<p>Relations between journalists and sources require trust. The source has to trust the journalist to understand the story and report it accurately and fairly. The journalist has to trust the source to tell the truth.<\/p>\n<p>Trust in a source depends on three things:<\/p>\n<p>Your assessment of the source\u2019s personal trustworthiness.<\/p>\n<p>Your inquiry about how the source knows what he claims to know. An honest source can still be mistaken or have a faulty memory. \u201cHow do you know that?\u201d and \u201cHow else do you know that?\u201d are among the most important questions in journalism, and they are essential to ask when dealing with confidential sources.<\/p>\n<p>Your ability to verify what the source tells you. You don\u2019t have to make your demands for documentation and other sources a challenge to the source\u2019s veracity. Everything you can verify through other sources is something you don\u2019t have to pin on this source (or this source alone) and something that is harder to track back to the source.<\/p>\n<p>Sometimes you can\u2019t verify all the facts a source tells you. But if you verify some of the facts, you gain confidence in the source\u2019s honesty and accuracy.<\/p>\n<h4>Will the information come out soon anyhow?<\/h4>\n<p>A lot of stories based on unnamed sources are stories that will become public in a day (or pretty soon) anyway.<\/p>\n<p>You\u2019re probably going to publish that story in most circumstances, unless you take a hard-line position against ever using unnamed sources. But you should consider whether a short-lived scoop is worth making sources and readers think you\u2019re promiscuous about granting anonymity.<\/p>\n<p>Nail down as much of the story as possible with sources that can be named. For example, can you verify that a university donor\u2019s plane has flown to the city where the new coach lives? Or that the new coach has checked into a local hotel? Can you reach players or assistant coaches on the coach\u2019s old team (or check their social media accounts) to see if they\u2019ve been told? They won\u2019t be as likely to honor a request to keep the secret until the announcement. You might be able to get someone else on the record.<\/p>\n<h3>Be specific about the terms of your agreement<\/h3>\n<p>When you discuss confidentiality, you need to be specific about the terms of your agreement. Be sure that the source understands you\u2019re going to seek documentation and\/or other on-the-record sources for the information.<\/p>\n<p>Discuss whether you can attribute the information in some way to this source or whether this is just a tip.<\/p>\n<p>If you can attribute, discuss how you will refer to the source, and avoid agreeing to a description that would be inaccurate or misleading.<\/p>\n<p>An identification that\u2019s overly broad (an \u201cadministration source\u201d) is better than one that\u2019s misleading. Particularly if the person doesn\u2019t agree to a more specific or helpful description of who he is (\u201ca close aide to the vice president\u201d), negotiate what you can say about how the person knows (\u201caccording to a person who has read the report\u201d).<\/p>\n<p>When granting confidentiality for intimate personal stories, such as interviews with victims of domestic violence or sexual abuse, you might persuade a source to identify herself by her middle name (and to say in the story that you are using the middle name). Maybe a person will agree to use a childhood nickname or a birth name she no longer uses.<\/p>\n<p>Some organizations will use a false name for a source (stating in the story, \u201cnot her real name\u201d). Other news outlets take the position that they will carry nothing that is false, for any reason.<\/p>\n<p>Discuss what will happen if the source is lying. Would you reveal a source who lies to you? (Keep in mind that sometimes a source has misinformation; not every bad tip you get is a lie.)<\/p>\n<p>Discuss what will happen if you\u2019re subpoenaed. Would you go to jail for the source? Would the source come forward in that circumstance? (Don\u2019t expect this if the source is breaking the law by giving you this information.)<\/p>\n<h3>Should you take part in background briefings?<\/h3>\n<p>Powerful people sometimes talk with journalists in background briefings where they discuss issues on condition that they won\u2019t be identified. Some journalists participate, but others have decided that the briefings don\u2019t provide enough value to risk their credibility.<\/p>\n<p>The Associated Press\u2019 Statement of News Values and Principles (http:\/\/www.ap.org\/company\/News-Values) says, \u201cReporters should object vigorously when a source wants to brief a group of reporters on background and try to persuade the source to put the briefing on the record.\u201d<\/p>\n<p>You might consider going a step further in most circumstances and boycotting the briefing unless you know the information is unusually valuable. You can spend your time getting exclusive on-the-record stories rather than joining other media in an exercise that hurts everyone\u2019s credibility.<\/p>\n<h3>What if a spokesperson wants confidentiality?<\/h3>\n<p>Journalists should be especially reluctant to quote a spokesperson without using her name. If she\u2019s speaking for an official, organization or company, she should be on the record.<\/p>\n<p>A rare exception might be when a spokesperson is giving you information that doesn\u2019t relate directly to the official or organization she represents. You might also have valid reasons to grant confidentiality for a spokesperson who is revealing negative information about the person or organization he represents.<\/p>\n<p>Some reporters deal with spokespeople whose organizations require that they speak only as a \u201cspokesperson.\u201d In these situations, keep in mind that mouthpiece statements often aren\u2019t that important anyway. You might bolster your credibility by saying that a spokesperson wouldn\u2019t give his name and the reasons didn\u2019t meet your organization\u2019s standards for confidentiality. Do that a few times, and the organizations you deal with may decide that they want to get their viewpoints out. You may also write simply that \u201cthe company said.\u201d<\/p>\n<p>Steve Buttry blogged about this in a 2012 post <a href=\"http:\/\/stevebuttry.wordpress.com\/2012\/08\/21\/spokespeople-should-be-named-set-the-bar-high-for-confidentiality\/\">\u201cSpokespeople should be named; set the bar high for confidentiality.\u201d<\/a><\/p>\n<p>After you talk, try again to get the source on the record.<\/p>\n<p>At the end of an interview, ask sources again about going on the record for some or all of what they\u2019ve said (Steve Buttry describes <a href=\"http:\/\/cironline.org\/blog\/post\/steadfast-reporting-eric-nalder-236\">Eric Nalder\u2019s \u201cratcheting\u201d technique<\/a> in his 2005 post <a href=\"http:\/\/stevebuttry.wordpress.com\/2013\/12\/19\/a-2005-handout-on-confidential-sources-you-can-quote-me-on-that\/\">\u201cYou can quote me on that.\u201d<\/a><\/p>\n<p>The main author of this module is <a href=\"http:\/\/stevebuttry.wordpress.com\/about\/\">Steve Buttry<\/a> of Louisiana State University. It includes material from Buttry\u2019s blog post <a href=\"http:\/\/stevebuttry.wordpress.com\/2013\/12\/19\/factors-to-consider-in-granting-confidentiality-to-sources\/\">on confidential sources<\/a>.<\/p>\n<p>See also the section\u00a0in this project on \u201cSources: Reliability and Attribution.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What does an \u201canonymous source\u201d mean? On what basis should we grant confidentiality to a source? What understandings should you have when granting confidentiality? What if a spokesperson doesn\u2019t want to be identified? Should you take part in background briefings? How can you protect confidentiality if you or the source might be subject to electronic [&hellip;]<\/p>\n","protected":false},"author":82,"featured_media":0,"parent":25,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-245","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Confidential sources - ONA Ethics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/journalists-org-develop.go-vip.co\/ethics\/topics\/confidential-sources\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Confidential sources - ONA Ethics\" \/>\n<meta property=\"og:description\" content=\"What does an \u201canonymous source\u201d mean? On what basis should we grant confidentiality to a source? What understandings should you have when granting confidentiality? What if a spokesperson doesn\u2019t want to be identified? Should you take part in background briefings? How can you protect confidentiality if you or the source might be subject to electronic [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/journalists-org-develop.go-vip.co\/ethics\/topics\/confidential-sources\/\" \/>\n<meta property=\"og:site_name\" content=\"ONA Ethics\" \/>\n<meta property=\"article:modified_time\" content=\"2016-05-26T21:14:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/journalists-org-develop.go-vip.co\/ethics\/wp-content\/uploads\/sites\/5\/2015\/09\/ethics-facebook.jpg?w=560\" \/>\n\t<meta property=\"og:image:width\" content=\"560\" \/>\n\t<meta property=\"og:image:height\" content=\"292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/journalists-org-develop.go-vip.co\/ethics\/topics\/confidential-sources\/\",\"url\":\"https:\/\/journalists-org-develop.go-vip.co\/ethics\/topics\/confidential-sources\/\",\"name\":\"Confidential sources - ONA Ethics\",\"isPartOf\":{\"@id\":\"https:\/\/journalists-org-develop.go-vip.co\/ethics\/#website\"},\"datePublished\":\"2015-06-21T20:57:08+00:00\",\"dateModified\":\"2016-05-26T21:14:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/journalists-org-develop.go-vip.co\/ethics\/topics\/confidential-sources\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/journalists-org-develop.go-vip.co\/ethics\/topics\/confidential-sources\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/journalists-org-develop.go-vip.co\/ethics\/topics\/confidential-sources\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/journalists-org-develop.go-vip.co\/ethics\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Topics\",\"item\":\"https:\/\/journalists-org-develop.go-vip.co\/ethics\/topics\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Confidential sources\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/journalists-org-develop.go-vip.co\/ethics\/#website\",\"url\":\"https:\/\/journalists-org-develop.go-vip.co\/ethics\/\",\"name\":\"ONA Ethics\",\"description\":\"ONA Build Your Own Ethics Code\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/journalists-org-develop.go-vip.co\/ethics\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Confidential sources - ONA Ethics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/topics\/confidential-sources\/","og_locale":"en_US","og_type":"article","og_title":"Confidential sources - ONA Ethics","og_description":"What does an \u201canonymous source\u201d mean? On what basis should we grant confidentiality to a source? What understandings should you have when granting confidentiality? What if a spokesperson doesn\u2019t want to be identified? Should you take part in background briefings? How can you protect confidentiality if you or the source might be subject to electronic [&hellip;]","og_url":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/topics\/confidential-sources\/","og_site_name":"ONA Ethics","article_modified_time":"2016-05-26T21:14:59+00:00","og_image":[{"url":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/wp-content\/uploads\/sites\/5\/2015\/09\/ethics-facebook.jpg?w=560","width":560,"height":292,"type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/topics\/confidential-sources\/","url":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/topics\/confidential-sources\/","name":"Confidential sources - ONA Ethics","isPartOf":{"@id":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/#website"},"datePublished":"2015-06-21T20:57:08+00:00","dateModified":"2016-05-26T21:14:59+00:00","breadcrumb":{"@id":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/topics\/confidential-sources\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/journalists-org-develop.go-vip.co\/ethics\/topics\/confidential-sources\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/topics\/confidential-sources\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/"},{"@type":"ListItem","position":2,"name":"Topics","item":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/topics\/"},{"@type":"ListItem","position":3,"name":"Confidential sources"}]},{"@type":"WebSite","@id":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/#website","url":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/","name":"ONA Ethics","description":"ONA Build Your Own Ethics Code","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_shortlink":"https:\/\/wp.me\/Pd5Q1n-3X","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/wp-json\/wp\/v2\/pages\/245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/wp-json\/wp\/v2\/users\/82"}],"replies":[{"embeddable":true,"href":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/wp-json\/wp\/v2\/comments?post=245"}],"version-history":[{"count":3,"href":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/wp-json\/wp\/v2\/pages\/245\/revisions"}],"predecessor-version":[{"id":682,"href":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/wp-json\/wp\/v2\/pages\/245\/revisions\/682"}],"up":[{"embeddable":true,"href":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/wp-json\/wp\/v2\/pages\/25"}],"wp:attachment":[{"href":"https:\/\/journalists-org-develop.go-vip.co\/ethics\/wp-json\/wp\/v2\/media?parent=245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}