Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children

Total Page:16

File Type:pdf, Size:1020Kb

Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children on the Technologies of New Information Study on the Effects Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children UNITED NATIONS New York, 2015 © United Nations, May 2015. All rights reserved, worldwide. This report has not been formally edited and remains subject to editorial changes. The contents of this report do not necessarily reflect the views or policies of UNODC or contributory organizations and neither do they imply any endorsement. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. Information on uniform resource locators and links to Internet sites contained in the present publication are provided for the convenience of the reader and are correct at the time of issue. The United Nations takes no responsibility for the continued accuracy of that information or for the content of any external website. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. Acknowledgements This report was prepared pursuant to ECOSOC resolution 2011/33 on Prevention, protection and international cooperation against the use of new information technologies to abuse and/or exploit children by Conference Support Section, Organized Crime Branch, Division for Treaty Affairs, UNODC, under the supervision of John Sandage (former Director, Division for Treaty Affairs), Sara Greenblatt and Loide Lungameni (former and current Chief, Organized Crime Branch, respectively), and Gillian Murray (former Chief, Conference Support Section). Study team: Steven Malby, Tejal Jesrani, Tania Bañuelos, Anika Holterhof, Magdalena Hahn (UNODC). Consultant: Kayla Bakshi Experts: The study greatly benefited from the inputs of the following expert practitioners in the fields of law enforcement, prosecution, academia, the private sector and civil society: Maria Teresa Aguirre, Paraguay Omashani Naidoo, South Africa Anjan Bose, ECPAT International Heila Niemand, South Africa John Carr, Online Child Safety Consultant John Peacock, New Zealand Carla Della Donne, Argentina John Penn, Adobe Guillermo Gallarza, International Center for Missing and Cristian Perella, Facebook Exploited Children Anders Persson, Sweden Paul Gillespie, Kids’ Internet Safety Alliance (KINSA) Ethel Quayle, COPINE Project Jorge Luis San Lucas Gonzalez, Ecuador Patrick Redling, Virtual Global Task Force Susie Hargreaves, Internet Watch Foundation Jonathan Rouse, Australia Apichart Hattasin, Thailand Seila Samleang, APLE Cambodia Jenny Jones, GSMA Vanessa Fusco Simoes, Brazil Lata Kallychurn, Mauritius Hana Snajdrova, Organization for Security and Co-operation Carla Licciardello, International Telecommunications Union in Europe (OSCE) (ITU) Clara Sommarin, United Nations Children’s Fund (UNICEF) Bjørn-Erik Ludvigsen, Norway Oran Sukkasem, Thailand Nelly Montealegre, Mexico Joe Sullivan, Mentor Forensic Services Michael Moran, INTERPOL Daniel Szumilas, Germany Andrew Morling, United Kingdom Janis Wolak, Crimes against Children Research Center The Branch is also grateful for the input of UNODC staff members Margaret Akullo, Adam Palmer, Anna Giudice Saget and Alexandra Souza Martins. iii Contents List of abbreviations . vii Executive summary . ix Opportunities to enhance the fight against ICT-facilitated child abuse and exploitation ........................... xi Introduction . 1 Scope and structure of the study .............................................................................. 3 I . Identifying and describing the problem . 6 Key terms and concepts ...................................................................................... 6 Main forms of ICT-facilitated child abuse and exploitation ...................................................... 8 Cyberenticement, solicitation and online grooming ......................................................... 11 Cyberbullying, cyberharassment and cyberstalking .......................................................... 12 Exposure to harmful content ............................................................................... 13 II . Evaluating the problem . 15 Effects of ICT on common existing forms of child abuse and exploitation ........................................ 15 Enhanced access to victims and to child sexual abuse material ................................................ 15 Increased profits for criminal enterprises .................................................................... 18 Reducing offenders’ risk of detection ........................................................................ 18 Increased levels of harm for victims ......................................................................... 19 Provision of social affirmation for offenders ................................................................. 20 Information and communication technologies as a tool for detection .......................................... 21 New forms of child abuse and exploitation. 21 Made-to-order child sexual abuse material .................................................................. 21 User-generated content and self-generated content, including “sexting” ........................................ 22 Broadcasting of live sex abuse .............................................................................. 22 Victimization risk factors ..................................................................................... 23 Gender and sexual orientation ............................................................................. 23 Prior abuse and family dysfunction . 24 Poverty and migration . 25 Age ....................................................................................................... 25 Risky online behaviour and inattention to online safety and privacy ........................................... 26 Social isolation ............................................................................................ 27 Profile of offenders ........................................................................................... 27 General profile and motivations of offenders ................................................................. 27 Gender ................................................................................................... 30 Age ....................................................................................................... 30 Other demographic characteristics ......................................................................... 31 Technological sophistication ............................................................................... 32 Groups of offenders ....................................................................................... 33 Organized criminal groups ................................................................................. 33 v III . Combating the problem . 36 International instruments ..................................................................................... 36 United Nations Convention on the Rights of the Child (CRC) ................................................ 36 The Optional Protocol to the CRC on the sale of children, child prostitution, and child pornography ............ 36 United Nations Convention against Transnational Organized Crime .......................................... 37 The Protocol to Prevent, Suppress, and Punish Trafficking in Persons, Especially Women and Children .......... 38 Guidelines on Justice in Matters involving Child Victims and Witnesses of Crime .............................. 38 Regional instruments ......................................................................................... 38 Council of Europe Convention on Cybercrime .............................................................. 38 Council of Europe Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse ..... 38 African Charter on the Rights and Welfare of the Child ....................................................... 39 National laws and policies .................................................................................... 39 Child sexual abuse material ................................................................................ 40 Commercial sexual exploitation of children ................................................................. 43 Cyberenticement, solicitation or online grooming ........................................................... 44 Cyberbullying, stalking and harassment ..................................................................... 45 Limiting children’s exposure to harmful content ............................................................. 45 Investigation of ICT-facilitated child abuse and exploitation .................................................... 45 Image analysis and image databases ......................................................................... 45 Digital forensics ........................................................................................... 46 Automated search ........................................................................................
Recommended publications
  • Contribution to the UNHCHR Report on Children Living And/Or Working
    ECPAT International Contribution to the UNHCHR Report on Children living and/or working on the street and the links to sexual exploitation PRODUCED BY ECPAT International End Child Prostitution, Child Pornography and Trafficking of children for sexual purposes September 2011 1 ECPAT International Introduction Securing daily basic needs and protection from the hostilities and violence on the street is a perpetual fight, and it often means enduring sexual abuse and exploitation. The spectre of neglect evidenced by the alarmingly high number of children surviving on the street across the world runs counter to the principles enshrined in the CRC, which provide for the protection of children's overall well being, human dignity and mental and physical integrity. Children living and working on the streets are part of the most excluded and at-risk persons in the world, and living on the streets deprive them of a safe environment, comfort and education. The commercial sexual exploitation of children (CSEC) is defined by the ILO Convention 182 as one of the worst forms of child labour and means the sexual abuse of a child in exchange of money or other form of remuneration. This includes child prostitution, pornography, sex tourism and trafficking for sexual purposes. It is commonly accepted that a child cannot consent freely to have sexual intercourse with an adult, including children surviving on the street. Therefore, in such cases, they should be considered victims and afforded the necessary protection. Sexual exploitation on the street takes place, by definition, in public areas, like roads, beaches, markets or parks; usually the sex offender approaches the young victim in order to have a sexual relationship.
    [Show full text]
  • Evaluating Stigmatizing Attitudes Among Clinicians Toward People with ABDL and Pedophilic Interests
    Minnesota State University, Mankato Cornerstone: A Collection of Scholarly and Creative Works for Minnesota State University, Mankato All Graduate Theses, Dissertations, and Other Graduate Theses, Dissertations, and Other Capstone Projects Capstone Projects 2018 Evaluating Stigmatizing Attitudes among Clinicians Toward People with ABDL and Pedophilic Interests Katlyn Hanson Minnesota State University, Mankato Follow this and additional works at: https://cornerstone.lib.mnsu.edu/etds Part of the Clinical Psychology Commons, and the Social Control, Law, Crime, and Deviance Commons Recommended Citation Hanson, K. (2018). Evaluating Stigmatizing Attitudes among Clinicians Toward People with ABDL and Pedophilic Interests [Master’s thesis, Minnesota State University, Mankato]. Cornerstone: A Collection of Scholarly and Creative Works for Minnesota State University, Mankato. https://cornerstone.lib.mnsu.edu/ etds/807/ This Thesis is brought to you for free and open access by the Graduate Theses, Dissertations, and Other Capstone Projects at Cornerstone: A Collection of Scholarly and Creative Works for Minnesota State University, Mankato. It has been accepted for inclusion in All Graduate Theses, Dissertations, and Other Capstone Projects by an authorized administrator of Cornerstone: A Collection of Scholarly and Creative Works for Minnesota State University, Mankato. Running head: STIGMA, CLINICIANS, ABDL, PEDOPHILIA 1 Evaluating Stigmatizing Attitudes among Clinicians Toward People with ABDL and Pedophilic Interests By: Katlyn M. Hanson A Thesis Submitted in Partial Fulfillment of the Requirements for Degree of Masters of Arts In Clinical Psychology Minnesota State University – Mankato Mankato, Minnesota May 2018 STIGMA, CLINICIANS, ABDL, PEDOPHILIA 2 April 10, 2018 Evaluating Stigmatizing Attitudes among Clinicians Toward People with ABDL and Pedophilic Interests Katlyn M.
    [Show full text]
  • An Explorative Study on Perpetrators of Child Sexual Exploitation Convicted Alongside Others
    : : : INDEPENDENTINQUIRY •• • CHILDSEXUAL ABUSE An explorative study on perpetrators of child sexual exploitation convicted alongside others May 2020 An explorative study on perpetrators of child sexual exploitation convicted alongside others Dr Sarah Senker, Matthew Scott and Dr Lucy Wainwright Commissioned and undertaken on behalf of the Independent Inquiry into Child Sexual Abuse May 2020 Disclaimer This research report has been prepared at the request of the Inquiry’s Chair and Panel. The views expressed are those of the authors alone. The research findings arising from the fieldwork do not constitute formal recommendations by the Inquiry’s Chair and Panel and are separate from legal evidence obtained in investigations and hearings. The report contains direct accounts and quotes from perpetrators of child sexual abuse and exploitation. Reading the report can have an emotional impact. There are some support organisations that it may be helpful to contact if you have been affected by any of the content in the report: https://www.iicsa.org.uk/help-and-support. © Crown copyright 2020. This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open-government-licence/version/3 Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. This publication is available at www.iicsa.org.uk. Any enquiries regarding this publication should be sent to us at [email protected]
    [Show full text]
  • Best Summon for Warlock Classic
    Best Summon For Warlock Classic cutinizespenetrably.Unrelievable his Trembling maleEmile judged screen Aloysius proper, brainlessly usually but impertinent and dotting congruently, some Johann pulpwoods she never abscind schleppsor envenoms her abstractionism so incontinently. floristically. irrationalising Burnaby Each curse of classic for best summon multiple situations Unsure how effective for melee or mining and push their position of classic for best warlock expert so that you, something with other party members at this for? Personally quite obvious in solo content, you from the answers. Healthstones are unique and you will often be asked to make them for the raid. Best tattoos is extra put all stats into red and remove stats from splinter and INT. Who cares why they need a summon. Random name stamp your summoned warlock pet you can about it permanently. But you help get an overall process right here. Warlock Pet Name Generator. Grimoires for Demon spells. Mage vs Warlock class decider. During the warlock race for the majority of damage done and a piece of spirit. Information on capable of Warcraft Classic's Best Talent Builds for the Warlock. Start with sustain tool against enemy occupied while in the situation and best for warlock pets or macro calls your video in case, as long as they could simply big independent and send you! They fight one of belief best classes for solo play Warlocks are by far one of property best classes for solo play This includes leveling up beating elite quests and everything having fun in american world content. Unglyphed Fear is useful in very limited situations.
    [Show full text]
  • The Construct of Grooming in Child Sexual Abuse
    This article was downloaded by: [Univ of Alabama in Huntsville] On: 01 October 2014, At: 10:16 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Journal of Child Sexual Abuse Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/wcsa20 The Construct of Grooming in Child Sexual Abuse: Conceptual and Measurement Issues Natalie Bennetta & William O’Donohuea a University of Nevada, Reno Accepted author version posted online: 25 Sep 2014. To cite this article: Natalie Bennett & William O’Donohue (2014): The Construct of Grooming in Child Sexual Abuse: Conceptual and Measurement Issues, Journal of Child Sexual Abuse, DOI: 10.1080/10538712.2014.960632 To link to this article: http://dx.doi.org/10.1080/10538712.2014.960632 Disclaimer: This is a version of an unedited manuscript that has been accepted for publication. As a service to authors and researchers we are providing this version of the accepted manuscript (AM). Copyediting, typesetting, and review of the resulting proof will be undertaken on this manuscript before final publication of the Version of Record (VoR). During production and pre-press, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal relate to this version also. PLEASE SCROLL DOWN FOR ARTICLE Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content.
    [Show full text]
  • Incestuous Abuse: Its Long-Term Effects
    DOCUMENT RESUME ED 390 010 CG 026 765 AUTHOR Russell, Diana E. H. TITLE Incestuous Abuse: Its Long-Term Effects. SPONS AGENCY Human Sciences Research Council, Pretoria (South Africa). REPORT NO ISBN-0-7969-1651-9 PUB DATE 95 NOTE 111p. PUB TYPE Books (010) Reports Research/Technical (143) EDRS PRICE MF01/PC05 Plus Postage. DESCRIPTORS Adult Children; *Child Abuse; *Family Violence; Females; Foreign Countries; *Incidence; Interviews; Parent Child Relationship; Qualitative Research; *Sexual Abuse; *Victims of Crime; Violence IDENTIFIERS South Africa ABSTRACT Despite the growing recognition of the prevalence of incest which is challenging-traditional views about the family as a safe haven for children, there is a serious paucity of scientific research on incest in South Africa in the new field of family violence. Almost a century after Sigmund Freud dismissed most women's reports of incest victimization as wishful fantasy, the extent of the damage done by this form of abuse remains controversial in South Africa, with some researchers maintaining that incest victims often suffer no severe effects. This report presents the findings of a qualitative study designed to explore the short- and long-term effects of incestuous abuse experienced by 20 adult women ince:-.t survivors. Although all but one of the in-depth interviews were conducted with women who at the time were residing in Cape Town, the places in which the incestuous abuse had occurred are dispersed throughout South Africa. The purpose of this study is to inform policy discussions on incestuous abuse, violence in South Africa, and violence against women in general. Includes information on prevalence of incestuous abuse, study methodology, characteristics of incestuous abuse, initial effects abuse; and long-terms effects.
    [Show full text]
  • CHILD SEXUAL ABUSE FACTS Child Sexual Abuse Is a Crime That Happens Across Race, Religion and Class and Has Lifetime Effects
    CHILD SEXUAL ABUSE FACTS Child sexual abuse is a crime that happens across race, religion and class and has lifetime effects. It includes any interaction between a child and an adult (or another child) in which the child is used for the sexual stimulation of the perpetrator or an observeri. Child sexual abuse is often predicated on silencing the victim, and as a result, reporting and disclosure is low. Even without knowing the full scope of child sexual abuse instances, most experts will agree that 500,000 children will be impacted by child sexual abuse per yearii. Annually, YWCA associations provide nearly 980,000 women and children with gender based violence services. At YWCA, we know that not all violence is acknowledged or responded to equally and that some victims go unrecognized altogether. Child sexual abuse survivors are often left out of the mainstream dialogue about gender-based violence altogether despite their heightened risk. YWCA is the largest network of domestic violence service providers in the country and is also dedicated to promoting women’s and children’s health and safety through a variety of local programs, legislative advocacy, and issue education. FACTS • A common myth is that child sexual abuse is perpetrated by strangers and pedophiles. But most people who sexually abuse children are our friends, partners, family members, and community members. About 93 percent of children who are victims of sexual abuse know their abuseriii. Less than 10 percent of sexually abused children are abused by a stranger. • Children are at heightened risk for sexual violence. Nearly 70 percent of all reported sexual assaults occur to children ages 17 and underiv.
    [Show full text]
  • Using Research-Based Algorithms to Prioritize Law Enforcement Internet Investigations
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Protecting Children Online: Using Research- Based Algorithms to Prioritize Law Enforcement Internet Investigations, Technical Report Author(s): R.Gregg Dwyer, M.D., Ed.D., Michael Seto, Ph.D., Dana DeHart, Ph.D., Elizabeth Letourneau, Ph.D., Tracy McKee, M.S., Robert Moran, Ph.D. Document No.: 250154 Date Received: August 2016 Award Number: 2011-MC-CX-0002 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this federally funded grant report available electronically. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Protecting Children Online: Using Research-Based Algorithms to Prioritize Law Enforcement Internet Investigations Technical Report Prepared By: R. Gregg Dwyer, M.D., Ed.D. Michael Seto, Ph.D. Dana DeHart, Ph.D. Elizabeth Letourneau, Ph.D. Contributors: Tracy McKee, M.S. Robert Moran, Ph.D. Submitted to the Office of Juvenile Justice and Delinquency Prevention May 2016 Community and Public Safety Psychiatry Division Department of Psychiatry and Behavioral Sciences College of Medicine Medical University of South Carolina 29-C Leinbach Drive Charleston, SC 29407 This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S.
    [Show full text]
  • Windows 10 Enterprise E3 in CSP - Windows Deployment | Microsoft Docs
    07/01/2020 Windows 10 Enterprise E3 in CSP - Windows Deployment | Microsoft Docs Windows 10 Enterprise E3 in CSP 08/23/2017 • 16 minutes to read • +5 In this article Compare Windows 10 Pro and Enterprise editions Deployment of Windows 10 Enterprise E3 licenses Deploy Windows 10 Enterprise features Related topics Windows 10 Enterprise E3 launched in the Cloud Solution Provider (CSP) channel on September 1, 2016. Windows 10 Enterprise E3 in CSP is a new offering that delivers, by subscription, exclusive features reserved for Windows 10 Enterprise edition. This offering is available through the Cloud Solution Provider (CSP) channel via the Partner Center as an online service. Windows 10 Enterprise E3 in CSP provides a flexible, per- user subscription for small- and medium-sized organizations (from one to hundreds of users). To take advantage of this offering, you must have the following: Windows 10 Pro, version 1607 (Windows 10 Anniversary Update) or later, installed and activated, on the devices to be upgraded Azure Active Directory (Azure AD) available for identity management Starting with Windows 10, version 1607 (Windows 10 Anniversary Update), you can move from Windows 10 Pro to Windows 10 Enterprise more easily than ever before— no keys and no reboots. After one of your users enters the Azure AD credentials associated with a Windows 10 Enterprise E3 license, the operating system turns from Windows 10 Pro to Windows 10 Enterprise and all the appropriate Windows 10 Enterprise features are unlocked. When a subscription license expires or is transferred to another user, the Windows 10 Enterprise device seamlessly steps back down to Windows 10 Pro.
    [Show full text]
  • A Look at Complicity by Omission Domestically and Abroad
    \\server05\productn\B\BIN\22-2\BIN205.txt unknown Seq: 1 14-JAN-05 14:12 LOOKING ABROAD TO PROTECT MOTHERS AT HOME: A LOOK AT COMPLICITY BY OMISSION DOMESTICALLY AND ABROAD I. INTRODUCTION ............................................ 425 R II. COMPLICITY BY OMISSION FOR MURDER IN THE U.S.: A CASE STUDY OF PEOPLE V. PETERS ....................... 430 R A. Background ........................................... 430 R B. The Law .............................................. 431 R III. DOMESTIC GUIDANCE ..................................... 432 R A. Domestic Federal Guidance ............................ 432 R B. Further Domestic Guidance: U.S. Model Penal Code ... 433 R IV. THE INTERNATIONAL PERSPECTIVE ........................ 435 R A. English Criminal Law ................................. 435 R B. Canadian Criminal Law ............................... 438 R C. French Criminal Law .................................. 439 R D. Analysis ............................................... 442 R V. CONCLUSION .............................................. 446 R “A person may cause evil to others not only by his actions but by his inaction, and in either case he is justly accountable to them for the injury.”1 – John Stewart Mill I. INTRODUCTION For most crimes two elemens need to be proven: the actus reus and the mens rea. Generally, the actus reus of an offense consists of a voluntary act that causes social harm.2 In cases where the defendant has an affirma- tive duty to act, however, a defendant’s omission of that duty may serve as a substitute for the voluntary act.3 Affirmative duties to protect are 1 JOHN STUART MILL, ON LIBERTY 11 (Elizabeth Rapaport ed., Hackett Publ’g Co. 1985) (1859). 2 For a thorough discussion of the two elements, see JOSHUA DRESSLER, UNDERSTANDING CRIMINAL LAW 81-142 (3d ed. 2001). These generalizations are based on American law, and differences in the international law, if any, will be discussed within the relevant section.
    [Show full text]
  • IN the SUPREME COURT of CANADA (On Appeal from the Court of Appeal of Alberta)
    S.C.C. File No. 32912 IN THE SUPREME COURT OF CANADA (On Appeal from the Court of Appeal of Alberta) Between: MICHAEL ERIN BRISCOE Appellant (Respondent) - and - HER MAJESTY THE QUEEN Respondent (Appellant) FACTUM OF THE CROWN RESPONDENT ATTORNEY GENERAL OF ALBERTA PURSUANT TO RULE 42 OF THE RULES OF THE SUPREME COURT OF CANADA JAMES C. ROBB, Q.C. and HENRY S. BROWN, Q.C. TAMARA FRIESEN Cowling Lafleur Henderson LLP Appeals Branch, Alberta Justice Suite 2600, 160 Elgin Street 3rd Floor North Bowker Bldg. Ottawa, ON 9833 - 109 Street KIP lC3 Edmonton, AB Tel: (613) 233-1781 T5K 2E8 Fax: (613) 563-9869 Tel: (780) 427-5042 email: i~ewy.bro~vn@,~li~igs.c.om Fax: (780) 422-1 106 email: james.robb~gov.ab.ca Counsel for the Respondent Ottawa Agent for the Respondent ALEXANDER D. PRINGLE, Q.C. JEFFREY BEEDELL Pringle, Peterson, MacDonald & Bottos Lang Michener LLP Barristers & Solicitors Barristers & Solicitors 100 Street Place 300, 50 O'Connor Street 300, 10150 - 100 Street Ottawa, ON KIP 6L2 Edmonton, AB T5J OP6 Tel: (613) 232-7171 Phone: (780) 424-8866 Fax: (613) 231-3191 Fax: (780) 426-1470 email: jbeedellG$lanm~ichener.ca email: apringle($p&leandassociates.coin Counsel for the Appellant Ottawa Agent for the Appellant TABLE OF CONTENTS PAGE PART I: STATEMENT OF FACTS .................................................................................1 (0 Overview of Case .......................................................................................1 .. (11) Evidence at Trial ........................................................................................2
    [Show full text]
  • Sexual Aggression and the Civil Response, Annual Review of Civil
    ANNUAL REVIEW OF CIVIL LITIGATION 2018 THE HONOURABLE MR.JUSTICE TODD L. ARCHIBALD SUPERIOR COURT OF JUSTICE (ONTARIO) # 2018 Thomson Reuters Canada NOTICE AND DISCLAIMER: All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher (Thomson Reuters Canada, a division of Thomson Reuters Canada Limited). Thomson Reuters Canada and all persons involved in the preparation and sale of this publication disclaim any warranty as to accuracy or currency of the publication. This publication is provided on the understanding and basis that none of Thomson Reuters Canada, the author/s or other persons involved in the creation of this publication shall be responsible for the accuracy or currency of the contents, or for the results of any action taken on the basis of the information contained in this publication, or for any errors or omissions contained herein. No one involved in this publication is attempting herein to render legal, accounting or other professional advice. If legal advice or other expert assistance is required, the services of a competent professional should be sought. The analysis contained herein should in no way be construed as being either official or unofficial policy of any governmental body. A cataloguing record for this publication is available from Library and Archives Canada. ISBN 978-0-7798-8457-5 Scan the QR code to the right with your smartphone to send your comments regarding our products and services. Free QR Code Readers are available from your mobile device app store.
    [Show full text]