FAQ Plattform

How can we help you?

The warning messages that have been received since the last login and/or those warning messages that have not yet been accessed by the user are displayed here.

Status updates give a quick overview of the latest updates on open cases but also on data leaks, which may be relevant according to the user profile.

The ring around the profile picture turns red if there is at least one critical message among the warning messages, which has not yet been actively accessed by the user.

We differentiate between a yellow marker, which indicates that the message may be relevant and red, which indicates that a warning message is critical and should therefore be checked as soon as possible. A grey marker shows that the message has already been reported to our team as an issue.

Ideally, all messages that have arrived in the interim should be viewed once. To do this, simply click on “Warning Messages” on the left of the navigation bar and work through the list once. Clicking on “Details” calls up the details of the corresponding warning message and the buttons below offer the choice to “Delete”, “Ignore” or “Issue Warning”.

Warning message response options depend on the area in which the alert has been received. As a rule, “Delete” (warning not relevant), “Ignore” (keep warning) and “Issue Warning” (request to delete comment) are the available options to choose from.

Automatic monitoring is available for Twitter and your identity online.

Automatic monitoring functions exclusively with user profiles. These user profiles can either be an account on a social media platform or a combination of a name and additional keywords. Phishing and shopping are not based on user profiles and should therefore be checked according to the situation.

An online identity is nothing more than all mentions of a combination of first name and surname on publicly accessible pages on the internet. This can be in the context of a comment on a news page or as a caption under a photo.

For the automatic monitoring of your Twitter account, the login data used for logging into Twitter is required. Providing your login data allows us to access your Twitter timeline and any mentions of your Twitter handle, which then enables us to search for negative mentions.

We work with a comprehensive offensive word database in German, French, Italian and English. When we find a mention of a client’s name, we compare the words contained in the comment with this database and therefore determine whether the comment is hateful or not.

Up to 5 email addresses can be added per profile.

If further keywords are not added, we are unable to narrow down the search further. This isn’t a problem but can lead to a client receiving warning messages that do not concern them if they have a common first /last name combination.

Entering keywords for exclusion isn’t absolutely necessary. But if, for example, you know that there is a famous actor with the same first/last name combination, it is recommended to exclude “actor” so that you don’t receive all notifications concerning this actor.

Whatsapp is a private chat app, which means that data sent back and forth between users is only visible for participants of the chat. As a result, automatic monitoring isn’t possible.

Based on the provided data, we search the internet or the added platforms such as Twitter for negative comments that can be associated with our client. If we find such negative comments, we inform the client immediately.

Automatic monitoring can be extended by clicking on “Automatic Monitoring” and then on “Extend Automatic Monitoring”.

Only one Twitter account can be added per profile.

Online Identity is understood as all mentions connected with a person’s own name, which can be found on all freely accessible pages of the internet. These can be mentions in online articles, in comment fields or captions.

No, only freely accessible internet sites are monitored. Platforms such as Instagram and TikTok cannot be accessed without an account and cannot therefore be monitored by us.

The connection between a Twitter account and Silenccio’s monitoring is only possible when all data has been entered correctly. Therefore, there doesn’t need to be an option for editing here.

No problem at all. To delete the duplicate address added, simply click on the “Remove” button and the address will no longer be monitored. In any case, it is advisable not to add email addresses twice as otherwise any warning messages will also be sent twice.

In this case, the already saved email address can simply be deleted and then re-entered.

We send a warning message to the email saved in the user profile so that you immediately know that you have new warning messages. The email contains a direct link to the page displaying your warnings. One click on the corresponding link and you’ll have an overview of all warnings and can decide for yourself how to proceed.

We use the case number in our communication with the client. We always refer to the relevant case number in any correspondence.

Once uploaded, the document can no longer be displayed on the platform due to data protection reasons. Either identify the respective document based on its file name or contact xxx@silenccio.com. Our team can then resend you the relevant document.

The deductible is due when a reported case becomes an insurance case. As with any insurance, the client bears part of the financial expense themselves, the rest is then covered by the insurance company.

Clicking on “Close Case” means that the case is closed and we won’t take any further steps. This is usually happens when our team has managed to find a solution or if you as client do not wish to go through the insurance process.

If you accidentally clicked on “Close Case”, please contact suppport@silenccio.com, stating the case number. Our team can then reopen the case manually.

We only display the 4 latest warning messages on the dashboard. To access all warning messages, either go to “View All” or click on “Warning Messages” on the left of the menu.

“Critical” means that we have found something that you should view and respond accordingly to. The classification “critical” is used when your email address has been found in a data leak or when we have found a negative mention in connection with your social media/online identity.

A data leak is theft of data by unauthorised third parties. Usually, it’s platforms with a large number of users that are affected. In general, alongside email addresses, data such as passwords, date of birth, geographic data and other details are stolen and then offered for sale as a data set.

You can change the language either by clicking on the language short cut, top right, or by clicking on “User Profile” on the left navigation bar. Both clicks lead to the user profile. You can make the change you want under “Language”.

We maintain an extensive database based on real customer experiences, which provides an indicator of whether or not an online shop can be ordered from with confidence. There are two defining categories: we advise against ordering from shops with a high number of negative experiences. Shops where, for example, there are hidden additional order costs, are categorised with “Order with caution”.

Unfortunately, this does happen again and again as there is always a first time for a customer to have a negative experience. In such a case, the issue with the order can be reported to our team via “Report Problem”. We will then look into it. At the same time, we check whether the shop should be classified as “not trustworthy” in our database.

For an initial assessment, we require the sender, the subject line or the link to which the phishing email refers.

In this case, it is essential to save the address of the website and, ideally, take a screenshot of the entire page. Then simply click on “Report Problem” and report the potential problem to our team. Upon sending, we will directly provide initial assistance for any immediate action needed.