Filing A Report

Filing A Report

Idea
Reporting A User
  1. In order to report a user, travel to the user's page and/or click on the their name if in a chat.


      2.  Next, once on the user's page, click on the three dots located by message.


      3.  From there, you can now click on Report User.
      4.  Finally, an administrator from BIMeta will see the report and evaluate if the report is in line with the BIMeta Corporation policies


Idea
Reporting A Post
  1. Tap on the down arrow in the post column.
  2. Select Report Post from the menu that appears
  3. Once reported, you will have the option to Un-report the post.
  4. Finally, once reported the BIMeta Admin will be prompted to take necessary action in the event the post is in violation with our rules and policies.



    • Related Articles

    • What Happens After I File A Report?

      What Happens Next? Once you have submitted a report, you will be given the option to block the account you reported for your own peace of mind. Additionally, we will send you a confirmation email acknowledging the receipt of your report. Please check ...
    • Moderation And Reporting

      At BIMeta, we strive to maintain a positive and respectful community for architects, engineers, and construction professionals. We rely on the active participation of our users to help us moderate the platform and ensure compliance with our ...
    • Safety And Privacy Contributions

      At BIMeta, we prioritize the safety and privacy of our users while fostering a collaborative environment for architects, engineers, and construction professionals. We expect all users to contribute responsibly and uphold the highest standards of ...
    • BIMeta Community Guidelines

      Welcome to the BIMeta community! Our platform aims to bring together architects and engineers from around the world to collaborate, share knowledge, and inspire innovation. To obtain further details, kindly click on the respective policy of your ...
    • Security Processes

      In our platform, we have multiple layers of encryption and technologies in place in order to help minimize and deter any misuse of our technologies. The following technologies include but are not limited to: Google AI Image Recognition - Used to ...