Bulletin Board - Review and Comment
Step 1 of 4: Comment on Document
How to make a comment?
1. Use this to open a comment box for your chosen Section, Part, Heading or clause.
2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will receive a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.
-
DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments, take a note of where you up to and return later to make a further submission.
-
DO NOT exit from the interface until you have completed all three stages of the submission process.
-
If you would like a copy of the comments you made via the Bulletin Board, please email policy@rmit.edu.au and specify which document you provided feedback on and a copy of your submission will be emailed to you.
(1) This Schedule supports the understanding and operationalisation of the Gender-Based Harm Prevention and Response Policy and Gender Based Harm Response Procedures. (2) Authority for this document is established by the Gender-Based Harm Prevention and Response Policy. (3) Gender-based harm is defined as any form of physical or non-physical harm, violence or abuse by a person that is underpinned by gender-based power inequalities, rigid gender norms or gender-based discrimination. The harm may be actual harm or violence, or a threat to harm or use violence against a person based on actual or perceived sex, gender, sexual orientation, gender identity or expression or other such sex or gender related characteristics. (4) Gender-based harm results in, or is likely to result in, coercion, control, fear or deprivation of liberty and autonomy. Harm can be physical, sexual, emotional, psychological, social, cultural, spiritual, financial and online and technology-facilitated harm (including image-based abuse), and stalking. (5) Gender-based harm disproportionally impacts women, children and young people, and LGBTIQ+ communities. All gender-based harm, regardless of who uses it and who experiences it, is unacceptable. (6) An intersectional approach acknowledges that people can experience systemic discrimination due to more than one aspect of their identity - sexual orientation and identity, gender and gender identity, race, economic status, immigration status, national origin, and ability, among other aspects of one’s identity. These forms of systemic discrimination intersect with each other and present unique challenges for affected individuals and communities. An intersectional approach to gender-based harm includes a consideration of where gender intersects with other inequalities or oppressions to produce unique experiences of violence. (7) An intersectional approach to supporting victim-survivors of gender-based harm recognises: (8) Consent means free agreement, given voluntarily and on an informed basis. Circumstances in which a person does not consent to an act include, but are not limited to, the following: (9) Clear and unambiguous agreement must be expressed outwardly through mutually understandable words or actions. Consent must be voluntarily given. (10) Consent to engage in one sexual activity or past agreement to engage in a particular sexual activity cannot be presumed to constitute consent to engage in a different sexual activity or to repeat a sexual activity. Just because person (B) has done something previously with person (A), or even with another person, it does not mean that person (B) is always regarded as having consented to that activity. (11) It is not enough to presume consent if a person didn’t protest or physically resist. It is not enough to presume consent if the person did not sustain physical injury. (12) It is important to understand that: (13) Sexual harm is non-consensual behaviour of a sexual nature that causes a person to feel uncomfortable, frightened, distressed, intimidated, or harmed either physically or psychologically. Sexual harm includes behaviour that also constitutes sexual harassment and sexual assault. (14) Sexual harm occurs when there is no freely given agreement, or when someone is being coerced or manipulated into any unwanted sexual activity, or when someone does not have the capacity to give or withdraw consent. (15) Sexual harm can impact anyone regardless of their sex, gender identity or sexual orientation. Sexual harm does not have to be repeated or continuous; it can be a one-off incident. (16) Examples of behaviours which constitute sexual harm include (but are not limited to): (17) Sexual harm is not consensual sexual interaction, flirtation, attraction or friendship which is invited, mutual, or reciprocated, but it can occur if a person continues with the relevant behaviour after being put on notice that the behaviour is no longer agreed to or welcome. (18) Sexual harassment is when a person: (19) The circumstances to be considered include, but are not limited to, the following: (20) ‘Conduct of a sexual nature’ includes making a statement or a physical gesture of a sexual nature to a person or in the presence of a person. It can be physical, verbal or written. (21) Sexual harassment can take various forms. It can be subtle and implicit, rather than explicit. Sexual harassment can include: (22) Sexual harassment does not need to be repeated, or continuous; it can be a one-off incident. (23) A person might say they “were only joking” but jokes can still be insulting, threatening, humiliating or unwelcome, and can still be sexual harassment. (24) RMIT acknowledges the significant harm or distress that can occur when threats to distribute intimate images are made, and where such images are actually distributed (e.g. sexting, or revenge porn in the context of relationship breakdown). As such, RMIT’s definition of sexual harassment includes the situation where: (25) Sexual harassment also occurs where a person threatens to send an intimate image of another person. (26) For the purposes of RMIT’s Gender-Based Harm Prevention and Response Policy, RMIT defines Sexual assault as: (27) For the purposes of the Gender-based Harm Prevention and Response Policy suite, RMIT also includes those acts which would constitute the following within the definition of sexual assault under the Crimes Act 1958 (Vic), even though, for succinctness the specific elements of each are not set out separately in the definitions contained in the Gender-Based Harm Prevention and Response Policy: (28) Sexual assault occurs when a person is forced, compelled, coerced or tricked into sexual acts against their will or without their consent, including when they have withdrawn consent. This includes rape, sexual penetration and/or sexual touching. (29) Touching could be with any part of the body or with anything else, and may be sexual due to: (30) The following are examples of sexual assault: (31) Technology-facilitated harm (and/or violence) is any harmful act that is committed, assisted, aggravated, or amplified by the use of digital tools or information communication technologies. These acts can result in or have the potential to cause, physical, sexual, psychological, social, political, or economic harm, as well as infringe on rights and freedoms. This harm can occur in online spaces, and it can be perpetrated offline through the use of technological means, such as controlling a person’s whereabouts by using a GPS tracker. (32) Technology-facilitated gender-based harm not only intensifies existing forms and patterns of violence against women, such as intimate-partner violence, but also introduces new forms of violence such as online stalking and image-based abuse through artificial intelligence like deepfake videos. (33) While all women and girls who are online or who use digital tools may face violence online, some groups are at greater risk. These include women who are most visible online, including women in public life, journalists, human rights defenders, politicians, young women and girls and feminist activists. (34) Technology-facilitated harm and/or violence can include the following:Gender-Based Harm Prevention and Response Policy - Schedule 1 - Explanations and Examples
Section 1 - Purpose
Section 2 - Authority
Section 3 - Resource
What is Gender-Based Harm?
What is an Intersectional Approach?
What is Consent?
What is Sexual Harm?
What is Sexual Harassment?
What is Sexual Assault?
Online or Technology-facilitated Harm