Tagged in “Identify Abuse”

10 articles
  • Report a compromised account

    Identify Abuse

    We take the responsibility of protecting our members, their accounts and their data on our services seriously. Sometimes accounts can be compromised by bad actors who wrongfully gain access to member accounts and data. If this happens to your…

  • Report harassment or a safety concern

    Identify Abuse

    If you see something on LinkedIn that looks suspicious, appears to be misinformation, is offensive, or makes you uncomfortable, we encourage you to report it. Once reported, the content and/or account will go through our review processes and we’ll…

  • No access to mobile device for two-factor authentication

    Account Access and Identify Abuse

    If you have two-factor authentication enabled but cannot access the mobile device associated with your account, please follow the steps below to turn off two-authentication. If you can access your account using a device that you are currently logged…

  • Report inappropriate or offensive updates in your LinkedIn Feed

    Identify Abuse

    We appreciate your help in keeping inappropriate or offensive content off LinkedIn. We suspend and remove content that violates our User Agreement. Updates from other members in your feed can be flagged as inappropriate from the desktop or your…

  • Report fake profiles

    Identify Abuse

    If you feel that a profile may be fake or that it is inappropriate, you can report it. A profile may be fake if it appears empty or if it contains profanity, fake names, or impersonates public figures. Click the More button or the  More…

  • LinkedIn's User Agreement

    Your Profile, Identify Abuse, and Draft Posts for Pages

    You can find a link to our User Agreement at the bottom of your profile page. The user agreement covers your rights and obligations in accessing and using LinkedIn products and services. If you are a California resident, you may contact the…

  • Manage phishing emails for Corporate Billing

    Invoice and Billing Details, Identify Abuse, and Corporate Billing

    Bad actors may use a practice called phishing to try to obtain your sensitive data such as usernames, passwords, and credit card or bank information. These bad actors impersonate legitimate companies or people, sending emails and links that attempt…

  • LinkedIn's Copyright Policy

    Identify Abuse

    Pursuant to the Digital Millennium Copyright Act (17 U.S.C. § 512), LinkedIn has implemented procedures for receiving written notification of claimed infringements. If you believe in good faith that your copyright has been infringed, you may…

  • Phishing emails

    Identify Abuse

    Fraudsters may use a practice called phishing to try to obtain your sensitive data such as usernames, passwords, and credit card information. These fraudsters impersonate legitimate companies or people, sending emails and links that attempt to…

  • Notices regarding content posted on the LinkedIn website

    Identify Abuse and Professional Identity

    LinkedIn respects the rights of others and desires to offer a platform which contains no content that violates those rights. Our User Agreement requires that information posted by members be accurate, lawful and not in violation of the rights of…