Building an Antisemitism Response Protocol

9 min

← Back to Institutional Response

An effective institutional response to antisemitism requires pre-established protocols. Developing these during a crisis is too late. Institutions should build response capacity before incidents occur.

Protocol Components

1. Reporting Mechanism

Establish a clear, accessible mechanism for reporting antisemitic incidents: - Multiple reporting channels (online form, email, in-person, phone) - Option for anonymous reporting - Clear communication about what happens after a report is filed - Designated intake personnel trained in antisemitism recognition

2. Initial Assessment

Within 24-48 hours of receiving a report: - Acknowledge receipt to the reporter - Preserve all available evidence - Conduct preliminary assessment of severity - Determine immediate safety measures if needed - Assign a case handler

3. Classification

Apply a structured classification framework: - Is the incident antisemitic? (Apply IHRA, JDA, and contextual analysis) - What is the severity? (Use a tier system like HateCheck's 1-5 scale) - What institutional policies were violated? - Does the incident potentially meet criminal thresholds?

4. Response Actions

Response should be proportionate to severity:

Tier 1-2 (Ambiguous/Borderline): Education and dialogue. Meet with the person responsible. Provide information about why the behavior was problematic. Document the conversation.

Tier 3 (Clear antisemitism, non-criminal): Formal institutional action. Written warning, mandatory training, restricted access to facilities or platforms, public statement by leadership.

Tier 4 (Potentially criminal): All Tier 3 actions plus referral to law enforcement. Coordinate with legal counsel on institutional obligations.

Tier 5 (Urgent/violent): Immediate security response. Law enforcement engagement. Victim protection measures. Crisis communication.

5. Support for Affected Individuals

  • Offer support services to those targeted
  • Provide regular updates on the investigation and response
  • Respect privacy while maintaining transparency about actions taken
  • Follow up after initial response to assess ongoing safety

6. Documentation and Review

  • Document every report and response action
  • Conduct periodic reviews of response effectiveness
  • Publish anonymized aggregate data on incidents and responses
  • Use data to identify patterns and inform prevention strategies

Training Requirements

Protocol documents are useless without trained personnel. Key training needs: - Antisemitism recognition (what it looks like, including coded forms) - Reporting procedures and evidence handling - Classification frameworks and their application - Communication skills for sensitive conversations - Legal obligations and boundaries