Preventing Exploitation Of Digital Images Of Children

Child sexual abuse images online present new and daunting challenges for practitioners working in the field of child sexual abuse. 

Now, digital fingerprints of a million images of child sexual abuse have been created, the Internet Watch Foundation (IWF) has said. The IWF’s CTO Dan Sexton explains vital role new European proposal could have in preventing the widespread sexual abuse, rape, and sexual torture of child victims online.

In a quote provided by the IWF, an image analyst said: "I have three children 11 and under. The job has changed the way I think about them and the internet. "It has surprised me how much material there is of very young children. Some of them are five, six, or seven years old."

Susie Hargreaves, Chief Executive of the IWF, said in a statement that the nature of the material is such that its analysts were only allowed to work four-hour shifts, taking regular breaks, and with access to the best counselling and support. The charity says it has helped remove an unprecedented amount of material.

In 2021, it says it took action to remove 252,000 web pages which it confirmed contained images or videos of children suffering sexual abuse - more than ever before.

“For the IWF, we believe there is much to be positive about in the Bill. The introduction of a Duty of Care, Risk Assessment, and in-scope companies being subjected to ongoing to review and dialogue with a new online safety regulator, Ofcom, as well as the introduction of mandatory reporting for child sexual abuse material, are to be welcomed.

“A lot of thought has gone into the development of the legislation. It attempts to strike a balance between protecting children from harm and not infringing on civil liberties such as freedom of expression online,” says Susie Hargreaves.

IWF:        IWF:          BBC:         TechDigest:   

You Might Also Read: 

Britain Aims To Protect Children From Online Pornography:

 

« Social Media Platforms Must Protect Women Online
Artificial Intelligence Will Change The Future Of The World »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Centre for Development of Advanced Computing (C-DAC)

Centre for Development of Advanced Computing (C-DAC)

C-DAC is the premier R&D organization of the indian Ministry of Electronics & Information Technology. Areas of research include cyber security.

Latvian Information & Communications Technology Association (LIKTA)

Latvian Information & Communications Technology Association (LIKTA)

LIKTA brings together leading Latvian companies, organizations and professionals in the field of Information & Communications Technology

BitRaser

BitRaser

BitRaser serves your needs for a managed & certified data erasure solution that can support internal & external corporate audit requirements with traceable reporting.

Executive Women's Forum (EWF)

Executive Women's Forum (EWF)

The Executive Women's Forum is the largest member organization serving emerging leaders and influential female executives in the Information Security, Risk Management and Privacy industries.

Telelogos

Telelogos

Telelogos is a European provider of Enterprise Mobility Management software, Digital Signage software and Data Transfer and Synchronization software.

Sky Republic

Sky Republic

Sky Republic offers a Smart Contract Platform to integrate and synchronize business networks beyond EDI and API.

Incopro

Incopro

Incopro is an online IP and brand protection software provider that arms brand owners with actionable intelligence to combat online and offline intellectual property and copyright infringements.

Scout Ventures

Scout Ventures

Scout Ventures is an early stage venture capital firm that is making the world a better, safer place by cultivating standout frontier technologies.

DigiSec360

DigiSec360

DigiSec360 is a technology firm focused on the human element of cybersecurity.

Cutting Edge Technologies (CE Tech)

Cutting Edge Technologies (CE Tech)

CE Tech is a Next Generation Technology Partner providing advanced technology infrastructure solutions through partnerships with leading technology providers.

Diaplous Group

Diaplous Group

Diaplous Group is a leading Maritime Risk Management (MRM) provider, delivering specialized services to an ever-broadening portfolio of shipping, oil & gas, energy and construction industries.

GitProtect.io

GitProtect.io

​GitProtect is a fully manageable, professional GitHub and Bitbucket backup and recovery software that protects repositories and metadata from any event of failure.

Wavex Technology

Wavex Technology

Wavex Technology is an award winning IT Services firm offering clients a secure and fully managed IT service.

Policy Monitor

Policy Monitor

Policy Monitor is a cyber security company founded by experts with extensive experience in operational and risk management.

Pointsharp

Pointsharp

Pointsharp delivers software and services that help organizations secure data, identities, and access in a user-friendly way.

TraitWare

TraitWare

The TraitWare mission is to increase user and company security while simplifying access to digital and physical resources through the elimination of the need for usernames and passwords.