Victims Are Not Virtual: Situation Assessment of Online Child Sexual Exploitation in South Asia, UNICEF, 2016

Total Page:16

File Type:pdf, Size:1020Kb

Victims Are Not Virtual: Situation Assessment of Online Child Sexual Exploitation in South Asia, UNICEF, 2016 The opinions expressed in this work do not necessarily reflect the views of UNICEF. The designations employed and the presentation of the material in this report, including tables, do not imply the expression of any opinion whatsoever on the part of UNICEF concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. Permission to copy, disseminate or otherwise use information from this report is granted as long as appropriate acknowledgement is given. Suggested citation: UNICEF. Victims Are Not Virtual: Situation assessment of online child sexual exploitation in South Asia, UNICEF, 2016. To the best of our knowledge, the information contained herein is accurate and reliable; however, UNICEF does not assume any liability whatsoever for its accuracy and completeness. © United Nations Children’s Fund (UNICEF), Regional Office for South Asia (ROSA), November 2016. Cover illustration and design: Nemm (www.nemmnemm.net/) Design and layout by E.K. Solutions. VICTIMS ARE NOT VIRTUAL Situation assessment of online child sexual exploitation in South Asia Acknowledgements This review was prepared by Data & Society Research Institute, and benefited from the expertise of Mark Latonero, Monica Bulger, Bronwyn Wex, Emma Day, Kapil Aryal, Mariya Ali, Keith Hiatt, Patrick Davidson, Alexandra Mateescu, Idil Ali, Mikaela Pitcan, Beth Garrett, Stacy Abder and Janet Haven. Kendra Gregson (UNICEF) guided the project. The specialized knowledge of a distinguished reference group further enhanced this study, and UNICEF thanks them for their generous insights and careful reviews. Margaret Akullo UNODC, Human Trafficking and Migrant Smuggling Section, Organized Crime and Illicit Trafficking Branch Ramiz Behbudov UNICEF Sri Lanka Country Office Peta-Gaye Bookall UNICEF Pakistan Country Office Anjan Bose UNICEF headquarters, New York Jasmina Byrne UNICEF Office of Research – Innocenti, Italy Songha Chae UNICEF Sri Lanka Country Office Sarah Coleman UNICEF Pakistan Country Office Susie Hargreaves Internet Watch Foundation Sarah Hicks National Crime Agency, Government of the United Kingdom of Great Britain and Northern Ireland Hemamal Jayawardena UNICEF Sri Lanka Country Office Wojciech Koprowicz UNICEF Regional Office for South Asia Aniruddha Kulkarni UNICEF Bhutan Country Office Daniel Laskey-Heard National Crime Agency, Government of the United Kingdom of Great Britain and Northern Ireland Carla Licciardello International Telecommunication Union Mohamed Naeem UNICEF Maldives Country Office Rose-Anne Papavero UNICEF Bangladesh Country Office Ethel Quayle University of Edinburgh, Clinical & Health Psychology, School of Health in Social Science Kate Sinnott National Crime Agency, Government of the United Kingdom of Great Britain and Northern Ireland Clara Sommarin UNICEF headquarters, New York Eri Mathers Suzuki UNICEF Regional Office for South Asia Joachim Theis UNICEF India Country Office Karma Tsering UNICEF Bhutan Country Office Shabnaaz Zahereen UNICEF Bangladesh Country Office Contents Abbreviations and acronyms ................................................................................................................................................. 7 Executive summary .................................................................................................................................................................. 11 1. Introduction ............................................................................................................................................................................. 15 1.1 Focus of report ..................................................................................................................................................................... 15 1.2 Report overview ................................................................................................................................................................... 16 1.3 Key research areas ............................................................................................................................................................... 17 1.4 Overview of methods .......................................................................................................................................................... 17 1.5 Promotion of children’s rights to education, to access information and to freedom of expression .................. 17 2. Methodological approach ............................................................................................................................................... 21 2.1 Literature review .................................................................................................................................................................. 21 2.2 In-country fieldwork ............................................................................................................................................................ 21 2.3 Limitations of research ........................................................................................................................................................ 21 2.4 Defining online child sexual exploitation ........................................................................................................................ 22 2.4.1 Online child sexual exploitation and child abuse ................................................................................................ 22 2.4.2 Online child sexual exploitation ............................................................................................................................. 22 3. A rights-based review of law and policy related to online child sexual exploitation .................. 25 3.1 International child rights law related to online child sexual exploitation ................................................................. 25 3.2 Regional initiatives to address online child sexual exploitation ................................................................................. 27 3.3 Online CSAM and criminal justice .................................................................................................................................... 28 3.3.1 Model Law on child pornography of the International Centre for Missing & Exploited Children ............ 29 3.3.2 The role of INTERPOL .............................................................................................................................................. 29 3.3.3 Global Programme on Cybercrime of the United Nations Office on Drugs and Crime ............................. 30 3.4 Online facilitation of offline child sexual exploitation and criminal justice ............................................................. 31 3.4.1 Online grooming of children .................................................................................................................................... 31 3.4.2 Online facilitation of child marriage ....................................................................................................................... 31 3.4.3 Online facilitation of exploitation of children in travel and tourism ............................................................... 32 3.5 Corruption of children for sexual purposes, and child protection............................................................................ 32 3.6 Sexual extortion of children – child protection and criminalization ...................................................................... 32 3.7 The child victim’s right to redress – civil and criminal justice, state compensation funds ................................... 34 3.8 The child’s right to protection: commercial law and industry self-regulation ......................................................... 35 3.8.1 Commercial law .......................................................................................................................................................... 35 3.8.2 Industry self-regulation ............................................................................................................................................. 36 3.8.3 ITU and UNICEF Guidelines for Industry on Online Child Protection ........................................................... 37 3.8.4 The Mobile Alliance against Child Sexual Abuse Content of the Groupe Spécial Mobile Association ... 38 3.8.5 Social media companies – Facebook .................................................................................................................... 41 3.8.6 Financial industry ....................................................................................................................................................... 41 3.8.7 Private agents ............................................................................................................................................................. 42 3.9 Access to justice – the implementation gap .................................................................................................................. 42 4. Balancing children’s online protection and participation............................................................................. 45 4.1 Opportunities of online engagement ............................................................................................................................. 45 4.2 Youth negotiation of online risks .....................................................................................................................................
Recommended publications
  • Microsofts-Tjenestea
    Vi bruker informasjonskapsler til å forbedre opplevelsen på nettstedene våre og til Godta alle Behandle informasjonskapsler annonsering. Personvernerklæring Gå til hovedinnhold Microsoft Microsofts tjenesteavtale Microsofts tjenesteavtale Microsofts tjenesteavtale Hjem Vanlige spørsmål Microsofts tjenesteavtale Microsofts personvernerklæring Side for Bing-leverandører Mer Alt fra Microsoft Microsoft 365 Office Windows Surface Xbox Spesialtilbud Kundestøtte Programvare Windows-apper OneDrive Outlook Skype OneNote Microsoft Teams PCer og enheter Kjøp Xbox Tilbehør Underholdning Xbox Game Pass Ultimate Xbox Live Gold Xbox og spill PC-spill Windows-spill Filmer og TV Bedrift Microsoft Azure Microsoft Dynamics 365 Microsoft 365 Microsoft Industry Dataplattform Microsoft Advertising Power Platform Kjøp for bedrifter Developer & IT .NET Windows Server Windows Utviklingssenter Dokumenter Power Apps HoloLens 2 Annen Microsoft Rewards Gratis nedlastinger og sikkerhet Utdanning Gavekort Lisensiering Vis områdekart Søk på Microsoft.com SøkSøk på Microsoft.com Avbryt Publisert: 1. august 2020 Ikrafttredelsesdato: 1. oktober 2020 Skriv ut Microsofts tjenesteavtale Disse vilkårene ("Vilkår") dekke bruken av Microsoft-forbrukerprodukter, nettsteder og tjenester som er oppført på slutten av disse vilkårene her (#serviceslist) ("Tjenester"). Microsoft kommer med et tilbud til deg ved å gi deg muligheten til å abonnere på, bruke og/eller bestille Tjenestene. Du godtar disse vilkårene ved å opprette en Microsoft-konto, ved å bruke Tjenestene, eller ved å
    [Show full text]
  • Open Session IICSA Inquiry - Internet Hearing 14 May 2019
    Open Session IICSA Inquiry - Internet Hearing 14 May 2019 1 Tuesday, 14 May 2019 1 to ask you a little bit about your two children, 2 (10.30 am) 2 starting with your daughter, please, and at 3 (In Open Session) 3 paragraph 20, chair, in the witness statement. 4 THE CHAIR: Good morning, everyone, and welcome to Day 2 of 4 IN-H1, is this right? That, sadly, your daughter, 5 this two-week public hearing. 5 when she was younger, aged 5, was sexually abused 6 Ms Carey? 6 herself at that age? 7 MS CAREY: Thank you, chair. We're firstly going to hear 7 A. She was. 8 this morning from IN-H1. I ask that she now be sworn, 8 Q. I think it happened at a time when you were away for 9 please. 9 a week and it was whilst you were away that the abuse 10 WITNESS IN-H1 (affirmed) 10 happened? 11 (Evidence given via videolink) 11 A. It did. 12 Examination by MS CAREY 12 Q. I think the person that did that was arrested but 13 MS CAREY: IN-H1, good morning. I'm going to ask you some 13 nothing further happened to him; is that right? 14 questions, please, about your witness statement that 14 A. Yes, that's true. 15 I hope you have in front of you. 15 Q. And as well as dealing with that, your daughter was 16 A. I do. 16 bullied at school, she became a little bit of a bully, 17 Q.
    [Show full text]
  • Surface™ Product Solutions
    Surface Pro Surface Go Surface Laptop Go Surface Laptop Surface Pro X Surface Book Surface™ Product Solutions The Ultimate Accessories to Enhance Security, Productivity and Wellbeing Surface Studio Surface™ Pro Solutions SD7000 Surface™ Pro Docking Station Kensington have worked together with The SD7000 delivers the ultimate Surface™ experience. Built on Microsoft’s proprietary Surface Connect technology, the SD7000 is a Microsoft engineers to develop a powerful docking station allowing users to connect to two external range of officially licensed monitors, USB peripherals and a wired network. Designed for Surface accessories. This means that the product Work upright using the Surface has been designed and tested as a display or angle it flat to assure proper fit and to use as a graphics tablet in function with a Surface Studio mode device, ensuring a great customer experience. K62917EU USB-C™ Gigabit HDMI port Ethernet Combo 3.5mm 4 x Kensington With the optional Locking Kit Audio In/Out USB 3.0 DisplayPort++ Security Slot™ (K62918EU/K63251M) to secure the Surface Pro, the SD7000 offers best- in-class docking Security Solutions Control Solutions Protection Solutions Connectivity Solutions SureTrack™ Dual Wireless Mouse Black - K75298WW | Blue - K75350WW For Surface™ Pro 7 Keyed Cable Lock for Grey - K75351WW | Red - K75352WW BlackBelt™ Rugged Case USB-C ™ to Dual HDMI Adapter Surface™ Pro & Surface™ Go White - K75353WW for Surface™ Pro 7/6/5/4 K38286WW The SureTrack™ mobile mouse tracks on multiple Connect the Surface™ Pro 7 to two HDMI 4K K62044WW K97951WW surfaces (including glass) and offers 2.4GHz, monitors @ 30Hz. Clamps around kickstand to physically secure Bluetooth 3.0 and Bluetooth 5.0 connectivity.
    [Show full text]
  • Surface Laptop Go Contract 2021
    Name: ______________________________ Grade: ____ Surface Laptop Go Contract 2021 - 2022 GREATER MIAMI ADVENTIST ACADEMY Surface Laptop Go Initiative Greater Miami Adventist Academy, in support of its educational mission, has acquired internet-connected computing devices for every student in grades kindergarten through twelfth grade. These devices will be used to support learning activities in the classroom. For grades four through twelve, the school has purchased Microsoft Surface Laptop Go devices. Ownership Just like any library book, every Surface Laptop Go is owned and managed by Greater Miami Adventist Academy. Students and families who agree to the terms of this contract will be permitted to use a device for the duration of the 2021-2022 school year. Students are permitted to take their devices home in order to complete learning activities using the device. This device, protective case, and all charging cables should be returned in good condition at the end of the school year. Device Protection Students will be provided with a case for the Surface Laptop Go to prevent accidental damage during the school year. While these cases offer quite a bit of protection, no case can prevent all damage. Please treat the school’s device with care through the year. Students are responsible for any damage to the school’s devices. Due Care and Damage Policy Students are to exercise due care with the school’s Surface Laptop Go. Devices should not be left unsecured, and heavy items should not be placed on top of the device. In the event that a student damages a device, such damage should be immediately reported to the GMAA IT Department.
    [Show full text]
  • Netclean Report 2019
    NETCLEAN REPORT 2019 A REPORT ABOUT CHILD SEXUAL ABUSE CRIME 1 INTRODUCTION INTRODUCTION p. 4–5 EXECUTIVE SUMMARY p. 6–7 ABOUT THE REPORT p. 8–9 RESULTS EIGHT INSIGHTS INTO CHILD SEXUAL ABUSE CRIME p. 10–11 PART ONE: LAW ENFORCEMENT SURVEY p. 12–13 1. The spread of live-streamed child sexual abuse p. 14–17 2. Victims of live-streamed child sexual abuse p. 18–19 3. Offenders who consume live-streamed child sexual abuse p. 20–25 4. How child sexual abuse material is stored p. 28–31 5. Apps and platforms are used to store and distribute child sexual abuse material p. 32–33 6. Emerging technologies – trends, challenges and opportunities p. 36–40 PART TWO: BUSINESS SURVEY p. 44–45 7. Businesses’ use of policies and action plans to protect their IT environment from child sexual abuse material p. 46–47 8. Businesses’ use of technologies to protect their IT environment from child sexual abuse material p. 48–49 PART THREE: MAPPING OF TECHNOLOGIES p. 52–53 Binary hashing p. 54 Robust hashing p. 55 Artificial Intelligence p. 56 Keyword matching p. 57 Filter technology p. 58 Blocking technology p. 59 IN CLOSING TECHNOLOGY – A DRIVER OF BOTH PROBLEM AND SOLUTION p. 60 SAFEGUARDED CHILDREN IN 2018 AND ACKNOWLEDGEMENTS p. 62 2 3 INTRODUCTION BY USING TECHNOLOGY TO About John F. Clark and NCMEC John F. Clark is president and CEO of the National Center OUR ADVANTAGE WE for Missing & Exploited Children (NCMEC). Clark has an extensive law-enforcement background, including 28 years with the United States Marshals Service (USMS).
    [Show full text]
  • Microsoft Security Intelligence Report
    Microsoft Security Intelligence Report Volume 17 | January through June, 2014 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. Copyright © 2014 Microsoft Corporation. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Authors Dennis Batchelder Nam Ng Tim Rains Microsoft Malware Protection Microsoft Trustworthy Microsoft Trustworthy Center Computing Computing Joe Blackbird Niall O'Sullivan Jerome Stewart Microsoft Malware Protection Microsoft Digital Crimes Unit Microsoft Digital Crimes Unit Center Daryl Pecelj Holly Stewart Paul Henry Microsoft IT Information Microsoft Malware Protection Wadeware LLC Security and Risk Management Center Sriram Iyer Anthony Penta Todd Thompson Application and Services Group Windows Services Safety Microsoft IT Information Platform Security and Risk Management Jeff Jones Microsoft Trustworthy Simon Pope Terry Zink Computing Microsoft Trustworthy Exchange Online Protection Computing Aneesh Kulkarni Geoff McDonald Windows Services Safety Ina Ragragio Microsoft Malware Protection Platform Microsoft Malware Protection Center Center Marc Lauricella Microsoft Trustworthy Computing Contributors Tanmay Ganacharya Sean Krulewitch Takumi Onodera
    [Show full text]
  • ICT Usage Among Children, Parents Are Frequently Concerned About Their Children's Ability to Navigate the Internet Safely
    Children’s Rights & the Internet GOOD PRACTICE Case Study: Amigos Conectados The Walt Disney Company Latin America is a leader in family Project by The Walt Disney entertainment in the region and assumes this role with great Company Latin America and responsibility. Disney strives to create products in an ethical Chicos.net manner and promote the happiness and well being of kids and families everywhere. Since the launch of its first Internet site in 1995, Disney has been committed to promoting both safe Internet practices for children and parental involvement in kids’ online experiences. Disney conducts online safety media and educational outreach campaigns aimed at building awareness and educating kids, parents, and caregivers on how to be safe and have fun online. Children’s rights Issue or Risk With increased ICT usage among children, parents are frequently concerned about their children's ability to navigate the Internet safely. Additionally, the digital divide, once primarily associated with one's access to the Internet, is now also impacted heavily by digital literacy – how well users understand ICT risks and how to responsibly leverage all that technology has to offer. ICT use among children continues to expand rapidly bringing with it a diverse set of opportunities and challenges and risks. On the one hand the Internet has placed the world's information at our fingertips, shaping culture, communication and learning. On the other hand, as technologies become increasingly accessible and portable, children and teenagers are presented with new scenarios that parents, teachers and technology product/service providers must work to understand to better guide them and protect them.
    [Show full text]
  • Online Sexual Exploitation of Children in the Philippines 1
    The sexual exploitation of children is, sadly, not a new phenomenon. It has existed for many centuries, has victimized children of any age from all countries, and has been committed by offenders of all backgrounds from around the world. What has changed however, are the ways in which these offences occur and the mechanisms that facilitate these types of abuse. In the last fifteen years there has been a significant increase in the use of technologies internationally. Across much of the globe, it is hard to find a person without at least one mechanism that allows them to access the Internet at the mere touch of a button. However, as history will teach us, with every new invention there will be misuse - this has never been more evident than with online technologies and the Internet. Technological advancements have changed the ways through which children are sexually exploited – online child sexual exploitation continues to grow exponentially with hotlines around the world reporting a consistent and continual increase in number of cases every year. Efforts internationally are responding to these increases. We are seeing police agencies utilizing technology to help them further investigations and more and more industry partners are exploring how they can be part of the solution. Additionally, non-government agencies continue to seek out new opportunities to enhance their support to victims in their communities through supporting criminal justice and social service system development, survivor care, and community-based support mechanisms. Never before has it been more important to work together to protect children. But in order to do just that, it is imperative that we know more about these crimes against children.
    [Show full text]
  • Do It All with Style, Speed, and Performance Meet the New Surface Laptop 4 for Federal
    Do it all with style, speed, and performance Meet the new Surface Laptop 4 for Federal Performance for multi-tasking, Equipped for Government Use meetings, and more Save time and money with streamlined deployment, modern From video calls at home to virtual collaboration in the device management, and built-in, cloud-powered security. office, your work stands out with Surface Laptop 4. • Work more securely by authenticating to your networks • Get more multitasking power to run the professional-grade with 3rd party FIPS 201-compliant Smart Card Reader* apps you depend on, fueled by an 11th Gen Intel® Core™ options for Surface, that allow you to connect additional Processor and custom AMD Ryzen™ Microsoft Surface peripheral devices while providing necessary security. Edition processors. • Work without worries, knowing you can receive quick and • Show your best side with more accurate skin tone colors reliable support through Microsoft’s service partnership on video calls, even in low light, with the front-facing with ITG*. Choose 3-year, 4-year, or 5-year onsite 720 HD camera. warranties w/Keep Your Hard Drive, receive support by the next business day, and remain in full compliance with • Be heard loud and clear in Microsoft Teams* calls with dual regulations. far-field Studio Mics that capture your voice crisply and clearly. • Surface Enterprise Management Mode (SEMM) provides a scalable deployable utility to help you selectively choose • Hear colleagues and customers clearly on calls. Listen in to enable or disable hardware-based components, in and be more fully engaged in meetings with Omnisonic addition to boot options, on a per-device basis – all speakers.
    [Show full text]
  • Automated Malware Analysis Report For
    ID: 406830 Cookbook: browseurl.jbs Time: 09:36:59 Date: 07/05/2021 Version: 32.0.0 Black Diamond Table of Contents Table of Contents 2 Analysis Report https://hmk- my.sharepoint.com:443/:b:/g/personal/cdark3_hallmark_com/ESsoCnIn0KVAvpl8nR3eDlkBbuLERAJv3zcU0H7s6bMwEg? e=4%3ajV6tDZ&at=9 3 Overview 3 General Information 3 Detection 3 Signatures 3 Classification 3 Startup 3 Malware Configuration 3 Yara Overview 3 Dropped Files 3 Sigma Overview 3 Signature Overview 4 Phishing: 4 Mitre Att&ck Matrix 4 Behavior Graph 4 Screenshots 5 Thumbnails 5 Antivirus, Machine Learning and Genetic Malware Detection 6 Initial Sample 6 Dropped Files 6 Unpacked PE Files 6 Domains 6 URLs 6 Domains and IPs 8 Contacted Domains 8 URLs from Memory and Binaries 9 Contacted IPs 15 Public 15 Private 15 General Information 15 Simulations 18 Behavior and APIs 18 Joe Sandbox View / Context 18 IPs 18 Domains 18 ASN 18 JA3 Fingerprints 18 Dropped Files 18 Created / dropped Files 18 Static File Info 52 No static file info 52 Network Behavior 52 Network Port Distribution 52 TCP Packets 52 UDP Packets 54 DNS Queries 57 DNS Answers 58 HTTPS Packets 59 Code Manipulations 60 Statistics 60 Behavior 60 System Behavior 61 Analysis Process: iexplore.exe PID: 4292 Parent PID: 792 61 General 61 File Activities 61 Registry Activities 61 Analysis Process: iexplore.exe PID: 5400 Parent PID: 4292 61 General 61 File Activities 61 Registry Activities 62 Analysis Process: dllhost.exe PID: 6600 Parent PID: 792 62 General 62 File Activities 62 Analysis Process: explorer.exe PID: 3440 Parent PID: 6600 62 General 62 File Activities 62 Analysis Process: iexplore.exe PID: 724 Parent PID: 4292 63 General 63 File Activities 63 Registry Activities 63 Disassembly 63 Code Analysis 63 Copyright Joe Security LLC 2021 Page 2 of 63 Analysis Report https://hmk-my.sharepoint.com:443/:b:/…g/personal/cdark3_hallmark_com/ESsoCnIn0KVAvpl8nR3eDlkBbuLERAJv3zcU0H7s6bMwEg?e=4%3ajV6tDZ&at=9 Overview General Information Detection Signatures Classification Sample URL: https://hmk-my.sharepoint.
    [Show full text]
  • Surface Laptop Go Fact Sheet October 2020
    Surface Laptop Go Fact Sheet October 2020 Introducing Surface Laptop Go, the lightest and most affordable Surface Laptop ever to power everyday experiences. With its balance of performance, battery life, value and style, Surface Laptop Go helps you get the job done. Surface Laptop Go is ultra-light with a portable profile comprised of premium materials, running essential apps1, and available in variety of modern colors. For the student at home or the professional on the go, make an impression with the new Surface Laptop Go. Top Features and Benefits • Sleek design and standout value. Take Surface Laptop Go with you everywhere. The lightest Surface Laptop ever at 2.45 lbs helps you do more on a 12.4” PixelSense™ touchscreen display, full size keyboard, large precision trackpad and all-day battery life2, all at an exceptional value. With three metal color options of Ice Blue, Sandstone, and Platinum, there’s a Surface Laptop Go for everyone3. • Familiar features and trusted security. Get started with the Windows you love, convenient security of Windows Hello and One Touch sign-in with a FingerPrint Reader Power button on select models. Enjoy amazing sound for music and streaming video and easily connect on video calls with built-in Studio Mics, Omnisonic Speakers and Dolby® Audio and 720p HD camera. • Get it done with your favorite apps. Collaborate with fellow students and colleagues alike doing your best work with the Surface Laptop Go. Power through today’s tasks and tomorrow’s assignments with your favorite apps, backed by all-day battery life. Surface Laptop Go features USB-C® and USB-A ports for display and accessory support along with the latest 10th Gen Intel® i5 Core™ Processor and up to 8GB RAM and 256GB storage helping you stay productive and connected wherever you are.
    [Show full text]
  • 2019 ICT Principle Implementation Report
    ICT Coalition for Children Online Implementation Questionnaire Implementation of the ICT Principles 1 ICT Coalition for Children Online Introduction Notes/instructions on completing this template • Please complete all sections and all questions as far as possible • Where a question or section is not applicable, please mark as N/A • Where is overlap – or no change – to information previously submitted in company statement of commitments, please simply enter “refer to self-statement” • URLs or screenshots (with links) are particularly useful in illustrating individual points • Please add any additional information/data relevant to the submission at the end of the appropriate Principle 1. Name of the company on whose behalf this submission is made: Facebook Ireland 2. Country or primary markets where products/services are offered (in EU) to which this submission applies In which European markets does your company operate All European Member States 3. Product(s) or services included within the terms of this submission Facebook Implementation of the ICT Principles 2 ICT Coalition for Children Online 4. Nature of activity ☐ Manufacturers of desktop and laptop computers, mobile phones, tablets, TV set top boxes and gaming consoles ☐ Network operators and connectivity providers ☐ Online content provider ☐ Online service provider ☐ Other (please specify): ...................................................................... 5. Person(s) completing the report Name: .........Amy McArdle........................................................... Position: ........ Safety Policy Manager EMEA............................... Email: ............. [email protected]......................................... Implementation of the ICT Principles 3 ICT Coalition for Children Online Principle 1 – Content Commitments Signatories should: • Indicate clearly where a service they offer may include content considered not to be appropriate for children and display prominently options which are available to control access to the content.
    [Show full text]