SlideShare une entreprise Scribd logo
1  sur  15
EuropeanEconomic and SocialCommittee TEN/390Impact of social networking sites TEN/343 Protecting children using  the Internet The Internet – safetyroadfor ourchildren Tomasz Czajkowski European Economic and Social Committee 1
TEN/343 appointed Ms Sharma as rapporteur-general at 445th plenary session,  held on 28 and 29 May 2008. Children are active users of online technologies, and increasingly so. But, beyond the benefits of interactivity and participation in the online environment, they also face some serious risks:  a. Direct harm, as victims of sexual abuse documented through photographs, films or audio files and distributed online (child abuse material). b. A perpetuation of victims' sexual abuse by the repeated viewing of the records of their abuse due to widespread online distribution and global availability. c. Direct contact by predators who will befriend them in order to commit sexual abuse ("grooming"). d. Victims of bullying in the online environment ("cyber-bullying"). 2
Further trends include: 1. The fast and dynamic evolution of new technological landscapes, increasingly shaped by the digital convergence, faster distribution channels, mobile internet, Web 2.0, Wi-Fi access and other new content formats and online technological services. 2. Recognition of the very young age of child victims and the extreme severity of the sexual abuse they are suffering. 3
3. Clarification of the scale of the problem as regards publicly available websites depicting the sexual abuse of children, that is, a concrete "manageable" target of around 3 000 websites per year hosted around the world facilitating access to many hundreds of thousands of child sexual abuse images. 4. Recent data regarding the regional hosting of child sexual abuse networks suggests the majority of this content is hosted in the US. 4
5. Recent data suggests that online child sexual abuse content regularly hops host company and host country in order to avoid detection and removal, thereby complicating law enforcement investigation at a solely national level. 6. Lack of international efforts by domain name registries to de-register domains advocating the sexual abuse of children or providing access to such content. 5
7. The remaining and potentially, widening "generation gap" between young people's use of online technologies and their perception of risks verses the adults' understanding of its use. 8. Public exposure to child sexual abuse material may be reduced by voluntary industry blocking of individual URLs by service providers. 9. The benefit of national recommendations regarding online tools, such as filtering products, search engine security preferences and the like. 6
We (policy and law-makers, industry, end-users and particularly parents, carers and educators)stillneed to concern for: protectinginternet users, particularly children, from exposure to illegal and "harmful" content and conduct online, and curbing the distribution of illegal content . 7
The EESC requests that the legislative harmonisation across Member States is implemented and enforced at National level and includes the following as minimum as set out in the Council of Europe Cybercrime Convention :   1. What constitutes child sexual abuse material. 2. That the age of a child for the purposes of the victims of child sexual abuse material is 18. 3. That the possession and viewing/downloading of online child sexual abuse material is an offence and warrants severe custodial penalties. 8
Although certain Europe-wide standards have been established, clarifying legal issues through various recommendations and directives, it should be established whether this data has been converted into practice throughout member states. 9
10 The EU has been a forerunner in the protection of children online since1996, and the successive Safer Internet programmes (Safer Internet Action Plan 1999 – 2004, Safer Internet plus 2004–2008) have been major features in this field. The Commission adopted a Communication on the implementation of the Safer Internet plus programme in 2005-2006.
11 The objective of the new programme will be to promote safer use of the Internet and other communication technologies, particularly for children, and to fight against illegal content and illegal and "harmful" conduct online facilitating cooperation, exchange of experiences and best practice at all levels on issues relating to child safety online, thus ensuring European added value.
The programme will have four actions encouraging international cooperation as an integral part of each of them:   1. reducing illegal content and tackling harmful conducts online,  2. promoting a safer online environment,  3. ensuring public awareness,  4. establishing a knowledge base.  12
However the EESC would ask for definitions and legal clarifications in respect of the words "harmful" and "conduct", particularly considering transposition into national law. Further clarification is also required on the role of Hotlines, which do not investigate suspects and do not have the necessary powers to do so. 13
14 Finally the Committee requests the Commission to stress the importance and impact of: 1. Adoption throughout member states of the "notice and take-down" by Hotlines and the internet industry of child sexual abuse content. 2. Wider adoption of the initiative to protect internet users by blocking access to child sexual abuse URLs. 3. International effort by domain name registries and relevant authorities to de-register domains associated with child sexual abuse.
Thankyou for yourattention. Tomasz Czajkowski European Economic and Social Committee 15

Contenu connexe

Tendances

Media Regulation Booklet (OCR Media Conference 2009)
Media Regulation Booklet (OCR Media Conference 2009)Media Regulation Booklet (OCR Media Conference 2009)
Media Regulation Booklet (OCR Media Conference 2009)rikhudson
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionThomas Müller
 
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms SectorThe Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms SectorEthical Sector
 
Children, mobile phones and safety
Children, mobile phones and safetyChildren, mobile phones and safety
Children, mobile phones and safetyThomas Müller
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Yury Chemerkin
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentationsvito
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCandice Tang
 
Pal gov.tutorial6.session9.cybercrime
Pal gov.tutorial6.session9.cybercrimePal gov.tutorial6.session9.cybercrime
Pal gov.tutorial6.session9.cybercrimeMustafa Jarrar
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberIGF Indonesia
 
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima NormsBGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima NormsAllan Cytryn
 
How enforcement works the role of judicial culture and education
How enforcement works the role of judicial culture and educationHow enforcement works the role of judicial culture and education
How enforcement works the role of judicial culture and educationSusan Isiko
 
Final reportandrecommendationsfromglastonburys5g advisorycommitteeprint
Final reportandrecommendationsfromglastonburys5g advisorycommitteeprintFinal reportandrecommendationsfromglastonburys5g advisorycommitteeprint
Final reportandrecommendationsfromglastonburys5g advisorycommitteeprintBabelNews
 
Korpisaari how to combat hate speech without sacrificing freedom of speech?
Korpisaari how to combat hate speech without sacrificing freedom of speech?Korpisaari how to combat hate speech without sacrificing freedom of speech?
Korpisaari how to combat hate speech without sacrificing freedom of speech?Päivi Korpisaari
 
IB 46 Surya Kiran Sharma
IB 46 Surya Kiran SharmaIB 46 Surya Kiran Sharma
IB 46 Surya Kiran SharmaSurya Sharma
 

Tendances (20)

Cyber security issue part b
Cyber security issue  part b Cyber security issue  part b
Cyber security issue part b
 
Media Regulation Booklet (OCR Media Conference 2009)
Media Regulation Booklet (OCR Media Conference 2009)Media Regulation Booklet (OCR Media Conference 2009)
Media Regulation Booklet (OCR Media Conference 2009)
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
 
Pat manson
Pat mansonPat manson
Pat manson
 
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms SectorThe Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
 
Children, mobile phones and safety
Children, mobile phones and safetyChildren, mobile phones and safety
Children, mobile phones and safety
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentation
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
 
Pal gov.tutorial6.session9.cybercrime
Pal gov.tutorial6.session9.cybercrimePal gov.tutorial6.session9.cybercrime
Pal gov.tutorial6.session9.cybercrime
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
 
Internet
InternetInternet
Internet
 
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima NormsBGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
 
Digitisation, democracy and the regulation of personal data use for political...
Digitisation, democracy and the regulation of personal data use for political...Digitisation, democracy and the regulation of personal data use for political...
Digitisation, democracy and the regulation of personal data use for political...
 
How enforcement works the role of judicial culture and education
How enforcement works the role of judicial culture and educationHow enforcement works the role of judicial culture and education
How enforcement works the role of judicial culture and education
 
Final reportandrecommendationsfromglastonburys5g advisorycommitteeprint
Final reportandrecommendationsfromglastonburys5g advisorycommitteeprintFinal reportandrecommendationsfromglastonburys5g advisorycommitteeprint
Final reportandrecommendationsfromglastonburys5g advisorycommitteeprint
 
Korpisaari how to combat hate speech without sacrificing freedom of speech?
Korpisaari how to combat hate speech without sacrificing freedom of speech?Korpisaari how to combat hate speech without sacrificing freedom of speech?
Korpisaari how to combat hate speech without sacrificing freedom of speech?
 
IB 46 Surya Kiran Sharma
IB 46 Surya Kiran SharmaIB 46 Surya Kiran Sharma
IB 46 Surya Kiran Sharma
 

Similaire à Tomasz Czajkowski

UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionKrishna De
 
ITU review of Child Online Protection activities in Central + South Eastern E...
ITU review of Child Online Protection activities in Central + South Eastern E...ITU review of Child Online Protection activities in Central + South Eastern E...
ITU review of Child Online Protection activities in Central + South Eastern E...ITU
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Daniel Asher
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Daniel Asher
 
Guia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefGuia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefFAIR PLAY AD / @VeronicaRRSouza
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...sabrangsabrang
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachNzeih Chukwuemeka
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsGener Luis Morada
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatRaudhat-Rahma Shittu-Agbetola
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)GrittyCC
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...Vishni Ganepola
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfVincent Mwando
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1MohsinMughal28
 
Projektfuzet angol-web
Projektfuzet angol-webProjektfuzet angol-web
Projektfuzet angol-webOmbodi Gábor
 
Microsoft contribution to combating sexual abuse of children on the Internet
Microsoft contribution to combating sexual abuse of children on the InternetMicrosoft contribution to combating sexual abuse of children on the Internet
Microsoft contribution to combating sexual abuse of children on the InternetMicrosoft Eesti
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 

Similaire à Tomasz Czajkowski (20)

UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child Protection
 
CTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste YankeyCTO Cybersecurity Forum 2013 Auguste Yankey
CTO Cybersecurity Forum 2013 Auguste Yankey
 
ITU review of Child Online Protection activities in Central + South Eastern E...
ITU review of Child Online Protection activities in Central + South Eastern E...ITU review of Child Online Protection activities in Central + South Eastern E...
ITU review of Child Online Protection activities in Central + South Eastern E...
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)
 
Guia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefGuia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / Unicef
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social Controls
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhat
 
International Cybercrime (Part 1)
International Cybercrime (Part 1)International Cybercrime (Part 1)
International Cybercrime (Part 1)
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdf
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 
Projektfuzet angol-web
Projektfuzet angol-webProjektfuzet angol-web
Projektfuzet angol-web
 
Disrupting harm — Project brief
Disrupting harm — Project briefDisrupting harm — Project brief
Disrupting harm — Project brief
 
Microsoft contribution to combating sexual abuse of children on the Internet
Microsoft contribution to combating sexual abuse of children on the InternetMicrosoft contribution to combating sexual abuse of children on the Internet
Microsoft contribution to combating sexual abuse of children on the Internet
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 

Plus de segughana

CTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-KattaniCTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-Kattanisegughana
 
CTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-ReportCTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-Reportsegughana
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Borensegughana
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhousesegughana
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Wardsegughana
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johansonsegughana
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victorsegughana
 
CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des WardCTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Wardsegughana
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwesegughana
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John CrainCTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crainsegughana
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundusegughana
 
CTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe TorresCTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe Torressegughana
 
CTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will GardnerCTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will Gardnersegughana
 
CTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-OramCTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-Oramsegughana
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamssegughana
 
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-MachdonoghCTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-Machdonoghsegughana
 

Plus de segughana (20)

CTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-KattaniCTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-Kattani
 
CTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-ReportCTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-Report
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Boren
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Ward
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victor
 
CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des WardCTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Ward
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwe
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John CrainCTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crain
 
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael KatunduCTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundu
 
CTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe TorresCTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe Torres
 
CTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will GardnerCTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will Gardner
 
CTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-OramCTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-Oram
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliams
 
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-MachdonoghCTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
 

Tomasz Czajkowski

  • 1. EuropeanEconomic and SocialCommittee TEN/390Impact of social networking sites TEN/343 Protecting children using the Internet The Internet – safetyroadfor ourchildren Tomasz Czajkowski European Economic and Social Committee 1
  • 2. TEN/343 appointed Ms Sharma as rapporteur-general at 445th plenary session, held on 28 and 29 May 2008. Children are active users of online technologies, and increasingly so. But, beyond the benefits of interactivity and participation in the online environment, they also face some serious risks: a. Direct harm, as victims of sexual abuse documented through photographs, films or audio files and distributed online (child abuse material). b. A perpetuation of victims' sexual abuse by the repeated viewing of the records of their abuse due to widespread online distribution and global availability. c. Direct contact by predators who will befriend them in order to commit sexual abuse ("grooming"). d. Victims of bullying in the online environment ("cyber-bullying"). 2
  • 3. Further trends include: 1. The fast and dynamic evolution of new technological landscapes, increasingly shaped by the digital convergence, faster distribution channels, mobile internet, Web 2.0, Wi-Fi access and other new content formats and online technological services. 2. Recognition of the very young age of child victims and the extreme severity of the sexual abuse they are suffering. 3
  • 4. 3. Clarification of the scale of the problem as regards publicly available websites depicting the sexual abuse of children, that is, a concrete "manageable" target of around 3 000 websites per year hosted around the world facilitating access to many hundreds of thousands of child sexual abuse images. 4. Recent data regarding the regional hosting of child sexual abuse networks suggests the majority of this content is hosted in the US. 4
  • 5. 5. Recent data suggests that online child sexual abuse content regularly hops host company and host country in order to avoid detection and removal, thereby complicating law enforcement investigation at a solely national level. 6. Lack of international efforts by domain name registries to de-register domains advocating the sexual abuse of children or providing access to such content. 5
  • 6. 7. The remaining and potentially, widening "generation gap" between young people's use of online technologies and their perception of risks verses the adults' understanding of its use. 8. Public exposure to child sexual abuse material may be reduced by voluntary industry blocking of individual URLs by service providers. 9. The benefit of national recommendations regarding online tools, such as filtering products, search engine security preferences and the like. 6
  • 7. We (policy and law-makers, industry, end-users and particularly parents, carers and educators)stillneed to concern for: protectinginternet users, particularly children, from exposure to illegal and "harmful" content and conduct online, and curbing the distribution of illegal content . 7
  • 8. The EESC requests that the legislative harmonisation across Member States is implemented and enforced at National level and includes the following as minimum as set out in the Council of Europe Cybercrime Convention :   1. What constitutes child sexual abuse material. 2. That the age of a child for the purposes of the victims of child sexual abuse material is 18. 3. That the possession and viewing/downloading of online child sexual abuse material is an offence and warrants severe custodial penalties. 8
  • 9. Although certain Europe-wide standards have been established, clarifying legal issues through various recommendations and directives, it should be established whether this data has been converted into practice throughout member states. 9
  • 10. 10 The EU has been a forerunner in the protection of children online since1996, and the successive Safer Internet programmes (Safer Internet Action Plan 1999 – 2004, Safer Internet plus 2004–2008) have been major features in this field. The Commission adopted a Communication on the implementation of the Safer Internet plus programme in 2005-2006.
  • 11. 11 The objective of the new programme will be to promote safer use of the Internet and other communication technologies, particularly for children, and to fight against illegal content and illegal and "harmful" conduct online facilitating cooperation, exchange of experiences and best practice at all levels on issues relating to child safety online, thus ensuring European added value.
  • 12. The programme will have four actions encouraging international cooperation as an integral part of each of them:   1. reducing illegal content and tackling harmful conducts online, 2. promoting a safer online environment, 3. ensuring public awareness, 4. establishing a knowledge base. 12
  • 13. However the EESC would ask for definitions and legal clarifications in respect of the words "harmful" and "conduct", particularly considering transposition into national law. Further clarification is also required on the role of Hotlines, which do not investigate suspects and do not have the necessary powers to do so. 13
  • 14. 14 Finally the Committee requests the Commission to stress the importance and impact of: 1. Adoption throughout member states of the "notice and take-down" by Hotlines and the internet industry of child sexual abuse content. 2. Wider adoption of the initiative to protect internet users by blocking access to child sexual abuse URLs. 3. International effort by domain name registries and relevant authorities to de-register domains associated with child sexual abuse.
  • 15. Thankyou for yourattention. Tomasz Czajkowski European Economic and Social Committee 15