Beruflich Dokumente
Kultur Dokumente
((( (((
for Industry on
Child Online
((( (((
Protection
www.itu.int/cop
Legal notice
This document may be updated from time to time.
Third-party sources are quoted as appropriate. The International Telecommunication Union (ITU) is not responsible for the content of external
sources including external websites referenced in this publication.
Neither ITU nor any person acting on its behalf is responsible for the use that might be made of the information contained in this publication.
Disclaimer
Mention of and references to specific countries, companies, products, initiatives or guidelines do not in any way imply that they are endorsed or
recommended by ITU, the authors, or any other organization that the authors are affiliated with, in preference to others of a similar nature that
are not mentioned.
Requests to reproduce extracts of this publication may be submitted to: jur@itu.int
© International Telecommunication Union (ITU), 2009
ACKNOWLEDGEMENTS
These Guidelines have been prepared by ITU and a team of contributing authors from leading institutions active in the ICT sector. These Guidelines would not
have been possible without the time, enthusiasm and dedication of its contributing authors.
ITU is grateful to all of the following authors, who have contributed their valuable time and insights: (listed in alphabetical order)
• Cristina Bueti and Marco Obiso (ITU)
• John Carr (Children’s Charities’ Coalition on Internet Safety)
• Natasha Jackson and Jenny Jones (GSMA)
• Nerisha Kajee and Rob.Borthwick (Vodafone)
• Giacomo Mazzone (EBU) based on documents provided by Marc Goodchild & Julian Coles (both from the BBC)
• Michael Moran (Interpol)
• Brian Munyao Longwe (AfrISPA)
• Lorenzo Pupillo and Rocco Mammoliti (Telecom Italia)
The authors wish to thank Kristin Kvigne (Interpol) for her detailed review and comments.
ITU wishes to acknowledge Salma Abbasi from eWWG for her valuable involvement in the Child Online Protection (COP) Initiative.
Additional information and materials relating to these Draft Guidelines can be found at: http://www.itu.int/cop/ and will be updated on a regular basis.
If you have any comments, or if you would like to provide any additional information, please contact Ms. Cristina Bueti at cop@itu.int
Table of Contents
Foreword
Executive Summary 1
Guidelines for Industry 2
Key areas for consideration by the Whole ICT industry
Key areas for consideration by Broadcasters
Key areas for consideration by Internet Service Providers
Key areas for consideration by Mobile Operators
1. Background 6
Collaborating as an Industry
5.Illegal Content 48
Terms and Conditions, User Guidelines
Notice and Take Down (NTD) processes
Case Study: Abuse Desk Service and Notice and Take-Down Approach - Telecom Italia 50
Hotline Organisations
Industry Collaboration
6. Other Issues 52
User Generated Content: The Broadcaster Approach
Case Study: How Broadcasters Can Protect Cchildren Against Inappropriate,
Non-in House Material: the Example of BBC 55
7. Conclusions 56
8. Further Information and Reading 58
Children and young people can benefit greatly from being online, but they also face increasing
dangers in cyberspace.
As a result, a global response is needed from all segments of society in order to address what has
become a global issue.
Dr Hamadoun I. Touré
Secretary-General of the International Telecommunication Union (ITU)
11. Service providers should consider making the ability to report a default presence on all web pages and
services offered by the ISPs by means of a “report abuse button” to the extent possible. A common,
recognisable button could be developed which will be always in the same location on every screen.
The reporting mechanism could be enhanced by offering technical solutions to the reporting user
such as the ability to attach screen shots, connection statistics, running process lists etc, as well as by
informing the user what information they need to include with any report to make it effective.
12. Service providers should consider emphasising, in accessible and easily understood language, ‘what
behaviour is and is not acceptable on the service’, particularly for young users and for their parents
and caregivers. It is suggested that this information should be provided in addition to its inclusion in
the Terms and Conditions.
13. Service providers should continue to evaluate the effectiveness of technologies that identify and
verify the age of customers. The goal should be to implement a suitable solution appropriate to
their individual service (this will be particularly important where the service in question is subject to
legal restrictions based on age), to the extent that the solution is legally and technically feasible, and
most importantly creates a safer, more secure Internet services. Such solutions might variously seek
to prevent under age access and exposure to age-inappropriate content or services, or work to keep
services provided exclusively for children adult-free. .
14. Service providers should consider proactively communicating with local or national law enforcement
agencies to report illegal child abuse at soon as the provider is aware of it. They should have
additional internal procedures in place within their organisation to ensure that they comply with their
responsibilities under local and / or international laws with regard to illegal content. They should also
consider actively assessing commercial content hosted on their own servers (either branded content
or content from contracted third party content providers) on a regular basis to the extent possible
in order to ensure that illegal or potentially harmful content is not accessible through their network.
Tools such as hash scanning and image recognition softwares are available to assist with this. .
Background
Today’s digital world has Moreover, as the number of
transformed individual lifestyles channels for service delivery
the world over. The computing diversifies, the sector’s traditional
industry has long been all-digital, and less traditional businesses face
the telecommunications industry a number of new dilemmas.
is almost fully digital and the
broadcasting sector is well on the
way to becoming digital. Always-
Collaborating as an
on Internet access has become the Industry
norm, with people spending more In the converging media world
and more time consuming digital of today traditional distinctions
media than any other medium. between different parts of
the telecommunications and
Daily lives from China to Italy
mobile phone industries,
are brimming with SMS, e-mail,
chats, online dating, multiplayer between Internet companies and
gaming, virtual worlds and digital broadcasters, are fast breaking
multimedia. down or becoming irrelevant.
Convergence is drawing these
Although these technologies hitherto disparate digital streams
mean added convenience and into a single current that is
enjoyment for many, regulators reaching out to billions of people
and users alike are often one step in all parts of the world.
behind the fast-paced innovations Against this background the
in this field. ITU, in collaboration with
Classifying Content
and Services
The notion that not all content With more traditional content
and services are suitable for (e.g. video clips) it is often
a universal audience is well- possible to apply an age-rating
understood in the “offline” by benchmarking standards
world – for example, films and against existing frameworks
games have age-ratings, and TV from equivalent national – or
programmes with content of potentially regional, depending
a violent or sexual nature are upon the degree to which
subject to time-based restrictions. social sensitivities are shared -
media, such as games or films.
Where online content is exactly However, the growing range
the same as the “offline” version of exciting interactive services
(e.g. a game or film which differs including message boards,
solely in terms of the access chat rooms, social networking
channel), it is possible to re-use and user generated content
existing ratings or classifications. services, whilst being harder
However, where content is new to “classify” in the traditional
or modified, online content and sense, can also pose potential
service providers have to find risks to younger users relating
methods of communicating not just to the consumption
the nature of that content and of age-inappropriate content,
the target age-range to their but also inappropriate conduct
customers. (e.g. bullying) and contact (e.g.
grooming).
All of these issues are dealt concerns about age-sensitive concern (such as strong language
within the sub-sections below. content through time-based or violence) rather than being
The Broadcasters sub-section scheduling – for instance, by presented with simple age ratings.
deals with the issue of making broadcasting content that is only
traditional content available suitable for older teenagers or Because of this, some
through a new medium, the adults later in the evening or at broadcasters have developed a
Internet Providers sub-section night (after the “watershed”), labelling system e.g. the BBC
looks at the content, contact when younger children will be developed the ‘G’ for Guidance
and conduct issues relating asleep. labelling system where a ‘G’ is
to managing non-traditional displayed when a piece of content
online services, and the Mobile However, as broadcasters contains challenging material
Operators sub-section provides increasingly make their content and the nature of the content
an overview of how operators available online on a non-linear is spelt out in text alongside
across the globe are approaching “on demand” basis, where direct the programme synopsis. The
the issue of classifying and parental supervision cannot presence of the ‘G’ is used to
managing mobile content and be relied upon and time-based trigger parental PIN control
services. scheduling no longer applies, systems, if enabled.
broadcasters have been exploring
ways to make their content
Broadcasters available in an age-appropriate
Television broadcasters have fashion. Note: unless otherwise stated, the term ‘broadcasters’ in this document refers
traditionally been able to use specifically to providers of traditional broadcast-type content, in the sense that the
‘broadcaster’ has creative and editorial control over the content made available, whether
the linear ‘broadcast’ nature of Research indicates that in general
‘on air’ or, as is the focus of this document, online. The term is not intended to include
television viewing to manage parents want to know about the providers of services which enable the publishing of content created by others – such
types of content that may cause organisations fall within the Internet Service Providers category.
increasing the value they 3. BBC Switch provides an Blast – creative development Content Information Group.
receive, the ownership online space for all teenagers, for teenagers, currently focused The BBC is also an associate
they feel, and the impact with content aimed at engaging on creative arts, including member of the Association
they have on CBeebies young people, addressing their partnership with youth arts for Television on Demand
and CBBC. To achieve interests, and encouraging organisations (www.bbc.co.uk/ (ATVOD), the self-regulatory
this, the sites offer a range interaction. The site contains blast) body for On Demand services.
of innovative interactive both supporting TV and radio
tools and creative programmes and free-standing Some services are designed for
opportunities aimed at all content. (www.bbc.co.uk/switch) use in the classroom; others are
British children, of every increasingly used directly by
ability and background, 4. BBC Learning provides learners at home or at school,
giving them the space to output for school-aged children without the need for tutor
publish their own content, across a broad range of subjects mediation.
thoughts and opinions. We and skills. The following are
also provide a dedicated linked to curriculum or specific The BBC works closely with
24/7 news service for skills. Ofcom (the UK’s media and
children online as part of telecommunications regulator)
Newsround and through Bitesize – revision and recap and a number of broadcasters
the PressPack section we service for all major subjects for and platform providers to
can actively engage children children aged 5-16 (www.bbc. promote best practice on
in the topical issues that co.uk/schools/ks3bitesize) labeling; the BBC has also been
matter to them. an active participant in the BSG
Internet Service information such as where in complex and extensive one-to-many and many-to-many
they live, interests and tastes ‘game worlds’ and where they bases. This clearly increases
Providers (for example in music, films can interact and talk to each concerns about unwanted
Generally Internet content or books) as well as photos or other during play. contact and, in some cases, illegal
and Web 2.0 services are terms videos, music tracks and links conduct. Making the distinction
to friends’ profiles. They may Frequently, these categories
referring to the increasing use between contact and conduct
also include facilities for chat, overlap and these networking sites
of the Internet by individuals is useful in order to understand
file sharing, blogging and are increasingly being seen as part
to create and distribute their of youth culture, as reported in differences, overlapping and
own content, in audio-visual as discussion groups. possible countermeasures. The
the complete and independent
well as in written form. Specific l Online communities UK review looking at the risks to key distinction is that: ‘contact’
examples of Web 2.0 services and social worlds where children on the Internet and in refers to a situation in which
include: participants select, customise video games. the child is the receiver of the
or create characters, called communication/message (the
l User generated content It can be useful to make
‘avatars’. Their avatars ‘victim’); whereas ‘conduct’ refers
sites such as wikis, blogs and distinctions between potential
can build houses, furnish to a situation where the child is
image-sharing sites, which risks based on “content”,
environments, interact with the instigator of the inappropriate
are designed specifically for “contact” and “conduct”,
others and even exchange behaviour (the ‘perpetrator’)3.
users to upload, share or view according to a structure put
content. virtual money while Other commentators have added
purchasing and selling items forward by EU Kids Online a further two categories which
l Social networking sites in a multi-player virtual world. project2. With Web 2.0 and it is worth bearing in mind:
where users display their with the relevant increasing “commerce” – which refers to
personal ‘profile’, including l Online gaming where interactivity, communication is the possibility of children and
players play with other, often now possible on one-to-one,
young people being exploited by
2
www.eukidsonline.net/
Note: Sections on Internet Service Providers discuss approaches available to the Internet industry as a whole. This includes Internet access providers, as well as electronic service
providers / providers of content and services – these are referred to collectively in this document as Internet Service Providers (ISPs). As such, it should be noted, that not all
recommendations will be applicable to all ISPs.
Safer Children in a Digital World: the report of the Byron Review, ( http://www.dcsf.gov.uk/byronreview/ ).
3
unscrupulous companies that l Reduce Availability: reduce An important consequence software, safe search, and age
take advantage of young people’s the availability of harmful and of the nature of the Internet verification on websites).
inexperience or it refers to inappropriate content, contact is that there is no obvious
problems such as phishing where, and conduct (industry); single point at which editorial An example of the role of
again, younger people might be control can be exercised, Internet Industry working in
l Restrict Access: equip co-operation with families is the
more vulnerable; finally there can unlike broadcast media where
children and their parents following:
be issues of “addiction”, which the channel exercises editorial
with effective tools to manage
refers to the way in which some control. Editorial controls 1. User generated content
access to inappropriate content
children and young people can exist (e.g. moderators of user websites take down harmful
(industry and family);
become obsessively engaged with generated content sites) but and inappropriate material
technology in such a way as to l Increase Resilience: build they are widely dispersed across uploaded to their sites.
present an obstacle or a barrier children’s resilience to the the ‘Internet value chain’. This
to them developing normal material to which they may value chain contain content 2. Children and parents report
relationships with other people be exposed; equip children to producer, content aggregator, harmful and inappropriate
or taking part in healthy physical deal with exposure to harmful Internet Service Providers material to host websites
activities. and inappropriate content and (ISPs) and Web host, search, when they find it.
contact, and equip parents directory and web providers,
From the Internet Industry to help their children deal consumer device, etc. 3. ISPs block access to illegal
point of view, there are three with these things and parent material such as child abuse
key strategic objectives for child effectively around incidences At each point of the value chain, images.
Internet safety, which require of harmful and inappropriate there are a range of technical
industry and parents/caregivers tools that can help parents 4. Parents install software
conduct by their children to filter out harmful and
to take joint responsibility for (parents). manage their children’s access to
increasing children’s safety the Internet (e.g. parental control inappropriate content.
online:
5. Websites provide clear and l Base the moderation process understandable and age- Restricting access:
easily visible advice about upon reports from the user appropriate. Reports should
The objective of restricting
how to stay safe. community - responding be acknowledged and acted
access to in appropriate
effectively to reports from upon expeditiously. Users
6. Parents talk with their content can be dealt with in the
more than one user, and from should be provided with
children and children talk following ways:
long-standing users (based on the information they need
with their friends and siblings their level of activity or rating to make an effective report l Parental control software,
about e-safety. or reputation they have been and, where appropriate, an which enable parents to
given by other users), can help indication of how reports are manage their children’s access
Reducing availability: create an active community typically handled. to Internet resources.
which “self-polices” and seeks
The objective of reducing Link reports of abuse to l Safer Internet tools, including
to keep themselves and others l
availability of harmful and “Notice and Take Down” parental controls, ideally would
safe online.
inappropriate content, contact processes – with a public allow the following types of
and conduct can be met by l Provide a mechanism for service level agreement on the categories: White Lists, Content
service providers undertaking reporting inappropriate response or take down times. filters, Usage monitoring,
the following: content, contact or behaviour Contact management, Time/
as outlined in their Terms l Avoid harmful or program limits.
Adopt an effective of Service, Acceptable inappropriate advertising
l
Deliver new computers or
content online.
l
moderation process of Use Policy and / or User Internet services access with
user generated content – for Guidelines - mechanisms parental control software
example, MySpace conducts a should be easily accessible enabled by “default”, linked
post-upload review of every to users at all times and the to prominent safety messages
image and video posted on its procedure should be easily which explain what the
site default settings do.
l Adopt “safe search”: most l Network level blocking, resilience (e.g. by providing of Practices; these Codes would
search engines offer a safe where, on a national-based safety advice), parents and others be more transparent than good
search option, which does criteria, some material on the working with children are likely practice guidelines, provided
not return results containing Internet, such as child abuse to have the most impact here and that the body that oversees/
images or keywords which images, is clearly illegal. so have the greater responsibility. coordinates them is effective in
would be considered monitoring them and publishing
inappropriate for children. These overlapping, but differing, the results. Mechanisms could
Increasing Resilience:
roles for industry and families also be developed within these
l Adopt appropriate age across the three objectives are
Increasing the resilience of frameworks to give parents and
verification methods to prevent very important and suggest a
children in managing risks children a voice.
children accessing age-sensitive need for a national-base and
is an important objective
content, sites or interactive shared strategy to keep children
and is interdependent and
services, such as chat rooms,
complementary with the other safe online, that is capable of Mobile Operators
etc. where risks of inappropriate influencing and empowering
two objectives of reducing
contact and conduct exist. both industry and families. As growing numbers of mobile
availability and restricting access.
l Content labelling: Providers operators offer their customers
of professionally produced Although parents and children By looking at the strengths access to a rich and compelling
content (i.e. games, broadcast- have a role in reducing the and weaknesses of existing range of content services,
style editorially controlled availability of harmful and arrangements to improve child including games, music, video
content) should provide a inappropriate material (e.g. by Internet safety, and looking and TV programming, they
clear external label describing reporting abuse to host sites), to the different country-based are faced with the challenge of
the content on their sites this is mainly a task for industry. existing laws, the Internet how to manage customer access
to indicate its suitability for And although industry does Industry can usefully develop to commercial content which
children. have a role in building children’s self-regulatory national Code would have been subject to age-
17
Case Study: MySpace’s “Big Six” safety
practices for social networking services
restrictions if accessed through classification systems. The However, given the practical music and games into either the
different channels. classification systems are typically challenges involved in mobile ‘Cellular Accessible’ (general) or
designed to manage commercial operators establishing the age ‘Cellular Restricted’ (18-rated)
The increasing range of new mobile content – i.e. content of the end user, a number of categories, the results of which
community and interactive which mobile operators produce markets (for example, Australia, are summarised by the CTIA as
services available to users also themselves or where they have Denmark, New Zealand) have follows:
come with concerns about users’ a commercial involvement with currently committed to operating
age. For example, many major third parties – and are based on a simple two-tier classification This binary approach allows
Social Networking Sites have accepted national standards and system: content which is suitable the sale of a full range of
minimum age-requirements consistent with approaches taken for adults only, and other / legal commercial content by
stated in their Terms of Service, in equivalent media (e.g. games, general content. mobile operators and third
as there are concerns that film). parties whilst meeting national
younger users face risks – such For example, the Australian acceptability tests; it ensures
as identity theft or inappropriate Indeed, where possible content code has simply mapped across that the area of greatest risk is
contact – relating to posting classifications from other criteria and ratings from the managed, and also reflects that
too much information about industries should be re-used. An existing Classification Board to the age of majority is the point
themselves, and so on. example might be of a film the ‘restricted’ (adult 18-rated) at which it is most practical to
or film trailer or a PC game and ‘unrestricted’ (general) age-verify (for example, through
In order to provide a shared and (assuming that the images are categories used in the mobile presence on the electoral role or
transparent approach, mobile repeated in the re-purposed arena, while operators in the credit card ownership).
operators and content providers for mobile version) so that USA - under the auspices of
in a number of countries are customers’ experiences of the their trade association, CTIA - Some markets, however,
responding to this challenge same content are consistent have created a grid which maps are moving towards a more
by working together to agree across national media. existing standards from TV, film, granular approach. Germany has
October 2006. The four different l Contrôle parental renforcé: was launched by the industry- partners and therefore reduce
levels will facilitate the handling blocks access to 12-rated funded Independent Mobile costs and increase efficiencies
of challenges relating to managing and 16-rated content, all Classification Body (IMCB: for the industry as a whole.
access to interactive services and user-generated / interactive http://www.imcb.org.uk/) in They also make the classification
user generated content – much of services, the Internet. 2005. In addition to formulating system more transparent for
which is suitable for older teens the classification criteria, the customers, particularly for
Content classification systems
but is neither ‘adult rated’ nor is it IMCB can provide advice or act third party services promoted
are either defined by the
appropriate for younger teens and as an arbiter in (the extremely independent of the operator
operator community itself or
children. rare) disputes over classification portal (for example, in
outsourced to a third party
of individual items of content. magazines), and allow for the
To access 18-rated content, organisation with relevant
consistent introduction of tools
users will have to age-verify; expertise. Many countries It should be noted that not all such as pre-determined adult
the 12-rated and 16-rated tiers (including Denmark, Malaysia, content classification systems short codes for premium SMS
will correspond to two levels of Singapore, and New Zealand, relate to age-sensitivities: services, which can facilitate the
parental controls as follows: for example) have simply Malaysia and Singapore use a implementation of age controls.
defined the classification binary content classification
l Contrôle parental de premier boundaries within or as an system based on existing
niveau: blocks access to appendix to their national Code national standards, however this
16-rated commercial content, of Practice itself. is based on ‘acceptable’ versus
user-generated / interactive ‘unacceptable’ content, and there
services that facilitate Others, including France
is no distinction based on age.
meetings (e.g. dating sites), above, have had classification
the Internet. criteria defined through a third Shared content classification
party organisation. The UK’s systems simplify self-
two-tier classification system classification for content
3.
Content Control
Mechanisms
Providers of online content and minimum age. To ensure that
services are developing a range of younger users are only consuming
approaches for enabling the age- age-appropriate content and
appropriate control of content in services, broadcasters use a range
the online world. These include of techniques such as:
mechanisms to restrict access to
content until the user has proven l Single Sign On processes –
his or her age (“age-verification”) For example, at BBC online
as well as controls made available services, when children sign
to parents to enable them to up to the message boards, they
place restrictions on their child’s are asked to provide their date
consumption of online content of birth. This is then used to
and services. determine whether they are old
enough to access the service –
and they are not able to change
Broadcasters the original date of birth at a
later date if they discover that
Broadcasters offer a range of certain content is unavailable to
content and services online, them because of their age.
including some which is only
suitable for users above a certain
4
It is worthwhile to note that the BBC has expressed some caution about how to allow users to activate a “red button” if they come across material that is harmful, explicit or
worrying to them. The main concern is that in by having too many options, this may drive users to other less reputable, unregulated sites. It is essential that broadcasters maintain
their reputation as a safe environment and so ensure that critical safety alerts are not off-putting.
of the user – for example, by upon for age-verification as a user under the age of 13 lies
requiring credit card or ID these details are often known by about his or her age, employs a
details – cannot be entirely others (e.g. family members). search algorithm, using terms
guaranteed: an underlying commonly used by underage
concern for all age verification Such approaches could also users, to find and delete
methods is that identity potentially infringe on the underage profiles. MySpace’s
verification on the Internet is user’s right to privacy – for site is scanned for such terms
difficult because it is virtually example, ID cards disclose and the database of search
impossible to know whether personal details (e.g. date of terms is updated to reflect
the individual user supplying birth) beyond those which are changes in user behaviour and
the information is indeed the strictly necessary to confirm terminology.
individual whose information is that the user is above the age of
being supplied. Although a user majority. Many major Internet Access
may provide certain information Providers now offer parental
ISPs are becoming increasingly control solutions which help
when registering with a
creative about managing parents to manage which sites,
website, there is no efficient or
challenges relating to age- content and services their child
effective way to ensure that this
sensitive content. For example, can access.
information has been entered
MySpace requires in its Terms
truthfully. For example, the use
and Conditions of service that
of government-issued national
all users are 13 years or older
ID cards with associated PINs
and, to combat a situation where
cannot necessarily be relied
Moreover, in order to combat Although parental controls Age-verification mechanisms However, a number of
and prevent the diffusion of solutions are improving all the operators across the globe
child sexual abuse content time, they cannot be expected The “age-check” tools available are addressing this challenge
(child pornography) and protect to provide complete safety – to more traditional retailers through the development of
children, Telecom Italia has however, in conjunction with and broadcasters of media age-verification systems. To
made a helpline/reporting teaching children responsible and content are not readily date, these typically focus on
mechanism available on the Internet practices (see Customer transferable to the mobile age-verifying adults who wish
web for reporting illicit content Communications and Education, content environment. For to have full access to all content
encountered by users while below), parental controls can example, with mobile content and services. It should be
navigating the Internet. These help provide younger users with there is no opportunity to do noted that where operators are
reports, which can be made a safer online experience. a visual check at the “point offering commercial content
anonymously and by filling out a of sale”, such as can be used and services that are subject to
web standard form, are analysed in cinemas and shops; nor, legal age-restrictions this is of
and promptly forwarded to the Mobile Operators given the personal nature of particular importance.
Postal Police (CNCPO), which the mobile device, can mobile
will investigate the alleged Mechanisms for controlling operators rely on parental
crimes since this type of activity access to age-sensitive content supervision in the same way
is entrusted exclusively to police fall broadly into two categories: that TV broadcasters have
force. l Age-verification mechanisms traditionally been able to do.
l Parental controls
7
Italian law 38/2006, to combat the sexual exploitation of children and pedopornography, including over the Internet; Italian Legislative Decree 70/2003, which regulates
e-commerce and ask Telco Operators such as Telecom Italia to provides reporting to the competent authorities of cybercrimes involving the network infrastructure and child’s
sexual abuse notices; EU Convention on Cybercrime, signed at the Council of Europe on 23 November 2001, ratified in Italy with Law 48/2008
8
http://www.poliziadistato.it/articolo/10232-Centro_nazionale_per_il_contrasto_alla_pedopornografia_sulla_rete
Different operators are taking Due to the difficulties of Many operators, from a range Most parental controls systems
different approaches to age- verifying age prior to adulthood of countries, have already currently focus purely on
verification, based on leveraging in the virtual / ‘online’ introduced parental controls commercial content, reflecting
existing options such as: environment, operators enable systems – some propositions the area where the operator has
parents to control younger focus purely on blocking access the greatest degree of control
l National ID schemes users’ access to content and to age-inappropriate commercial and, therefore, responsibility.
l Credit cards services through the application content, others are combined Operators in Japan use a black /
l Tax / fiscal codes of parental controls rather than with additional features such as white list approach to websites
l Electoral rolls
attempt to verify the age of time or spend controls. when parental controls are
every end user. applied and some operators in
l Face-to-face ID check in-store
With some exceptions, including other markets have Internet
or through e.g. post office operators in France, who have
Parental Controls filtering systems in place, but
l Contract status / existing already allowed for two levels most operators have to yet to
relationship with billpayer Whilst age-verification of access, and a few other introduce Internet filtering as
mechanisms mean that operators operators across the globe who part of their parental controls
Once age-verified at adults, have developed different multi-
are proactively implementing proposition.
users are either given an ‘adult tiered parental control, most
systems to ensure that individual
PIN’ which needs to be entered systems tend to be either ‘on’
customers are above the
whenever the user wishes to or ‘off ’ options, with access
minimum age required to access
access adult-rated content or to a set level of age-sensitive
given items of content, parental
services, or an ‘adult profile’ commercial content or services
controls rely upon parents
is applied to their account and (e.g. 18 or 16-rated) blocked
taking the initiative and applying
any restrictions on content and when switched on.
parental controls as they deem
services are removed.
appropriate for their child.
Customer
Communications
and Education
In order to enable users to Broadcasters
make informed decisions
about the content and Broadcasters who make
services they may choose to programmes that are popular
use, as well as empowering with children and younger
parents and teachers to users are likely to have a
guide children and teenagers correspondingly younger online
towards a safe, responsible and “audience”, and therefore have
appropriate online experience, a particular responsibility for
telecommunications and content promoting messages about
companies are increasingly keeping safe online.
investing in education and
communication programmes.
Broadcasters are also well- If a child posts a message which Therefore, a tick-box solution
positioned to exploit the suggests that their parents don’t or email verification is not
popularity of their content to know or don’t want them to use sufficient to acknowledge that
deliver simple messages that broadcasters on/line communities, an informed parent / guardian
will help younger users fight usually the webmaster will message / teacher is actually monitoring
issues such as “cyberbullying” or the user making it clear that they the child’s activities and does
invasion of privacy. must have parental/guardian little to help those children who
permission to use the message fall on the wrong side of the
Other approaches that can be boards. digital divide. Some pan-industry
adopted by broadcasters include exploration into more robust
encouraging children to seek Some organisations require parental consent procedures that
parental consent before using parental verification by return are socially inclusive and not
particular services. When email for added security. open to abuse is welcomed in
creating a user account, children However, for instance, the BBC’s this area.
can be advised to ask their own user testing experience
parents’ permission, and make suggests that many children share
sure that their parents are aware their parents’ email addresses
that they will be using services which would undermine the
such as message boards. The efficacy of the system, and that
Terms and Conditions of use a proportion of BBC audience
can also make it clear that only access CBBC through after
children should have a parent school clubs, either because they
or guardian’s permission before don’t get that support at home or
using message boards. because they don’t have access to
the Internet.
l Promote awareness and Collaboration - through on-line Information for parents and districts to provide on line
discussion about Internet report forms: teachers: safety curricula for children
threats and the protection and educational materials for
of children , and the tools In order to combat and prevent Service providers are realizing parents. Where possible, ISPs
available for them to use, such child sexual abuse content and that it is very important to should also promote national
as blocking and privacy settings; protect children, ISPs should: provide parents and teachers support services where parents
l Offer a space available on with the necessary information and carers may report and seek
l Share online security tips for
the web for reporting illegal to understand how their children support in the case of abuse
users;
content encountered by users are using ICT services (e.g. and exploitation.
l Contain educational resources;
while navigating the Internet; including issues such a bullying)
l Describe the national and and be well-positioned to guide Parents and teachers should:
these reports could be made
international regulatory anonymously by filling out a them towards responsible usage. l Educate themselves about the
background; standard form; l Parents and teachers should be Internet and the ways in which
l Provide customer with made aware of all Internet risks their children use it, as well as
l Provide customers with
information about available details of how to report safety in order to better protect their about technology in general;
tools for children’ protections concerns; children. Messages should be l Explore and evaluate the
(parental control, etc.). positive and empower parents effectiveness of available
l Promptly contact the relevant
to take action. technological tools for their
ISPs can also contribute to police / law enforcement
agency, which will investigate l This information should be particular child and their family
customers’ awareness by adopting
the alleged crimes; the ISPs transmitted through multiple context, and adopt those tools
a self-regulatory code that
customer services staff should media channels as many as may be appropriate;
allows minor protection through
be equipped to handle and parents do not use Internet l Be engaged and involved in
specific rules and tools, and also
forward customer reports to services. For example through their children’s Internet use;
by applying a visible brand that
the appropriate authority. collaborating with school
certifies the adhesion to the code. l Be conscious of the common
It is also very important that uncomfortable or upset about note that the customer must not from anyone under 18,
ISPs provide information something or someone”; use the website or the service to: including, but not limited to:
directly to children on safer l “Never give away your account
name, e-mail address, home
Internet use. Children should password or username; and be l Upload, post, transmit, address, phone number, or the
be educated on how to detect aware that other players may share, store or make available name of their school;
and respond to inappropriate give false information about any content that could be l Upload, transmit, share any
behaviour. The following is a real-world characteristics.” harmful, unlawful, defamatory, materials that contains viruses;
suggested check-list of advice Where possible, ISPs should also infringing, abusive, vulgar,
for ISPs to provide to their l Upload, post, transmit, share
promote national support services obscene, invasive of privacy or
younger users: or make available content
where children may report and public rights, hateful or racist;
that would constitute, provide
l “Never give away your physical seek support in the case of abuse l Impersonate any person or instruction for a criminal
contact details”; and exploitation. entity, or falsely the age, the offence, violate the rights of
l “Never agree to meet anyone affiliation with any person or any party or any local, state,
you have met online in person, Using terms and conditions entity; national or international law;
especially without consulting an
adult first”; It is very important that ISPs l Upload, post, transmit, l Harm or exploit children in any
and the Internet industry in share, store, make available way;
l “Do not respond to
general highlight the “Terms on the websites any private
inappropriate (bullying, l Stalk, defame, defraud,
and Conditions” (T&Cs) pages information relating to any
obscene, or offensive) messages intimate, degrade an individual
of the Internet services they third party, including addresses,
and save the evidence, don’t or group of individuals for
provide, with a clear policy phone numbers, email
delete it”; any reason, including on the
for any breach of T&Cs. For addresses, credit card numbers;
basis of age, gender, disability,
• “Tell an adult if you are example, typical messages of
l Solicit personal information ethnicity, race, religion or sexual
“Terms and Conditions” pages
orientation;
(e.g. explain what are social By educating parents, operators on websites, in-store, through about the nature of a given
networking sites? What are are empowering them to guide bill inserts and by offering service they are using and how to
Location Based Services? How their children towards safe and parental controls at point of sale enjoy it safely. For example, many
is the Internet accessed via responsible usage of mobile as part of the sales process. operators also build community
mobile?) and, where relevant, services themselves. Some guidelines into their interactive
the options available to parents operators have joined together Operators are also engaging with services (e.g. chat rooms)
to apply controls; with other players in their younger users directly through reminding users of appropriate
markets to produce and promote online education programmes and safe behaviour – for example,
• Inappropriate contact: how
shared parents guides (e.g. and partnerships with NGOs by reminding users not to give
to avoid “stranger danger”;
France9, Ireland10) whilst others in their local markets, as well as out their contact details, and so
what to do if their child is
promote their own company indirectly by providing teachers on (see “Education of Children ”
being bullied through so-called
guides to their customers with resources to educate and in the Internet Providers section
‘cyber-bullying’ or SMS;
specifically. inform pupils about appropriate above for further examples).
• Steps to take if a phone is usage - see, for example, the Similarly, as a matter of best
stolen or if your child is Equally, raising awareness of Teach Today (www.teachtoday. practice, many operators will now
receiving spam; the availability of parental eu) website which was created send out regular reminders to
• Managing privacy – not sharing control tools is vital, particularly by a consortium of mobile and users of Location Based Services
information online, keeping in markets where they are Internet providers in Europe. (LBS) which post their location,
profiles on SNS private, etc. not applied by default. In letting them know that the service
recognition of this, operators As content and services grow ever
is on and reminding them how to
are increasingly communicating richer, all users will continue to
change their profile or turn the
about parental controls options benefit from advice and reminders
service off.
9
http://www.sfr.fr/media/pdf/offre-sfr/maj-240107/att00013578/701.09Guideparents2007.pdf
10
http://www.vodafone.ie/download?id=ICIA_PARENTS_GUIDE.PDF
5.
www.itu.int/cop
Illegal Content
With the same priorities in inappropriate content or contact
mind, the mobile operators on a mobile service, the theft
from over 70 countries, and of a mobile device, the receipt
representing over 900 million of spam or a request to apply /
customers, who have signed up remove parental controls, with
to the GSMA Code of Practice staff being trained to respond
on Spam have all committed effectively.
to ensuring “that the processes
they use to obtain consent [to As will be discussed below,
receive a marketing message] correctly managing customer
are clear and transparent” and reports of potentially illegal
to providing customers with content is a key part of
“obvious, clear and efficient combating the presence of
means to opt-out of receiving illegal content, including child
further operator mobile sexual abuse content, in the
marketing communications sent mobile environment.
via SMS or MMS”.
All Internet providers (both Terms and Conditions, and Conditions in easy to Notice and Take Down
fixed and mobile) must work understand, customer-friendly
with law enforcement authorities
User Guidelines language within a set of “user
processes
to execute their legislative Internet providers who offer guidelines” which outline the Whether as a voluntary measure
obligations with regard to interactive services which kinds of behaviour expected or as a legal requirement,
illegal content. However, many enable users to store and share by users of their service. Such “Notice and Take Down”
Internet service providers content (e.g. photo albums, user guidelines can typically (NTD) or “cease-and-desist”
take advantage of additional social networking sites), can be accessed directly from the type processes are a key defence
approaches to help combat use the Terms and Conditions relevant service or at the point for operators and service
the misuse of their services of their customer contracts to of creating a service account. providers seeking to keep their
for the illegal hosting and / or make explicit their position on services free of illegal content:
distributing of illegal content, Service providers can also
the misuse of their services for as soon as providers are alerted
including child sexual abuse actively assess commercial
hosting or distributing illegal to their services being used to
content (child pornography). content hosted on their own
content, in order to underline host illegal content, they then
Common additional measures servers (either branded content
their commitment to working take steps to have it removed.
include: or content from contracted
with law enforcement and to
third party content providers) For NTD measures to work
• Term and Conditions and reserve all appropriate rights,
on a regular basis, in order to effectively there needs to be
“User Guidelines” which including the right to remove
ensure that illegal or potentially legal clarity on the nature of
explicitly forbid illegal activity; illegal content and freeze user
harmful content is not accessible content which is illegal and law
accounts.
• Notice and Take Down (NTD) through their network. enforcement authorities (or
or “cease-and-desist” processes; Many Internet providers delegated organizations) should be
• Working with and supporting also echo and re-emphasise able to confirm where individual
national hotlines the content of their Terms items of content are illegal.
6.
Other Issues
User Generated racist or homophobic language.
Non in-house URLs can also
Content (UGC): The be blocked, along with email
Broadcaster Approach addresses.
This section outlines the b) Pre-moderation – for instance,
approaches that Broadcasters all message boards can be
can take in order to deal with pre-moderated by a team of
User Generated Content (UGC) specialised children’s moderators
on their services. who screen for content that is in
contradiction to the published
To ensure that inappropriate House Rules. Each message
content is not published can be checked before it is
on message boards, it is published, and moderators will
recommended that broadcasters also spot and flag suspicious
put in place a number of users, as well as users in distress.
procedures to protect online
c) Hosting – in addition to the
users against inappropriate User
moderation team, there can be
Generated Content. These are:
a team of community hosts.
a) Automatic filters – The community hosts manage
inappropriate words can be message boards from the
blocked from user names public perspective, and they can
and messages at the point of be the first point of contact for
posting. This filter includes the moderators when they have
swearing, sexual terms and concerns about a user.
All moderation should be • Moderators should have set Those who are key and central users to send photos and videos
performed by an office-based hours and message boards to the community would as well as text. All these should
team who have undergone should only be open within be rewarded for their good be pre-checked in order to make
advanced checks to determine those hours. Therefore, behaviour and disruptive sure that the material is suitable
if they have existing criminal when the boards are open members would have privileges for publication on broadcasters’
records from a single external for posting, there is always a removed. All submitted user websites and to check that
agency. In addition, moderation moderator on duty. generated content should be pre- children do not publish sensitive
teams can adopt the following moderated before it can go live. personal information about
rules: However, this is a very labour- themselves or others eg. school
intensive process and the more Exclusive pre-moderated signs, road names, door numbers
• Working from home should popular and successful the public chat sessions with, for which could put them at risk,
not be permitted in order to community, the more resources example, children’s favourite for example through ‘jigsaw id’.
ensure that no one has access it takes to moderate it. authors and presenters, are
to children’s information. an incentive already in use In particular, when videos
• Moderation should be team- The ultimate sanction is to for the target age group to are submitted by children,
based so that moderators can block those who persistently participate in broadcasters broadcasters should require the
share concerns about posts or disregard the published House online communities. Offering telephone number of a guardian
users, and can build up their Rules. However, in the future these exclusive events and other or parent, to get formal adult
knowledge of users’ behaviour broadcasters may want to move premium content discourages consent before publication.
as a group. towards a more “trust and users from lying about their (This is in line with TV policies
reputation” based system so age and registering for services and protects children, for
• Moderation should be as to harness good behaviour aimed at older users. example, against being traced by
performed according to strict and enable peers to teach estranged parents who may have
moderation guidelines, built up best practice to each other by Increasingly, broadcasters’ court orders against them).
over time. example. online services are encouraging
7.
www.itu.int/cop
Conclusions
Unfortunately, as several studies
For ISPs and other online
have shown, many countries
providers to engage effectively
have insufficient or inadequate
in the Child Ondine Protection
legislation to deal with the issue
Initiative, it is crucial that they
of online child protection.
have a clear understanding of
how content and services are Additionally different
classified in the jurisdictions jurisdictions hold differing
within which they operate. views. These differences can
be abused or exploited to
Collaborating with local
the detriment of children.
broadcasters should be very
Criminals and child abusers
helpful in terms of developing
will know which countries
such an understanding. It is also
have the weakest laws or the
important to understand how
least developed mechanisms
the local legislation perceives
for dealing with these sorts of
the ‘location’ of content and
issues and they will naturally
determines the ‘place’ at which a
gravitate towards them unless
service is delivered or received.
counter-vailing measures are
Each country has a taken.
responsibility to develop their
Given this inconsistency
own legislation that they can
in the legislative and policy
apply to Internet content and
frameworks across different
services within their jurisdiction.
countries, it is imperative that
8.
Further Information
and Reading
Collaborating as an industry
European Framework for Safer Mobile Use by Younger Teenagers
and Children: http://www.gsmeurope.org/documents/safer_
children.pdf
Links to national Codes of Practice for safer mobile use by
European mobile operators (in English and their original language):
http://www.gsmeurope.org/safer_mobile/national.shtml
GSMA, Code of Practice on Spam: http://www.gsmworld.com/
our-work/public-policy/protecting-consumers/mobile_spam.htm
Safer Internet Programme: Empowering and Protecting Children
Online, http://ec.europa.eu/information_society/activities/sip/
index_en.htm
Telecom Italia on child protection: www.telecomitalia.com,
Sustainability->Hot Topics-> Protection of Children and Abuse
Study on Safer Internet Program Benchmarking of Filtering
software and services:
http://ec.europa.eu/information_society/activities/sip/projects/
targeted/filtering/sip_bench/index_en.htm
Printed in Switzerland
Geneva, 2009