( ( Guidelines((( (

for Industry on ( ( ((( ( Online Protection

International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland www.itu.int/cop

Printed in Switzerland Geneva, 2011

With the support of: www.itu.int/cop Legal notice This document may be updated from time to time. Third-party sources are quoted as appropriate. The International Telecommunication Union (ITU) is not responsible for the content of external sources including external websites referenced in this publication. Neither ITU nor any person acting on its behalf is responsible for the use that might be made of the information contained in this publication.

Disclaimer Mention of and references to specific countries, companies, products, initiatives or guidelines do not in any way imply that they are endorsed or recommended by ITU, the authors, or any other organization that the authors are affiliated with, in preference to others of a similar nature that are not mentioned. Requests to reproduce extracts of this publication may be submitted to: [email protected] © International Telecommunication Union (ITU), 2011

ACKNOWLEDGEMENTS These Guidelines have been prepared by ITU and a team of contributing authors from leading institutions active in the ICT sector. These Guidelines would not have been possible without the time, enthusiasm and dedication of its contributing authors. ITU is grateful to all of the following authors, who have contributed their valuable time and insights: (listed in alphabetical order) • Cristina Bueti and Marco Obiso (ITU) • John Carr (Children’s Charities’ Coalition on Internet Safety) • Natasha Jackson and Jenny Jones (GSMA) • Nerisha Kajee and Rob.Borthwick (Vodafone) • Giacomo Mazzone (EBU) based on documents provided by Marc Goodchild & Julian Coles (both from the BBC) • Michael Moran (Interpol) • Brian Munyao Longwe (AfrISPA) • Lorenzo Pupillo and Rocco Mammoliti (Telecom Italia) The authors wish to thank Kristin Kvigne (Interpol) for her detailed review and comments.

ITU wishes to acknowledge Salma Abbasi from eWWG for her valuable involvement in the Child Online Protection (COP) Initiative.

Additional information and materials relating to these Draft Guidelines can be found at: http://www.itu.int/cop/ and will be updated on a regular basis.

If you have any comments, or if you would like to provide any additional information, please contact Ms. Jeoung Hee Kim at [email protected] Photo credits: www.shutterstock.com, Violaine Martin/ITU, Ahone Ayeh Njume-Ebong/ITU Table of Contents

Foreword Executive Summary 1 Guidelines for Industry 2 Key areas for consideration by the Whole ICT industry Key areas for consideration by Broadcasters Key areas for consideration by Internet Service Providers Key areas for consideration by Mobile Operators 1. Background 6 Collaborating as an Industry 2. Classifying Content and Services 8 Broadcasters

Case Study: British Broadcasting Company (BBC) – United Kingdom 10 Internet Service Providers Mobile Operators Case Study: MySpace’s “Big Six” safety practices for social networking services 17 Case Study: Wireless Content Guidelines Classification Criteria – USA 19

Guidelines for Industry www.itu.int/cop

3. Content Control Mechanisms 21 Broadcasters Internet Service Providers

Case Study: Telecom Italia and the Protection of Children, Italy 26 Mobile Operators

Case Study: NTT DoCoMo Parental Controls – Japan 31 Case Study: ATT MEdia™ Net Parental Controls – USA 31

4.Customer Communications and Education 32 Broadcasters Internet Service Providers Using Terms and Conditions Mobile Operators

Case Study: Wireless Application Service Providers’ Association (WASPA) Code of Conduct relating to Premium SMS – South Africa 40 Case Study: Vodafone “Top Tips” for Parents – UK 41 Case Study – CBBC Media Literacy Skills, UK 45 Case Study – Once Upon a Cyberspace Series, MDA and Okto, Singapore 45 Case Study: Using Customer Communications to Support Efforts to Combat Spam and Scam SMS 46

Guidelines for Industry 5.Illegal Content 48 Terms and Conditions, User Guidelines Notice and Take Down (NTD) processes

Case Study: Abuse Desk Service and Notice and Take-Down Approach - Telecom Italia 50 Hotline Organisations Industry Collaboration 6. Other Issues 53 User Generated Content: The Broadcaster Approach

Case Study: How Broadcasters Can Protect Children Against Inappropriate, Non-in House Material: the Example of BBC 55 7. Conclusions 56 8. Further Information and Reading 59

Guidelines for Industry “Protecting children online is a global issue, so a global response is needed” Foreword

I welcome this opportunity to share with you these preliminary guidelines which have been developed with the invaluable help of multiple stakeholders. Child Online Protection – in the era of the massively-available broadband Internet – is a critical issue that urgently requires a global, coordinated response. While local and even national initiatives certainly have their place, the Internet knows no boundaries, and an international cooperation will be the key to our success in winning the battles ahead. Industry players – whether broadcasters, ISPs, or mobile operators – are key to winning the fight against cybercrime and cyberthreats, and I am personally grateful for your support.

Dr Hamadoun I. Touré Secretary-General of the International Telecommunication Union (ITU)

Guidelines for Industry

“The UN Convention on the Rights of the Child defines a child as being any person under the age of 18. These Guidelines address issues facing all persons under the age of 18 in all parts of the world. However, a young internet user of seven years of age is very unlikely to have the same needs or interests as a 12 year old just starting at High School or a 17 year old on the brink of adulthood. At different points in the Guidelines we have tailored the advice or recommendations to fit these different contexts. Whilst using broad categories can act as a useful guide it should never be forgotten that, in the end, each child is different. Each child’s specific needs should be given individual con- sideration. Moreover there are many different local legal and cultural factors which could have an important bearing on how these Guide- lines might be used or interpreted in any given country or region. There is now a substantial body of international law and international instruments which underpin and in many cases mandate action to protect children both generally, and also specifically in relation to the internet. Those laws and instruments form the basis of these Guide- lines. They are comprehensively summarized in the Rio de Janeiro Declaration and Call for Action to Prevent and Stop Sexual Exploitation of Children and Adolescents adopted at the 3rd World Congress against the Sexual Exploitation of Children and Adolescents, in Novem- ber, 2008. 1 Executive Summary

rapid changes which have been It is hoped that this will not only These Guidelines have been happening around the Internet as lead to the building of a more prepared in the context of the the digital revolution continues to inclusive information society, but Child Online Protection (COP)1 pick up speed. also enable Member States to Initiative in order to establish meet their obligations towards the foundations for a safe and Convergence is now an protecting and realizing the rights secure cyberworld not only for established reality in many of children as stated in the United today’s children but also for future countries, and there is no doubt Nations Convention on the generations. that it is bringing with it a host Rights of the Child, adopted by of new challenges. Cooperation UN General Assembly resolution The information presented and partnership are the keys to 44/25 of 20 November 1989 and in these Guidelines has been progress. No one sector of the the WSIS Outcomes Document. developed by ITU and a team industry has a monopoly on of contributing authors from knowledge or wisdom. We can all leading institutions active in the learn from each other. 1 www.itu.int/cop ICT sector, namely, the GSMA, Interpol, Afrispa, the EBU, ITU, together with the other Telecom Italia, the Children’s authors of this report, is Charities’ Coalition on Internet calling upon all stakeholders Safety and Vodafone. to promote the adoption of policies and standards that will The range of partners brought protect children in cyberspace together to collaborate in the and promote their safe access to production of this document online resources. is itself a testament to the

Guidelines for Industry 2 www.itu.int/cop

Guidelines for Industry

This section provides guidelines for industry on child online protection. In order to formulate a national strategy focusing on online child safety, industry leaders should consider the following strategies in the areas mentioned below:

Key areas for consideration ICT Industry There is an urgent need for a common action that goes beyond individual ICT as a Whole organizations. These include: 1. Developing interoperable standards and related recommendations to protect children online. The aim would be to develop a widely shared approach which could be promoted across the whole industry. 2. Evaluate what options and possibilities exist for real global coordinated and consistent action to protect children online. Attention should be given to the elaboration of those capabilities (e.g. watch and warning and incident management) that would facilitate the gathering of threats and information sharing among different players. 3. Identify the commonalities that span the different sectors (broadcasters, Internet, mobile) with the purpose of developing Codes of Conduct, or code of practices to help ITU Member States collaborate more effectively with the private sector/industry. 4. Establish cooperative arrangements between government and the private sector/ industry for sharing information and developing specific capabilities aimed at mitigating the risks and extending the potential of ICT usage by children.

Guidelines for Industry 3

Key areas for consideration Broadcasters 5. Developing common rules regarding complaints systems. The aim would be to avoid a situation where external complaints functions are added to broadcasters’ own internal systems and potentially create more confusion with users or risk overloading police and other agencies with a large number of queries which their services are not designed or equipped to handle. Guidelines for Industry 6. Developing common standards and recommendations. The aim would be to develop a widely shared approach to protecting children online. This would be promoted across the whole industry. 7. Establish a pan-industry project to produce more robust procedures for obtaining parental consent for their children accessing age sensitive content at least on regional basis. Key areas for consideration Internet The following recommendations provide guidance to the Internet Industry & Internet Key areas for consideration Service Service Providers (ISPs) to support a safer environment for young users. Each of the Providers areas for consideration below should be included as part of a larger focus on user ICT Industry There is an urgent need for a common action that goes beyond individual ICT protection by responsible online providers. as a Whole organizations. These include: (ISPs) 8. The strategic objectives for the Internet Industry for child Internet safety should be to 1. Developing interoperable standards and related recommendations to protect children reduce the availability of and restrict access to harmful or illegal content and conduct. online. The aim would be to develop a widely shared approach which could be ISPs should also equip children and their parents with information and easy to use tools promoted across the whole industry. to help manage their use of the Internet in ways which minimize the potential dangers. 2. Evaluate what options and possibilities exist for real global coordinated and consistent 9. On Internet sites and on Web 2.0 services, language and terminology should be action to protect children online. Attention should be given to the elaboration of those accessible, clear and relevant for all users, including children, young people, parents and capabilities (e.g. watch and warning and incident management) that would facilitate the caregivers, especially in relation to the site’s Terms and Conditions, privacy policy, safety gathering of threats and information sharing among different players. information and reporting mechanisms. 3. Identify the commonalities that span the different sectors (broadcasters, Internet, 10. Reporting concerns, abuse and illegal behaviour: It is very important for Service mobile) with the purpose of developing Codes of Conduct, or code of practices to providers to have in place robust procedures for handling complaints. In particular, help ITU Member States collaborate more effectively with the private sector/industry. complaints about harassment and inappropriate content should be assessed speedily, and, if appropriate, the offending content should be removed promptly. To the extent 4. Establish cooperative arrangements between government and the private sector/ possible, service providers should consider having mechanisms, such as links to report industry for sharing information and developing specific capabilities aimed at abuse or flag profiles that may be inappropriate or that place the child or young person at mitigating the risks and extending the potential of ICT usage by children. risk, in place, and should be able to escalate any report to law enforcement if necessary.

Guidelines for Industry 4 www.itu.int/cop

Key areas for consideration

11. Service providers should consider making the ability to report a default presence on all web pages and services offered by the ISPs by means of a “report abuse button” to the extent possible. A common, recognisable button could be developed which will be always in the same location on every screen. The reporting mechanism could be enhanced by offering technical solutions to the reporting user such as the ability to attach screen shots, connection statistics, running process lists etc, as well as by informing the user what information they need to include with any report to make it effective.

12. Service providers should consider emphasising, in accessible and easily understood language, ‘what behaviour is and is not acceptable on the service’, particularly for young users and for their parents and caregivers. It is suggested that this information should be provided in addition to its inclusion in the Terms and Conditions.

13. Service providers should continue to evaluate the effectiveness of technologies that identify and verify the age of customers. The goal should be to implement a suitable solution appropriate to their individual service (this will be particularly important where the service in question is subject to legal restrictions based on age), to the extent that the solution is legally and technically feasible, and most importantly creates a safer, more secure Internet services. Such solutions might variously seek to prevent under age access and exposure to age-inappropriate content or services, or work to keep services provided exclusively for children adult-free. .

14. Service providers should consider proactively communicating with local or national law enforcement agencies to report illegal at soon as the provider is aware of it. They should have additional internal procedures in place within their organisation to ensure that they comply with their responsibilities under local and / or international laws with regard to illegal content. They should also consider actively assessing commercial content hosted on their own servers (either branded content or content from contracted third party content providers) on a regular basis to the extent possible in order to ensure that illegal or potentially harmful content is not accessible through their network. Tools such as hash scanning and image recognition softwares are available to assist with this. .

Guidelines for Industry 5

Keys areas for consideration Mobile The following is a “checklist” of suggested areas for mobile operators to consider when reviewing their Operators approach to , both in terms of providing a safe and appropriate mobile environment for their younger users and in terms of combating the potential misuse of their services for the hosting or distribution of illegal child sexual abuse content: 15. If offering content and services that are not age-appropriate for all users, ensure that content is classified in line with national expectations, is consistent with existing standards in equivalent media, and is offered together with age-verification, where possible 16. If possible, work with other operators in your market to agree and promote a set of industry-wide commitments on offering age-sensitive content appropriately. 17. Provide tools which enable access to content to be controlled by the user or a parent/ caregiver. Again, these should be consistent with national expectations and standards in equivalent media. 18. Clearly signpost the nature of content and services offered, so that users are empowered to make informed decisions about their content consumption and any commitment (e.g. minimum subscription period) that they may be undertaking 19 Support parents in understanding the full range of mobile content services that their children may be using so that they can guide their children towards appropriate mobile usage 20. Educate customers on how to manage concerns relating to mobile usage generally – including areas such as Spam, theft, and inappropriate contact e.g. bullying – and ensure that you offer customers a means of raising any concerns 21. Use your customer Terms and Conditions to explicitly state your company’s position on the misuse of its services to store or share child sexual abuse content, and its commitment to support investigations by law enforcement of any abuse consistent with national legislation; have Notice and Take Down (NTD) - or equivalent - processes in place; support national hotlines or equivalent, where they exist..

Guidelines for Industry 6 www.itu.int/cop

Background

Today’s digital world has Moreover, as the number of transformed individual lifestyles channels for service delivery the world over. The computing diversifies, the sector’s traditional industry has long been all-digital, and less traditional businesses face the telecommunications industry a number of new dilemmas. is almost fully digital and the broadcasting sector is well on the way to becoming digital. Always- Collaborating as an on Internet access has become the Industry norm, with people spending more In the converging media world and more time consuming digital of today traditional distinctions media than any other medium. between different parts of the telecommunications and Daily lives from China to Italy mobile phone industries, are brimming with SMS, e-mail, chats, online dating, multiplayer between Internet companies and gaming, virtual worlds and digital broadcasters, are fast breaking 1. multimedia. down or becoming irrelevant. Convergence is drawing these Although these technologies hitherto disparate digital streams mean added convenience and into a single current that is enjoyment for many, regulators reaching out to billions of people and users alike are often one step in all parts of the world. behind the fast-paced innovations Against this background the in this field. ITU, in collaboration with

Guidelines for Industry 7

GSMA, Telecom Italia, European repository because of the hosting, Broadcasting Union, Interpol, caching and storage services Children’s Charities’ Coalition which they provide. The same on Internet Safety, Vodafone is true for the mobile phone and Afrispa, has prepared these networks, many of whom now Guidelines for Industry on Child extend their functionality well Online Protection. Its aim is to beyond the original business provide a common framework of connecting voice and data for all parts of the industry to exchanges. Broadcasters similarly work towards the shared goal of have become major players in the making the Internet as safe as Internet space, providing many possible for children and young of the online services which people, for example, by producing previously were only associated codes of conduct or authoritative with ISPs or online hosting sources of advice and guidance. companies. However, because of their enormous brand presence, Internet Service Providers in typically established for many particular have long accepted that years prior to the arrival of the Each of the sectors working industry as a whole is delighted they have a distinct responsibility Internet as a mass consumer together in this collaborative to be able to advance the wider with regards to child online product, broadcasters’ sites project brings its own history promotion of a safer Internet protection. This is largely due frequently attract enormous and its own particular areas of for everyone, but above all for to the fact that ISPs act as both followings. expertise. By working together children and young people. a conduit, providing access to in this way, by pooling that and from the Internet, and a knowledge and experience, the

Guidelines for Industry 8 www.itu.int/cop Classifying Content and Services The notion that not all content With more traditional content and services are suitable for (e.g. video clips) it is often a universal audience is well- possible to apply an age-rating understood in the “offline” by benchmarking standards world – for example, films and against existing frameworks games have age-ratings, and TV from equivalent national – or programmes with content of potentially regional, depending a violent or sexual nature are upon the degree to which subject to time-based restrictions. social sensitivities are shared - media, such as games or films. Where online content is exactly However, the growing range the same as the “offline” version of exciting interactive services (e.g. a game or film which differs including message boards, solely in terms of the access chat rooms, social networking channel), it is possible to re-use and user generated content existing ratings or classifications. services, whilst being harder However, where content is new to “classify” in the traditional 2. or modified, online content and sense, can also pose potential service providers have to find risks to younger users relating methods of communicating not just to the consumption the nature of that content and of age-inappropriate content, the target age-range to their but also inappropriate conduct customers. (e.g. bullying) and contact (e.g. grooming).

Guidelines for Industry 9 Classifying Content and Services All of these issues are dealt concerns about age-sensitive concern (such as strong language within the sub-sections below. content through time-based or violence) rather than being The Broadcasters sub-section scheduling – for instance, by presented with simple age ratings. deals with the issue of making broadcasting content that is only traditional content available suitable for older teenagers or Because of this, some through a new medium, the adults later in the evening or at broadcasters have developed a Internet Providers sub-section night (after the “watershed”), labelling system e.g. the BBC looks at the content, contact when younger children will be developed the ‘G’ for Guidance and conduct issues relating asleep. labelling system where a ‘G’ is to managing non-traditional displayed when a piece of content online services, and the Mobile However, as broadcasters contains challenging material Operators sub-section provides increasingly make their content and the nature of the content an overview of how operators available online on a non-linear is spelt out in text alongside across the globe are approaching “on demand” basis, where direct the programme synopsis. The the issue of classifying and parental supervision cannot presence of the ‘G’ is used to managing mobile content and be relied upon and time-based trigger parental PIN control services. scheduling no longer applies, systems, if enabled. broadcasters have been exploring ways to make their content Broadcasters available in an age-appropriate Television broadcasters have fashion. Note: unless otherwise stated, the term ‘broadcasters’ in this document refers traditionally been able to use specifically to providers of traditional broadcast-type content, in the sense that the ‘broadcaster’ has creative and editorial control over the content made available, whether the linear ‘broadcast’ nature of Research indicates that in general parents want to know about the ‘on air’ or, as is the focus of this document, online. The term is not intended to include television viewing to manage providers of services which enable the publishing of content created by others – such types of content that may cause organisations fall within the Internet Service Providers category.

Guidelines for Industry 10 www.itu.int/cop

Case Study: British Broadcasting Company (BBC) – United Kingdom

Through its iPlayer programme is not suitable for a can be viewed. A PIN protection educational services offered by proposition, which provides universal audience (i.e. all ages), system will be available from BBC Learning. online access to BBC it carries a Guidance warning – launch and the BBC is currently programming on a non-linear in this case, a ‘G’ sign and text looking into ways to strengthen 1. The CBeebies (www.bbc. (or “on demand”) basis and label explaining the nature of the this even further as streaming and co.uk/cbeebies) and CBBC also currently contributes 9% content are displayed at the point downloading are integrated into (www.bbc.co.uk/cbbc) websites of total Internet traffic in the user decides to download the one system. enable children and their the UK, the BBC has build content. At the point of viewing, parents or carers to interact up significant experience in the text label is also displayed and The BBC’s ‘G’ for Guidance with us and each other in a managing the responsible the user has to enter their PIN system has also been adopted by safe, trusted and accessible delivery of age-sensitive number, if enabled, before they other terrestrial broadcasters in environment. The sites provide content. can view the content. Anyone the UK including ITV, Channel high quality, engaging and using the iPlayer without the Four and FIVE for their online relevant interactive content and On the current BBC iPlayer, correct PIN code receives an On Demand offerings. experiences for children, as installation is restricted to explanatory message stating that well as acting as a springboard those aged 16 and over – they do not have permission The BBC has a very clear strategy to the best appropriate external Users are also informed about access to the ‘G’ rated content. of supporting children from websites for the under-12s. PIN protection during the birth through to early adulthood, registration process and have to The BBC will shortly introduce with three sites that reflect the 2. The focus is on empowering make a decision about whether streamed content to the varying age-appropriate levels children and giving them the to enable it there and then. If iPlayer and, where appropriate, of protection, computer literacy, opportunity to gain a deeper they choose not to, they are told programmes will also display the independence and maturity as relationship with the BBC, the how they can enable it later. If a ‘G’ and text label before content they grow up, as well as specific brands and characters,

Guidelines for Industry 11

increasing the value they 3. BBC Switch provides an Blast – creative development Content Information Group. receive, the ownership online space for all teenagers, for teenagers, currently focused The BBC is also an associate they feel, and the impact with content aimed at engaging on creative arts, including member of the Association they have on CBeebies young people, addressing their partnership with youth arts for Television on Demand and CBBC. To achieve interests, and encouraging organisations (www.bbc.co.uk/ (ATVOD), the self-regulatory this, the sites offer a range interaction. The site contains blast) body for On Demand services. of innovative interactive both supporting TV and radio tools and creative programmes and free-standing Some services are designed for opportunities aimed at all content. (www.bbc.co.uk/switch) use in the classroom; others are British children, of every increasingly used directly by ability and background, 4. BBC Learning provides learners at home or at school, giving them the space to output for school-aged children without the need for tutor publish their own content, across a broad range of subjects mediation. thoughts and opinions. We and skills. The following are also provide a dedicated linked to curriculum or specific The BBC works closely with 24/7 news service for skills. Ofcom (the UK’s media and children online as part of telecommunications regulator) Newsround and through Bitesize – revision and recap and a number of broadcasters the PressPack section we service for all major subjects for and platform providers to can actively engage children children aged 5-16 (www.bbc. promote best practice on in the topical issues that co.uk/schools/ks3bitesize) labeling; the BBC has also been matter to them. an active participant in the BSG

Guidelines for Industry

13

Internet Service information such as where in complex and extensive one-to-many and many-to-many they live, interests and tastes ‘game worlds’ and where they bases. This clearly increases Providers (for example in music, films can interact and talk to each concerns about unwanted Generally Internet content or books) as well as photos or other during play. contact and, in some cases, illegal videos, music tracks and links conduct. Making the distinction and Web 2.0 services are terms Frequently, these categories to friends’ profiles. They may between contact and conduct referring to the increasing use overlap and these networking sites also include facilities for chat, is useful in order to understand of the Internet by individuals are increasingly being seen as part to create and distribute their file sharing, blogging and differences, overlapping and discussion groups. of youth culture, as reported in own content, in audio-visual as the complete and independent possible countermeasures. The well as in written form. Specific key distinction is that: ‘contact’ l Online communities UK review looking at the risks to examples of Web 2.0 services and social worlds where children on the Internet and in refers to a situation in which include: participants select, customise video games. the child is the receiver of the or create characters, called communication/message (the l User generated content It can be useful to make ‘victim’); whereas ‘conduct’ refers sites such as wikis, blogs and ‘avatars’. Their avatars distinctions between potential to a situation where the child is image-sharing sites, which can build houses, furnish risks based on “content”, the instigator of the inappropriate are designed specifically for environments, interact with others and even exchange “contact” and “conduct”, behaviour (the ‘perpetrator’)3. users to upload, share or view according to a structure put content. virtual money while Other commentators have added purchasing and selling items forward by EU Kids Online a further two categories which project2. With Web 2.0 and l Social networking sites in a multi-player virtual world. it is worth bearing in mind: where users display their with the relevant increasing “commerce” – which refers to personal ‘profile’, including l Online gaming where interactivity, communication is the possibility of children and players play with other, often now possible on one-to-one, young people being exploited by

2 www.eukidsonline.net/ Note: Sections on Internet Service Providers discuss approaches available to the Internet industry as a whole. This includes Internet access providers, as well as electronic service providers / providers of content and services – these are referred to collectively in this document as Internet Service Providers (ISPs). As such, it should be noted, that not all recommendations will be applicable to all ISPs. 3Safer Children in a Digital World: the report of the Byron Review, ( http://www.dcsf.gov.uk/byronreview/ ).

Guidelines for Industry 14 www.itu.int/cop

unscrupulous companies that l Reduce Availability: reduce An important consequence software, safe search, and age take advantage of young people’s the availability of harmful and of the nature of the Internet verification on websites). inexperience or it refers to inappropriate content, contact is that there is no obvious problems such as phishing where, and conduct (industry); single point at which editorial An example of the role of again, younger people might be control can be exercised, Internet Industry working in l Restrict Access: equip more vulnerable; finally there can unlike broadcast media where co-operation with families is the children and their parents be issues of “addiction”, which the channel exercises editorial following: with effective tools to manage refers to the way in which some control. Editorial controls access to inappropriate content 1. User generated content children and young people can exist (e.g. moderators of user (industry and family); websites take down harmful become obsessively engaged with generated content sites) but and inappropriate material l : build technology in such a way as to Increase Resilience they are widely dispersed across uploaded to their sites. present an obstacle or a barrier children’s resilience to the the ‘Internet value chain’. This to them developing normal material to which they may value chain contain content 2. Children and parents report relationships with other people be exposed; equip children to producer, content aggregator, harmful and inappropriate or taking part in healthy physical deal with exposure to harmful Internet Service Providers material to host websites activities. and inappropriate content and (ISPs) and Web host, search, when they find it. contact, and equip parents directory and web providers, From the Internet Industry to help their children deal consumer device, etc. 3. ISPs block access to illegal point of view, there are three with these things and parent material such as child abuse key strategic objectives for child effectively around incidences At each point of the value chain, images. Internet safety, which require of harmful and inappropriate there are a range of technical industry and parents/caregivers tools that can help parents 4. Parents install software conduct by their children to filter out harmful and to take joint responsibility for (parents). manage their children’s access to increasing children’s safety the Internet (e.g. parental control inappropriate content. online:

Guidelines for Industry 15

5. Websites provide clear and l Base the moderation process understandable and age- Restricting access: easily visible advice about upon reports from the user appropriate. Reports should The objective of restricting how to stay safe. community - responding be acknowledged and acted access to in appropriate effectively to reports from upon expeditiously. Users content can be dealt with in the 6. Parents talk with their more than one user, and from should be provided with following ways: children and children talk long-standing users (based on the information they need with their friends and siblings their level of activity or rating to make an effective report l Parental control software, about e-safety. or reputation they have been and, where appropriate, an which enable parents to given by other users), can help indication of how reports are manage their children’s access Reducing availability: create an active community typically handled. to Internet resources. which “self-polices” and seeks l l Safer Internet tools, including The objective of reducing to keep themselves and others Link reports of abuse to parental controls, ideally would availability of harmful and safe online. “Notice and Take Down” inappropriate content, contact processes – with a public allow the following types of and conduct can be met by l Provide a mechanism for service level agreement on the categories: White Lists, Content service providers undertaking reporting inappropriate response or take down times. filters, Usage monitoring, the following: content, contact or behaviour Contact management, Time/ as outlined in their Terms l Avoid harmful or program limits. l Adopt an effective inappropriate advertising of Service, Acceptable l Deliver new computers or content online. moderation process of Use Policy and / or User Internet services access with user generated content – for Guidelines - mechanisms parental control software example, MySpace conducts a should be easily accessible enabled by “default”, linked post-upload review of every to users at all times and the to prominent safety messages image and video posted on its procedure should be easily which explain what the site default settings do.

Guidelines for Industry 16

l Adopt “safe search”: most l Network level blocking, resilience (e.g. by providing of Practices; these Codes would search engines offer a safe where, on a national-based safety advice), parents and others be more transparent than good search option, which does criteria, some material on the working with children are likely practice guidelines, provided not return results containing Internet, such as child abuse to have the most impact here and that the body that oversees/ images or keywords which images, is clearly illegal. so have the greater responsibility. coordinates them is effective in would be considered monitoring them and publishing inappropriate for children. Increasing Resilience: These overlapping, but differing, the results. Mechanisms could roles for industry and families also be developed within these l Adopt appropriate age Increasing the resilience of across the three objectives are frameworks to give parents and verification methods to prevent children in managing risks very important and suggest a children a voice. children accessing age-sensitive is an important objective need for a national-base and content, sites or interactive and is interdependent and shared strategy to keep children services, such as chat rooms, Mobile Operators complementary with the other safe online, that is capable of etc. where risks of inappropriate two objectives of reducing influencing and empowering contact and conduct exist. As growing numbers of mobile availability and restricting access. both industry and families. operators offer their customers l Content labelling: Providers of professionally produced Although parents and children By looking at the strengths access to a rich and compelling content (i.e. games, broadcast- have a role in reducing the and weaknesses of existing range of content services, style editorially controlled availability of harmful and arrangements to improve child including games, music, video content) should provide a inappropriate material (e.g. by Internet safety, and looking and TV programming, they clear external label describing reporting abuse to host sites), to the different country-based are faced with the challenge of the content on their sites this is mainly a task for industry. existing laws, the Internet how to manage customer access to indicate its suitability for And although industry does Industry can usefully develop to commercial content which children. have a role in building children’s self-regulatory national Code would have been subject to age- 17 Case Study: MySpace’s “Big Six” safety practices for social networking services

• Image and Video • Meaningful Efforts to • Cooperation with Law Review: Sites should Enforce Minimum Age Enforcement: All find ways to review hosted Requirements: Sites sites should have law images and videos, deleting should enforce their enforcement hotlines inappropriate ones when minimum age requirements available at all times to found. and take steps to identify assist law enforcement and remove underage users during emergencies and on • Discussion Groups who have misrepresented routine inquiries. Review: Social networking their age to gain access. sites should review discussion groups to find • Protection for Younger harmful subject matter, hate Users From Uninvited speech, and illegal behavior, Communication: Social deleting that content when networking sites should it is found. implement default privacy settings that prevent adults • Removing Registered from contacting teens Sex Offenders: Social under 16 who they do not networking sites should ban already know in the physical registered sex offenders world. from setting up accounts on their sites using technology that already exists today. 18 www.itu.int/cop

restrictions if accessed through classification systems. The However, given the practical music and games into either the different channels. classification systems are typically challenges involved in mobile ‘Cellular Accessible’ (general) or designed to manage commercial operators establishing the age ‘Cellular Restricted’ (18-rated) The increasing range of new mobile content – i.e. content of the end user, a number of categories, the results of which community and interactive which mobile operators produce markets (for example, Australia, are summarised by the CTIA as services available to users also themselves or where they have Denmark, New Zealand) have follows: come with concerns about users’ a commercial involvement with currently committed to operating age. For example, many major third parties – and are based on a simple two-tier classification This binary approach allows Social Networking Sites have accepted national standards and system: content which is suitable the sale of a full range of minimum age-requirements consistent with approaches taken for adults only, and other / legal commercial content by stated in their Terms of Service, in equivalent media (e.g. games, general content. mobile operators and third as there are concerns that film). parties whilst meeting national younger users face risks – such For example, the Australian acceptability tests; it ensures as identity theft or inappropriate Indeed, where possible content code has simply mapped across that the area of greatest risk is contact – relating to posting classifications from other criteria and ratings from the managed, and also reflects that too much information about industries should be re-used. An existing Classification Board to the age of majority is the point themselves, and so on. example might be of a film the ‘restricted’ (adult 18-rated) at which it is most practical to or film trailer or a PC game and ‘unrestricted’ (general) age-verify (for example, through In order to provide a shared and (assuming that the images are categories used in the mobile presence on the electoral role or transparent approach, mobile repeated in the re-purposed arena, while operators in the credit card ownership). operators and content providers for mobile version) so that USA - under the auspices of in a number of countries are customers’ experiences of the their trade association, CTIA - Some markets, however, responding to this challenge same content are consistent have created a grid which maps are moving towards a more by working together to agree across national media. existing standards from TV, film, granular approach. Germany has

Guidelines for Industry 19 Case Study: Wireless Content Guidelines Classification Criteria USA adopted a three-tier system for classifying commercial content Mobile content will be classified • Hate speech which is broadly based on the as Restricted Carrier Content • Graphic depiction of illegal German ‘FSK’ film classification or Generally Accessible Carrier drug use system: Content based on existing criteria used to rate movies, • Any activities that are l General content / services: television shows, music and restricted by law to those 18 available to all by default games. years of age and older, such as gambling and lotteries l 16-rated content / services: available to all by default, Content is generally considered Any content that has not been parents can choose to apply a “Restricted” if it contains any classified as “Restricted Carrier block of the following restricted content identifiers: Content” will be considered l 18-rated content / services: “Generally Accessible Carrier blocked by default to all users, Restricted Carrier Content: Content” and will be available to all consumers. adults must be age-verified • Intense Profanity In France, a recommended • Intense violence Further details of the Wireless Content Guidelines can be four-tier classification system • Graphic depiction of sexual found on the CTIA website: (‘all users’, 12-rated, 16-rated, activity or sexual behaviors > http://www.ctia.org/advocacy/ 18-rated), created in consultation Nudity with a broad spectrum of index.cfm/AID/10394 stakeholders under the auspices of Le Forum des droits sur l’Internet, was announced in

Guidelines for Industry 20 www.itu.int/cop

October 2006. The four different l Contrôle parental renforcé: was launched by the industry- partners and therefore reduce levels will facilitate the handling blocks access to 12-rated funded Independent Mobile costs and increase efficiencies of challenges relating to managing and 16-rated content, all Classification Body (IMCB: for the industry as a whole. access to interactive services and user-generated / interactive http://www.imcb.org.uk/) in They also make the classification user generated content – much of services, the Internet. 2005. In addition to formulating system more transparent for which is suitable for older teens the classification criteria, the customers, particularly for Content classification systems but is neither ‘adult rated’ nor is it IMCB can provide advice or act third party services promoted are either defined by the appropriate for younger teens and as an arbiter in (the extremely independent of the operator operator community itself or children. rare) disputes over classification portal (for example, in outsourced to a third party of individual items of content. magazines), and allow for the organisation with relevant To access 18-rated content, consistent introduction of tools expertise. Many countries users will have to age-verify; It should be noted that not all such as pre-determined adult (including Denmark, Malaysia, the 12-rated and 16-rated tiers content classification systems short codes for premium SMS Singapore, and New Zealand, will correspond to two levels of relate to age-sensitivities: services, which can facilitate the for example) have simply parental controls as follows: Malaysia and Singapore use a implementation of age controls. defined the classification binary content classification l Contrôle parental de premier boundaries within or as an system based on existing niveau: blocks access to appendix to their national Code national standards, however this 16-rated commercial content, of Practice itself. is based on ‘acceptable’ versus user-generated / interactive ‘unacceptable’ content, and there Others, including France services that facilitate is no distinction based on age. meetings (e.g. dating sites), above, have had classification the Internet. criteria defined through a third Shared content classification party organisation. The UK’s systems simplify self- two-tier classification system classification for content

Guidelines for Industry 21 Content Control Mechanisms Providers of online content and minimum age. To ensure that services are developing a range of younger users are only consuming approaches for enabling the age- age-appropriate content and appropriate control of content in services, broadcasters use a range the online world. These include of techniques such as: mechanisms to restrict access to content until the user has proven l Single Sign On processes – his or her age (“age-verification”) For example, at BBC online as well as controls made available services, when children sign to parents to enable them to up to the message boards, they place restrictions on their child’s are asked to provide their date consumption of online content of birth. This is then used to and services. determine whether they are old enough to access the service – and they are not able to change Broadcasters the original date of birth at a later date if they discover that Broadcasters offer a range of certain content is unavailable to 3. content and services online, them because of their age. including some which is only suitable for users above a certain

Note 1: mechanisms to combat the presence of illegal online content, in particular child sexual abuse content, are discussed separately in the next section. Note 2: more detailed information regarding broadcasters and user generated content can be found in section 6.

Guidelines for Industry Guidelines for Industry 23

l Parental Consent via email regulation4, have adopted a Internet Service if the law does not require it, - For example, the BBC is more drastic approach on there may be well-established presently engaged in a range the web, than on their air- Providers expectations that children and of trials to review the use of waves. RAI Italy, for instance, It is important for Internet young people should not be able parental consent by email, has a restrictive policy and Service Providers to offer to access adult content. In that and a registration system doesn’t publish on its web controls which prevent access connection ISPs and others may that would allow parents to sites any content that has not to certain types of content and wish to consider developing or decide what activities their received the “clearance for service. using age-verification systems children could engage in on all the family” classification, as a means of ensuring legal PSB websites and what level (distinguishable by a white In many countries the national compliance. of reporting they would butterfly). All content with a law will specify that certain receive. The BBC is also yellow butterfly (to be seen types of content, or services Internet Service Providers reviewing what rules should with an adult) or a red one should not be made available should keep in mind that simple apply for teenagers up to 16, (restricted only to adults) are to children (ie. those users click-through age-confirmations, and whether they should have not currently available on the who are below the legal age of which require the user to state access to greater levels of Internet. majority / adulthood). Where they are over 18, are not reliable interaction before they need such content services are because they rely solely on the to ask for parental consent”. being offered on commercial user’s integrity. terms by ISPs, a method for l Many public service However, it is also important verifying adult status should broadcasters, at the moment, to be aware that even solutions be implemented. Alternatively whilst waiting for better which seek to confirm the age

4 It is worthwhile to note that the BBC has expressed some caution about how to allow users to activate a “red button” if they come across material that is harmful, explicit or worrying to them. The main concern is that in by having too many options, this may drive users to other less reputable, unregulated sites. It is essential that broadcasters maintain their reputation as a safe environment and so ensure that critical safety alerts are not off-putting.

Guidelines for Industry “The industry is demonstrating commitment to developing a responsible approach to children’s use of online ICT and communications” 25

of the user – for example, by upon for age-verification as a user under the age of 13 lies requiring credit card or ID these details are often known by about his or her age, employs a details – cannot be entirely others (e.g. family members). search algorithm, using terms guaranteed: an underlying commonly used by underage concern for all age verification Such approaches could also users, to find and delete methods is that identity potentially infringe on the underage profiles. MySpace’s verification on the Internet is user’s right to privacy – for site is scanned for such terms difficult because it is virtually example, ID cards disclose and the database of search impossible to know whether personal details (e.g. date of terms is updated to reflect the individual user supplying birth) beyond those which are changes in user behaviour and the information is indeed the strictly necessary to confirm terminology. individual whose information is that the user is above the age of being supplied. Although a user majority. Many major Internet Access may provide certain information Providers now offer parental ISPs are becoming increasingly when registering with a control solutions which help creative about managing website, there is no efficient or parents to manage which sites, challenges relating to age- effective way to ensure that this content and services their child sensitive content. For example, information has been entered can access. MySpace requires in its Terms truthfully. For example, the use and Conditions of service that of government-issued national all users are 13 years or older ID cards with associated PINs and, to combat a situation where cannot necessarily be relied

Guidelines for Industry 26 www.itu.int/cop

Case Study: Telecom Italia and the protection of children – Italy

In addition, Telecom Italia, in To allow children and detailed control of the parents. learning and use a lot of order to comply with the very adolescents to surf the web The targets for this service are instructive materials; restrictive national Italian Law7 safely, Telecom Italia has children of 10 years and under. • Global Parental Control about child protection, and to taken steps to inhibit content Interface, that allow to the ensure a global response for the that offends their psycho- The principal characteristics of the parent to control and to security and safety of citizens physical integrity, described product are: define the children’s “walled who use its commercial services, on the Group’s portal5, and • PC protection from improper garden”. has launched a programme of has provided its customers use by the children (avoiding close collaboration with the with protective services and damage of files, configurations, The safe environment can be Italian police forces and with the instruments, capable of installed software of the parent, used by the children in a very specialized National Center for fostering safe surfing6. etc.); easy way, with different desktop combating Child Pornography themes, a personalized Internet 8 The most important tool for • Safe Internet surfing, based on Online (CNCPO) , by making browser (“My first Browser”) highly specialized technological children is the software Alice’s a white list of preferred websites where the child can only visit infrastructure available and Magic Desktop which is a provided by the parent; the “preferred” web sites implementing a filter system to simplified operating system, • Email client, specific for approved by the parent; a Magic running on normal PCs. Alice children, with a dedicated block sites communicated by email program with which CNCPO. Magic Desktop allows children Graphical User Interface and a email coming from not allowed to use PCs and the permitted pre-defined address book by the email addresses are posted to a Internet functionalities in a parent; “quarantine” folder for parent’s secure, amusing and educational • Web games and tools for verification prior to being way, under the granular and children, dedicated to playing, passed to the child. 5 www.telecomitalia.com, Sustainability->Hot Topics-> Protection of Children and Abuse Source: Telecom Italia 6 Alice Total Security and Alice Magic Desktop, http://adsl.alice.it/servizi/index.html

Guidelines for Industry 27

Moreover, in order to combat Although parental controls Age-verification mechanisms However, a number of and prevent the diffusion of solutions are improving all the operators across the globe child sexual abuse content time, they cannot be expected The “age-check” tools available are addressing this challenge (child pornography) and protect to provide complete safety – to more traditional retailers through the development of children, Telecom Italia has however, in conjunction with and broadcasters of media age-verification systems. To made a helpline/reporting teaching children responsible and content are not readily date, these typically focus on mechanism available on the Internet practices (see Customer transferable to the mobile age-verifying adults who wish web for reporting illicit content Communications and Education, content environment. For to have full access to all content encountered by users while below), parental controls can example, with mobile content and services. It should be navigating the Internet. These help provide younger users with there is no opportunity to do noted that where operators are reports, which can be made a safer online experience. a visual check at the “point offering commercial content anonymously and by filling out a of sale”, such as can be used and services that are subject to web standard form, are analysed in cinemas and shops; nor, legal age-restrictions this is of and promptly forwarded to the Mobile Operators given the personal nature of particular importance. Postal Police (CNCPO), which the mobile device, can mobile will investigate the alleged Mechanisms for controlling operators rely on parental crimes since this type of activity access to age-sensitive content supervision in the same way is entrusted exclusively to police fall broadly into two categories: that TV broadcasters have traditionally been able to do. force. l Age-verification mechanisms l Parental controls

7 Italian law 38/2006, to combat the sexual exploitation of children and pedopornography, including over the Internet; Italian Legislative Decree 70/2003, which regulates e-commerce and ask Telco Operators such as Telecom Italia to provides reporting to the competent authorities of cybercrimes involving the network infrastructure and child’s sexual abuse notices; EU Convention on Cybercrime, signed at the Council of Europe on 23 November 2001, ratified in Italy with Law 48/2008 8 http://www.poliziadistato.it/articolo/10232-Centro_nazionale_per_il_contrasto_alla_pedopornografia_sulla_rete

Guidelines for Industry

29

Different operators are taking Due to the difficulties of Many operators, from a range Most parental controls systems different approaches to age- verifying age prior to adulthood of countries, have already currently focus purely on verification, based on leveraging in the virtual / ‘online’ introduced parental controls commercial content, reflecting existing options such as: environment, operators enable systems – some propositions the area where the operator has parents to control younger focus purely on blocking access the greatest degree of control l National ID schemes users’ access to content and to age-inappropriate commercial and, therefore, responsibility. l Credit cards services through the application content, others are combined Operators in Japan use a black / l Tax / fiscal codes of parental controls rather than with additional features such as white list approach to websites l Electoral rolls attempt to verify the age of time or spend controls. when parental controls are every end user. applied and some operators in l Face-to-face ID check in-store With some exceptions, including other markets have Internet or through e.g. post office operators in France, who have Parental Controls filtering systems in place, but l Contract status / existing already allowed for two levels most operators have to yet to relationship with billpayer Whilst age-verification of access, and a few other introduce Internet filtering as mechanisms mean that operators operators across the globe who part of their parental controls Once age-verified at adults, are proactively implementing have developed different multi- proposition. users are either given an ‘adult systems to ensure that individual tiered parental control, most PIN’ which needs to be entered customers are above the systems tend to be either ‘on’ whenever the user wishes to minimum age required to access or ‘off ’ options, with access access adult-rated content or given items of content, parental to a set level of age-sensitive services, or an ‘adult profile’ controls rely upon parents commercial content or services is applied to their account and taking the initiative and applying (e.g. 18 or 16-rated) blocked any restrictions on content and parental controls as they deem when switched on. services are removed. appropriate for their child.

Guidelines for Industry 30 www.itu.int/cop

As an interim measure, a Other options for consideration number of operators are simply include mobile operators blocking access to the Internet installing parental controls on when parental controls are branded handsets as a default switched on. and, potentially, mobile phone manufacturers putting software It is likely, however, that the on their phones which can growing trend towards using empower parents to control mobiles to access Internet-based usage and restrict who their services will speed the roll-out child can contact, and who can of Internet filtering tools. contact their child. Naturally, given the onus that is placed upon parents or caregivers to apply the controls, promotion and awareness- raising of this option is key to the overall effectiveness of the proposition in terms of protecting younger users. Similarly, operators must ensure that parents understand that they can only control content carried by their own networks

Guidelines for Industry 31 Case Study: ATT MEdia™ Case Study: NTT Net Parental Controls – DoCoMo Parental Controls – USA Japan

AT&T’s parental controls is shut off. “Off ” has no DoCoMo provides various gambling, violence, dating, proposition is made available restrictions and all content levels of content filtering (e.g. chat services and discussions to customers free of charge. It is visible and accessible. The ‘Kids’ i-mode filtering and boards); the “Kids’ enables parents to restrict their default content filter setting is i-mode filtering) plus a ‘time i-menu”, which contains children’s access via mobile “Off ”. restriction’ option which can sites specifically designed to mature content as well as be used alone or in parallel for children, becomes the Controlling MEdia™ Net offering the option to restrict with the other levels of content default menu setting. the purchase of downloads, Purchases: parents can set filtering. All three options are such as games and ringtones. Purchase Blocker to “On” or offered to customers free of 2. i-mode filtering: allows “Off.” When the Purchase charge: access to sites on the Controlling Content: parents Blocker is “On” children will i-mode menu and also to can set Content Filters to “On” be prevented from purchasing 1. Kids’ i-mode filtering: independent sites which do or “Off.” When the content premium content, including allows access to sites on not contain harmful content. filter is “On”, access to sites ringtones, downloads, games i-mode menu only (content with mature content (e.g. chat, and graphics. “Off ” allows all providers on the i-mode 3. Time restriction: prevents dating) on AT&T’s MEdia™ purchases. The default Purchase menu are contractually access to any site (whether Net portal is restricted and Blocker setting is “Off.” . forbidden from offering i-mode or independent) access to the broader mobile ‘harmful content’, including between 22.00 and 6.00. Web via the search function adult and sensitive content,

Guidelines for Industry 32 www.itu.int/cop Customer Communications and Education In order to enable users to Broadcasters make informed decisions about the content and Broadcasters who make services they may choose to programmes that are popular use, as well as empowering with children and younger parents and teachers to users are likely to have a guide children and teenagers correspondingly younger online towards a safe, responsible and “audience”, and therefore have appropriate online experience, a particular responsibility for telecommunications and content promoting messages about companies are increasingly keeping safe online. investing in education and communication programmes.

This section provides a range of potential approaches taken by providers of online content and 4. services.

Guidelines for Industry 33 Customer Communications and Education Broadcasters are also well- If a child posts a message which Therefore, a tick-box solution positioned to exploit the suggests that their parents don’t or email verification is not popularity of their content to know or don’t want them to use sufficient to acknowledge that deliver simple messages that broadcasters on/line communities, an informed parent / guardian will help younger users fight usually the webmaster will message / teacher is actually monitoring issues such as “cyberbullying” or the user making it clear that they the child’s activities and does invasion of privacy. must have parental/guardian little to help those children who permission to use the message fall on the wrong side of the Other approaches that can be boards. digital divide. Some pan-industry adopted by broadcasters include exploration into more robust encouraging children to seek Some organisations require parental consent procedures that parental consent before using parental verification by return are socially inclusive and not particular services. When email for added security. open to abuse is welcomed in creating a user account, children However, for instance, the BBC’s this area. can be advised to ask their own user testing experience parents’ permission, and make suggests that many children share sure that their parents are aware their parents’ email addresses that they will be using services which would undermine the such as message boards. The efficacy of the system, and that Terms and Conditions of use a proportion of BBC audience can also make it clear that only access CBBC through after children should have a parent school clubs, either because they or guardian’s permission before don’t get that support at home or using message boards. because they don’t have access to the Internet.

Guidelines for Industry

35

Internet Service l Education of children on of subscription, how to cancel Providers safer Internet use; subscriptions, and so on; l Definition and communication These areas are each dealt with The Internet industry has of clear Acceptable Use in greater detail below. a responsibility to review Policies, and Terms and the role and importance of Clarity - about the nature of Conditions; communicating with customers content, Terms and Conditions, l Definition and updating of in terms of: Acceptable Use Policies: policies to comply with any relevant national code, as l Clarity about nature of ISP are increasingly content, Terms and Conditions regards safer use of Internet by recognising the importance of (T&Cs) and Acceptable Use younger teenagers and children. communicating clearly about the Policies (AUPs); nature of contents and services, Awareness raising - through l Awareness raising, through so that all users – including specific web areas dedicated to the specific web areas dedicated younger users – can make Internet threats and the available to Internet threats and the informed decisions about their tools for children protection: available tools for children consumption. protection; ISPs can facilitate the raising of Clarity for Internet Industry awareness concerning children’s l , through on-line Collaboration means: protection by displaying clearly reporting forms; visible information about safe l Signposting age-sensitive l Information for parents and use of the Internet and about teachers about child online content; tools for children’s protection safety; l Communication with regard on their website. This specific to pricing of content, terms web area would be intended to::

Guidelines for Industry 36 www.itu.int/cop

l Promote awareness and Collaboration - through on-line Information for parents and districts to provide on line discussion about Internet report forms: teachers: safety curricula for children threats and the protection and educational materials for of children , and the tools In order to combat and prevent Service providers are realizing parents. Where possible, ISPs available for them to use, such child sexual abuse content and that it is very important to should also promote national as blocking and privacy settings; protect children, ISPs should: provide parents and teachers support services where parents with the necessary information l Share online security tips for l Offer a space available on and carers may report and seek to understand how their children users; the web for reporting illegal support in the case of abuse content encountered by users are using ICT services (e.g. and exploitation. l Contain educational resources; while navigating the Internet; including issues such a bullying) l Describe the national and these reports could be made and be well-positioned to guide Parents and teachers should: international regulatory anonymously by filling out a them towards responsible usage. l Educate themselves about the background; standard form; l Parents and teachers should be Internet and the ways in which l Provide customer with l Provide customers with made aware of all Internet risks their children use it, as well as information about available details of how to report safety in order to better protect their about technology in general; tools for children’ protections concerns; children. Messages should be l Explore and evaluate the (parental control, etc.). positive and empower parents l Promptly contact the relevant effectiveness of available to take action. technological tools for their ISPs can also contribute to police / law enforcement l This information should be particular child and their family customers’ awareness by adopting agency, which will investigate transmitted through multiple context, and adopt those tools a self-regulatory code that the alleged crimes; the ISPs media channels as many as may be appropriate; allows protection through customer services staff should parents do not use Internet specific rules and tools, and also be equipped to handle and l Be engaged and involved in services. For example through by applying a visible brand that forward customer reports to their children’s Internet use; collaborating with school certifies the adhesion to the code. the appropriate authority. l Be conscious of the common

Guidelines for Industry 37

risks youth face to help their web, so it is preferable that they children understand and are accompanied at all times by navigate the technologies; an adult (parent and/or teacher), l Be attentive to at-risk children who can assist and guide them in their community and in their in the choice of content, as children’s peer group; well as helping to establish l Recognize when they need to appropriate rules of behaviour seek help from others. for them to follow.

Education of children on safer For adolescents, however, the Internet use: task is more difficult. They are more independent and For “baby navigators” the more informed about the virtual world is a useful and opportunities offered by the amusing resource, but it is also web, often knowing much more a place where they can access than their parents and teachers material that is not suitable for about software for the Internet, them. instant messaging, chat- rooms, and online games, etc. Children’ use of the Internet Nonetheless, it is a good idea varies with their age and level for parents to lay down rules for of development; on their own them, as well and to teach them the youngest are unable to to be vigilant, well-mannered understand the advantages and and responsible while they are dangers of navigating on the navigating.

Guidelines for Industry

39

It is also very important that uncomfortable or upset about note that the customer must not from anyone under 18, ISPs provide information something or someone”; use the website or the service to: including, but not limited to: name, e-mail address, home directly to children on safer l “Never give away your account address, phone number, or the Internet use. Children should password or username; and be l Upload, post, transmit, be educated on how to detect aware that other players may share, store or make available name of their school; and respond to inappropriate give false information about any content that could be l Upload, transmit, share any behaviour. The following is a real-world characteristics.” harmful, unlawful, defamatory, materials that contains viruses; suggested check-list of advice Where possible, ISPs should also infringing, abusive, vulgar, l Upload, post, transmit, share for ISPs to provide to their promote national support services obscene, invasive of privacy or or make available content younger users: where children may report and public rights, hateful or racist; that would constitute, provide l “Never give away your physical seek support in the case of abuse l Impersonate any person or instruction for a criminal contact details”; and exploitation. entity, or falsely the age, the offence, violate the rights of l “Never agree to meet anyone affiliation with any person or any party or any local, state, you have met online in person, Using terms and conditions entity; national or international law; especially without consulting an adult first”; It is very important that ISPs l Upload, post, transmit, l Harm or exploit children in any and the Internet industry in share, store, make available way; l “Do not respond to general highlight the “Terms on the websites any private inappropriate (bullying, l Stalk, defame, defraud, and Conditions” (T&Cs) pages information relating to any obscene, or offensive) messages intimate, degrade an individual of the Internet services they third party, including addresses, and save the evidence, don’t or group of individuals for provide, with a clear policy phone numbers, email delete it”; any reason, including on the for any breach of T&Cs. For addresses, credit card numbers; basis of age, gender, disability, • “Tell an adult if you are example, typical messages of l Solicit personal information ethnicity, race, religion or sexual “Terms and Conditions” pages orientation;

Guidelines for Industry 40 www.itu.int/cop Case Study: Wireless Application Service Providers’ Association (WASPA) Code of Conduct Relating to Premium SMS – South Africa

Terms and Conditions should be ISPs should echo key messages supported by a clear statement from their Terms and Conditions The WASPA Code contains a) The cost of the subscription of the company’s policy with in user-friendly language in a number of commitments service and the frequency of regard to any infringement – community guidelines and specifically providing for clear the charges; typically, including messages ‘reminders’ that sit within the communication with customers. b) Clear and concise such as the following: service itself – for example, by Examples of these commitments instructions for reminding users of the types of include the following: l [Company X] has adopted a unsubscribing from the content which are considered policy of terminating accounts • Promotional material for service; inappropriate at the point of of those customers who are all subscription services c) The member’s contact uploading content. deemed to be repeat infringers. must prominently and information. explicitly identify the It reserves the right to review • Subscription customers services as “subscription and remove user-created Mobile Operators must be sent a monthly services” services and content at will Education and customer reminder message • Once a customer has and without notice and delete communication play a key role containing the same subscribed to subscription content and accounts; in ensuring that children and information listed in (a, b, service, a notification l [Company X] may also, at its younger users can enjoy an age- and c above) message must be sent to sole discretion, limit access appropriate and safer mobile the customer containing The full Code of Conduct can be to the sites or terminate the experience. the following information: found on the WASPA website: membership of any users who http://www.waspa.org.za infringe the rules. Operators are increasingly recognising the importance of communicating clearly about the including younger users – can signposting age-sensitive nature of content and services make informed decisions about content, but also requires on offer, so that all users – their consumption. This includes clarity of communication with

Guidelines for Industry 41 Case Study: Wireless Application Service Providers’ Association (WASPA) Code of Conduct Relating Case Study: Vodafone “Top Tips” to Premium SMS – South Africa for Parents – United Kingdom

regard to pricing of content, As part of its child safety subscription terms and how • Find out whether they share • You can reapply the content customer education initiatives, to cancel subscriptions, and any downloaded content control bar by calling Vodafone devised a high level so on – not least because lack with friends. Vodafone Customer Care “top tips” pocket guide for of absolute clarity in this area • Discuss with your child the on 191, visiting a Vodafone parents. The guide provides risks younger users in particular types of content you would retail store or on-line at recommendations on a number inadvertently signing up for a be unhappy for them to www.vodafone.co.uk of areas including chat, games, subscription, for example, when download, receive or share premium rate services and The “Staying in Touch: A Parent’s they originally intended to buy a with others. bullying. Guide to Mobile Phones” top tips single ringtone. • Stress the importance of not can be downloaded at: http:// The following “top tips” relate responding to any messages online.vodafone.co.uk/dispatch/ As with other media, mobile to downloading content on from strangers, or messages operators cannot take full Portal/SimpleGetFileServlet?dD mobiles: that are funny, or offer to ocName=VD007645&revisionSe responsibility for ensuring that sell products cheaply. These children and teenagers use their • Discuss with your child lectionMethod=latestReleased&i what services they use on are invariably, ‘too good to nline=0 mobile devices appropriately be true’. – parents, caregivers, and their mobile, for example educators all have a role to play they might download • Make sure any phones as well. The challenge is that ringtones, wallpaper or which have had the Content parents are often less aware games directly from their Control bar lifted are kept of the capabilities of new mobile. away from children mobile devices than children themselves, so educating this To this end, a number of guidelines targeting parents and • Content and services: demographic is key. operators have invested in covering a full range of relevant explaining to parents the education programmes and issues, such as: types of service now available

Guidelines for Industry

43

(e.g. explain what are social By educating parents, operators on websites, in-store, through about the nature of a given networking sites? What are are empowering them to guide bill inserts and by offering service they are using and how to Location Based Services? How their children towards safe and parental controls at point of sale enjoy it safely. For example, many is the Internet accessed via responsible usage of mobile as part of the sales process. operators also build community mobile?) and, where relevant, services themselves. Some guidelines into their interactive the options available to parents operators have joined together Operators are also engaging with services (e.g. chat rooms) to apply controls; with other players in their younger users directly through reminding users of appropriate online education programmes • Inappropriate contact: how markets to produce and promote and safe behaviour – for example, and partnerships with NGOs to avoid “stranger danger”; shared parents guides (e.g. by reminding users not to give 9 10 in their local markets, as well as what to do if their child is France , Ireland ) whilst others out their contact details, and so indirectly by providing teachers being bullied through so-called promote their own company on (see “Education of Children ” with resources to educate and ‘cyber-bullying’ or SMS; guides to their customers in the Internet Providers section specifically. inform pupils about appropriate above for further examples). • Steps to take if a phone is usage - see, for example, the Similarly, as a matter of best stolen or if your child is Equally, raising awareness of Teach Today (www.teachtoday. practice, many operators will now receiving spam; the availability of parental eu) website which was created send out regular reminders to • Managing privacy – not sharing control tools is vital, particularly by a consortium of mobile and users of Location Based Services information online, keeping in markets where they are Internet providers in Europe. (LBS) which post their location, profiles on SNS private, etc. not applied by default. In letting them know that the service As content and services grow ever recognition of this, operators is on and reminding them how to richer, all users will continue to are increasingly communicating change their profile or turn the benefit from advice and reminders about parental controls options service off.

9 http://www.sfr.fr/media/pdf/offre-sfr/maj-240107/att00013578/701.09Guideparents2007.pdf 10 http://www.vodafone.ie/download?id=ICIA_PARENTS_GUIDE.PDF

Guidelines for Industry 44 www.itu.int/cop

Guidelines for Industry 45

Case Study: CBBC Media Case Study: Once Upon a Literacy Skills Cyberspace Series, MDA and United Kingdom Okto, Singapore

Singapore’s Media Development Riding Hood, Little Red Riding CBBC (Children’s BBC) has character. The section includes Authority (http://www.mda.gov. Hood comes online to find a a media literacy section called an interactive quiz, a ‘pop video’, sg/) supported the creation of a message from an unfamiliar girl Stay Safe, presented by an and links to other resources such series of six animations, telecast living in another part of the animated cartoon rabbit called as ‘thinkuknow’. The material by MediaCorp’s Okto channel woods. Little Red Riding Hood Dongle. Research has shown covers online and mobile safety, over six weeks, which were starts chatting with the girl, and that children of and the content is built around designed to promote the benefits ends up saying that she’s going age respond very well to the the Stay Safe smart rules: of the Internet and new media, to visit Grandma, and even whilst highlighting the need to reveals Grandma’s address. The S = Keep Safe be cautious online. The initiative animation goes on to reveal that was created in line with the M = Don’t Meet Up the ‘girl’ is in fact the Big Bad Singapore government’s focus A = Accepting emails can be dangerous Wolf in disguise. to step up Cyber Wellness and R = Reliable? People may not be who they say they are. Cyber Safety public education. Outlines of the five other T = Tell an adult if you feel scared or uncomfortable episodes – Snow White and The animations target 10 – 14 Online Gaming, Pinocchio goes year olds, and feature characters on a Blind Date, The Three The Stay Safe section is linked important to note that although from well-known fairytales, but Little Pigs and the Attack of the to from all the community the SMART rules are widely used in a modern day setting and with Internet Virus, Sleeping Beauty pages and these messages are and recognised, several different storylines which revolve around and her Mobile Phone, and The reinforced by the hosts as they versions of it are being used new media and the Internet. Big Bad Internet Bully – can encourage the right sort of across the industry, which may be found on the MDA website: For example, in the first episode, behaviour from users. But it is confuse some children. http://www.mda.gov.sg/wms. Instant Messaging Little Red file/mobj/mobj.1334.Annex.pdf

Guidelines for Industry 46 www.itu.int/cop

Case Study: Using Customer Communications to Support Efforts to Combat Spam and Scam SMS

Customers, including younger may receive a text message or maintained by the Australian where the impression is a teenagers and children, may voicemail which is ostensibly Competition and Consumer one off charge but the reality encounter two forms of from the tax collector saying the Commission, aims to “help you is of a subscription service. potential SMS scam which, with individual is owed a rebate – and recognise, report and protect Customers should cancel the correct information, can be when the customer calls they are yourself from scams” and has a further payments to the service readily managed. persuaded to divulge their bank section specifically on “mobile details. phone scams”. Where customers encounter SMS can be used to send scam SMS they should be a message inviting a call or In such cases, operators should The other key form of abuse able to complain to their message back to a premium rate use education campaigns to help is based on premium SMS used network operator and /or to service. A typically message customers understand how to to offer subscription services. the national communications might be: “Congratulations you recognize, and therefore avoid Subscription services are or premium rate regulator - have won a prize. Call XXX being duped by, such scams legimately offered for repeated for example by being able to XXX XXX [a premium rate (e.g. by knowing the national transactions such as purchasing forward SMS to a specific, number] to receive more details”. premium rate code and not the same information service published mobile number. This type of scam or “micro- calling numbers beginning each week. Subscription SMS Repeated complaints help fraud” is designed to remove with that code in response to abuse is where an information industry to identify the money from a phone user’s pre- an unknown source). Where service provider gives a unscrupulous providers pay balance or account. available, operators should customer the impression a and take appropriate promote resources which keep charge is on a one-off or action, ultimately making it In a variation on phishing, an up to date view on current single payment basis, but it is unprofitable to engage in such customers may also be targeted scams - see, for example, for a repeat or subscription practices. via their mobile in identity theft SCAMwatch (http://www. service. An example might be scams. For example, a customer scamwatch.gov.au/) which is an advertisement in a magazine By emphasizing the following

Guidelines for Industry 47

types of messages to their • If you purchase a ring tone customers, operators can help or other service and find that to protect their customers from you are being sent repeated SMS spam and scams: tones you may have agreed to a subscription SMS scam. • Do not reply to invitations to Cancel future payments call high-priced premium rate (by referring to the original numbers - people who SMS advertisement) and complain you to call them use normal to your operator and to the mobile numbers. Even if you relevant national regulator. do not recognize a calling mobile number you can avoid • Similarly, where operators these scams by identifying have introduced additional and remembering the national mechanisms for reporting premium rate codes in your spam, these should be widely country (they often begin with communicated to customers. 09). Mobile operators in France, for example, have supported • Competition organizers the launch of their SMS do not send out winning shortcode for consumers notifications at random – to report spam SMS with a if you do not recognize a dedicated website: http:// competition notification it is www.33700-spam-sms.fr/ probably a scam.

Guidelines for Industry 48 www.itu.int/cop

Illegal Content

With the same priorities in inappropriate content or contact mind, the mobile operators on a mobile service, the theft from over 70 countries, and of a mobile device, the receipt representing over 900 million of spam or a request to apply / customers, who have signed up remove parental controls, with to the GSMA Code of Practice staff being trained to respond on Spam have all committed effectively. to ensuring “that the processes they use to obtain consent [to As will be discussed below, receive a marketing message] correctly managing customer are clear and transparent” and reports of potentially illegal to providing customers with content is a key part of “obvious, clear and efficient combating the presence of means to opt-out of receiving illegal content, including child further operator mobile sexual abuse content, in the marketing communications sent mobile environment. via SMS or MMS”. 5. Communication is, of course, a two-way process, and many operators now provide options for customers to contact them to report issues or discuss concerns – whether these relate to the discovery of

Guidelines for Industry 49

Illegal Content

All Internet providers (both Terms and Conditions, and Conditions in easy to Notice and Take Down fixed and mobile) must work understand, customer-friendly with law enforcement authorities User Guidelines language within a set of “user processes to execute their legislative Internet providers who offer guidelines” which outline the Whether as a voluntary measure obligations with regard to interactive services which kinds of behaviour expected or as a legal requirement, illegal content. However, many enable users to store and share by users of their service. Such “Notice and Take Down” Internet service providers content (e.g. photo albums, user guidelines can typically (NTD) or “cease-and-desist” take advantage of additional social networking sites), can be accessed directly from the type processes are a key defence approaches to help combat use the Terms and Conditions relevant service or at the point for operators and service the misuse of their services of their customer contracts to of creating a service account. providers seeking to keep their for the illegal hosting and / or make explicit their position on services free of illegal content: Service providers can also distributing of illegal content, the misuse of their services for as soon as providers are alerted actively assess commercial including child sexual abuse hosting or distributing illegal to their services being used to content hosted on their own content (child pornography). content, in order to underline host illegal content, they then servers (either branded content Common additional measures their commitment to working take steps to have it removed. or content from contracted include: with law enforcement and to third party content providers) reserve all appropriate rights, For NTD measures to work • Term and Conditions and on a regular basis, in order to including the right to remove effectively there needs to be “User Guidelines” which ensure that illegal or potentially illegal content and freeze user legal clarity on the nature of explicitly forbid illegal activity; harmful content is not accessible accounts. content which is illegal and law • Notice and Take Down (NTD) through their network. enforcement authorities (or or “cease-and-desist” processes; Many Internet providers delegated organizations) should be • Working with and supporting also echo and re-emphasise able to confirm where individual national hotlines the content of their Terms items of content are illegal.

Guidelines for Industry 50

Case Study: Abuse Desk Services and Notice and Take-Down Approach – Telecom Italia

Operators and service providers In compliance with the Hotline Organisations such as the presence of child can adopt or support an applicable local and EU laws sexual abuse content on the Internet Abuse Desk, help By 1995, as the Internet began concerning child protection, Group’s networks or sites. prevention of cybercrime, and lines or specialized websites, to grow in popularity, it became fight against child sexual abuse Two very important prevention in order to manage, reduce apparent to the industry, as content (child pornography), schemes are in place: first, a or eliminate cybercrimes and well as to governments and Telecom Italia has created NTD (notice and take-down) illegal material on its web law enforcement agencies, operational centres for handling mechanism, where either sites or infrastructures. In this that the Internet was being abuses, known as Abuse Desks customers or police notify to manner, they can be notified used to publish and exchange (specialized for different types Abuse Desk Operators the of illegal content by customers, illegal content, in particular of customer: retail, business illegal content or sites to be members of the public, child sexual abuse content. and top client). These centres obscured, second, a web filtering law enforcement or hotline Discussions began as to the are the interface between users system, used for all Telecom organisations (see below). various means of combating this of services (and in general an Italia networks, based on DNS If the report comes from a problem, including the creation Internet user) and the Company and IP filtering methods, able member of the public (e.g. via of dedicated hotlines for people for the managing of abuses and to provide denial of access to a customer care), operators / to report illegal online content. the improper use of services. certain domain sites or to a list ISPs pass information on to of different IP addresses; the law enforcement or the national The first hotline for reporting With the specialized work done DNS or IP lists to be blocked hotline as appropriate – for child sexual abuse content was by the Abuse Desk’s operators, are provided in Italy by the example, to confirm whether the set up in the Netherlands in Telecom Italia is able to manage public organization CNCPO June 1996 as a joint initiative different types of cyber-crimes, content is illegal or to take any (Centre National for combating further legal action. between industry, government reporting all relevant facts Child Pornography On Line) and law enforcement. This was or significant events to the and the lists are downloaded followed by similar initiatives in competent local authorities, automatically each day. Norway, Belgium and the UK.

Guidelines for Industry 51

Since then, many countries have Industry Collaboration created hotlines and INHOPE (the International Association There are also a number of of Internet Hotlines), an collaborative industry initiatives umbrella organisation for – such as the Technology Hotlines, now has around 30 full Coalition, the Financial member Hotlines from across Coalition Against Child the globe. Pornography and the Mobile Alliance against Child Sexual Beyond standard NTD Abuse Content – underway. approaches for managing illegal These initiatives bring together content hosted on operators’ a number of leading players own services, supporting within each industry with the and promoting local hotlines aim of sharing knowledge and provides customers and developing technical expertise members of the public with on new ways of combating the means of reporting illegal presence of online child sexual content should they discover it, abuse content on behalf of the and is an important step towards wider industry, including, for helping to combat illegal example, by blocking access to content, including child sexual URLs known to contain child abuse content. sexual abuse content.

Guidelines for Industry

53

Other Issues

User Generated racist or homophobic language. Non in-house URLs can also Content (UGC): The be blocked, along with email Broadcaster Approach addresses. This section outlines the b) Pre-moderation – for instance, approaches that Broadcasters all message boards can be can take in order to deal with pre-moderated by a team of User Generated Content (UGC) specialised children’s moderators on their services. who screen for content that is in contradiction to the published To ensure that inappropriate House Rules. Each message content is not published can be checked before it is on message boards, it is published, and moderators will recommended that broadcasters also spot and flag suspicious put in place a number of users, as well as users in distress. procedures to protect online c) Hosting – in addition to the users against inappropriate User moderation team, there can be 6. Generated Content. These are: a team of community hosts. a) Automatic filters – The community hosts manage inappropriate words can be message boards from the blocked from user names public perspective, and they can and messages at the point of be the first point of contact for posting. This filter includes the moderators when they have swearing, sexual terms and concerns about a user.

Guidelines for Industry 54 www.itu.int/cop

All moderation should be • Moderators should have set Those who are key and central users to send photos and videos performed by an office-based hours and message boards to the community would as well as text. All these should team who have undergone should only be open within be rewarded for their good be pre-checked in order to make advanced checks to determine those hours. Therefore, behaviour and disruptive sure that the material is suitable if they have existing criminal when the boards are open members would have privileges for publication on broadcasters’ records from a single external for posting, there is always a removed. All submitted user websites and to check that agency. In addition, moderation moderator on duty. generated content should be pre- children do not publish sensitive teams can adopt the following moderated before it can go live. personal information about rules: However, this is a very labour- themselves or others eg. school intensive process and the more Exclusive pre-moderated signs, road names, door numbers • Working from home should popular and successful the public chat sessions with, for which could put them at risk, not be permitted in order to community, the more resources example, children’s favourite for example through ‘jigsaw id’. ensure that no one has access it takes to moderate it. authors and presenters, are to children’s information. an incentive already in use In particular, when videos • Moderation should be team- The ultimate sanction is to for the target age group to are submitted by children, based so that moderators can block those who persistently participate in broadcasters broadcasters should require the share concerns about posts or disregard the published House online communities. Offering telephone number of a guardian users, and can build up their Rules. However, in the future these exclusive events and other or parent, to get formal adult knowledge of users’ behaviour broadcasters may want to move premium content discourages consent before publication. as a group. towards a more “trust and users from lying about their (This is in line with TV policies reputation” based system so age and registering for services and protects children, for • Moderation should be as to harness good behaviour aimed at older users. example, against being traced by performed according to strict and enable peers to teach estranged parents who may have moderation guidelines, built up best practice to each other by Increasingly, broadcasters’ court orders against them). over time. example. online services are encouraging

Guidelines for Industry 55

Case Study: How Broadcasters Can Protect Children Against Inappropriate, Non-in House Material: the Example of BBC

All external content linked to • Carry, link to or advertise • Exist solely to sell products site is flagged to a researcher, via Cbeebies and CBBC is pre- pornographic material or services who checks the site again for approved by an editorial expert or other sexually explicit • Promote gambling suitability, and removes it from and put on a “green” list which material (unless it forms • Restrict features to paying the database if necessary. can then be searched via BBC part of tailored sexual Search services. subscribers Similarly, PSB Switch operates education for this audience a rigorous policy when it comes Cbeebies specifically searches group) BBC do not allow linking to any social networking sites from to protecting the users from out content on the Cbeebies site • Carry, link to or advertise CBBC. If any external sites inappropriate content online. and approved sub sites created explicit violence or content Whilst Switch’s presence on by Independent producers include message boards, they inciting violent behaviour must be pre-moderated at all third party sites is a key part of supporting their own Cbeebies (including online games and the offer to teenagers, allowing programming. times. Is not possible to link game reviews with fighting, to live chat rooms from BBC Switch to reach out to an audience that may not always be The CBBC Search tool is a shoot ‘em ups or other use children’s sites. very familiar with the PSB offer, more complex resource to of weaponry) all ventures in this space are help users find the best CBBC • Incite anything illegal The CBBC search database fully moderated and carefully and Newsround content, as is constantly checked with an • Include discrimination of monitored. BBC include well as carefully selected sites automated tool which ‘sweeps’ any kind prominent links to features from around the BBC and the all the sites in the database, • Promote poor health / poor about online safety wherever wider web. All the sites must looking for changes according eating possible and never link to live be editorially valuable and to key words e.g. ‘message chat rooms from Switch. relevant to the 7-12 year old UK • Use unsuitable language boards’ or ‘chat room’. If audience and must not: such changes are detected, the

Guidelines for Industry 56 www.itu.int/cop

Conclusions

Unfortunately, as several studies For ISPs and other online have shown, many countries providers to engage effectively have insufficient or inadequate in the Child Ondine Protection legislation to deal with the issue Initiative, it is crucial that they of online child protection. have a clear understanding of

how content and services are Additionally different classified in the jurisdictions jurisdictions hold differing within which they operate. views. These differences can be abused or exploited to Collaborating with local the detriment of children. broadcasters should be very Criminals and child abusers helpful in terms of developing will know which countries such an understanding. It is also have the weakest laws or the important to understand how least developed mechanisms the local legislation perceives for dealing with these sorts of the ‘location’ of content and issues and they will naturally determines the ‘place’ at which a gravitate towards them unless service is delivered or received. 7. counter-vailing measures are Each country has a taken. responsibility to develop their Given this inconsistency own legislation that they can in the legislative and policy apply to Internet content and frameworks across different services within their jurisdiction. countries, it is imperative that

Guidelines for Industry Conclusions 58 www.itu.int/cop

the Internet industry at large Without that confidence and embrace best practice guidelines trust, the technology will never and adopt global standards and deliver or fulfill its enormous codes of practice that allow potential both to enrich and them to exercise a socially empower individuals but also to responsible effort towards add to the economic prosperity dealing with the issue of child and well being of each country. online protection.

In many countries around the world, industry is taking a lead and adopting voluntary and self-regulatory approaches that demonstrate commitment to developing a responsible approach to children’s use of online ICT and communications. It is very much in the industry’s interests to take action, to get ahead of the curve, not only because it is the right thing to do from a moral perspective, but also because, in the longer run it will help develop public confidence in the Internet as a medium.

Guidelines for Industry 59 Further Information and Reading Collaborating as an industry European Framework for Safer Mobile Use by Younger Teenagers and Children: http://www.gsmeurope.org/documents/safer_ children.pdf Links to national Codes of Practice for safer mobile use by European mobile operators (in English and their original language): http://www.gsmeurope.org/safer_mobile/national.shtml GSMA, Code of Practice on Spam: http://www.gsmworld.com/ our-work/public-policy/protecting-consumers/mobile_spam.htm Safer Internet Programme: Empowering and Protecting Children Online, http://ec.europa.eu/information_society/activities/sip/ index_en.htm Telecom Italia on child protection: www.telecomitalia.com, Sustainability->Hot Topics-> Protection of Children and Abuse 8. Study on Safer Internet Program Benchmarking of Filtering software and services: http://ec.europa.eu/information_society/activities/sip/projects/ targeted/filtering/sip_bench/index_en.htm

Home Office: Internet Taskforce for Child Protection (UK) – industry good practice documents: http://police.homeoffice.gov.uk/ operational-policing/crime-disorder/child-protection-taskforce

Guidelines for Industry 60 www.itu.int/cop

Content Classification The Financial Coalition Against Child UK’s industry funded Independent Mobile Classification Body: Pornography http://www.imcb.org.uk/ http://www.missingkids.com/missingkids/servlet/ EU Kids Online project: http://www.eukidsonline.net/ PageServlet?LanguageCountry=en_US&PageId=3703 Safer Children in a Digital World: the report of the Byron Review: http://www.dcsf.gov.uk/byronreview/ Self Regulation of the Media All BBC online services are subject to the BBC Editorial Guidelines Education and Customer Communications (http://www.bbc.co.uk/guidelines/editorialguidelines/edguide) Industry funded resource for teachers to help them understand and the BBC Online Services Guidelines (http://www.bbc.co.uk/ younger people’s use of technology: http://www.teachtoday.eu/ guidelines/editorialguidelines/onguide )

Illegal Content National Reports International Association of Internet Hotlines: https://www. UK: Safer Children in a Digital World: the report of the Byron inhope.org/ Review, (http://www.dcsf.gov.uk/byronreview/

Mobile Alliance against Child Sexual Abuse Content http://www.gsmworld.com/mobilealliance

Guidelines for Industry

( ( Guidelines((( (

for Industry on ( ( Child((( ( Online Protection

International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland www.itu.int/cop

Printed in Switzerland Geneva, 2011

With the support of: www.itu.int/cop