You are on page 1of 86

Guidelines

((( (((

for Children on
Child Online
((( (((

Protection

www.itu.int/cop
Legal notice
This document may be updated from time to time.
Third-party sources are quoted as appropriate. The International Telecommunication Union (ITU) is not responsible for the content of external
sources including external websites referenced in this publication.
Neither ITU nor any person acting on its behalf is responsible for the use that might be made of the information contained in this publication.

Disclaimer
Mention of and references to specific countries, companies, products, initiatives or guidelines do not in any way imply that they are endorsed or
recommended by ITU, the authors, or any other organization that the authors are affiliated with, in preference to others of a similar nature that
are not mentioned.
Requests to reproduce extracts of this publication may be submitted to: jur@itu.int
International Telecommunication Union (ITU), Second Edition, 2016

ACKNOWLEDGEMENTS
These Guidelines have been prepared by the International Telecommunication Union (ITU) and a team of contributing authors from leading institutions active
in the information and communications technologies (ICT) sector and in child online safety issues. These Guidelines would not have been possible without the
time, enthusiasm and dedication of its contributing authors.

ITU is grateful to all of the following authors, who have contributed their valuable time and insights: (listed in alphabetical order of organisation)
John Carr (Childrens Charities Coalition on Internet Safety)
Michael Moran (Interpol)
Janice Richardson (Insafe)
Cristina Bueti (ITU)
Dieter Carstensen, Cristiana de Paoli and Mari Laiho (Save the Children)
Maria Jos Cantarino de Fras (Telefonica)

The authors wish to thank Kristin Kvigne (Interpol) for her detailed review and comments. ITU wishes to acknowledge Salma Abbasi from eWWG for her
valuable involvement in the Child Online Protection (COP) Initiative.
The second edition of this publication has been updated by Neha Karkara.
Additional information and materials relating to these Draft Guidelines can be found at: http://www.itu.int/cop/ and will be updated on a regular basis.
If you have any comments, or if you would like to provide any additional information, please contact cop@itu.int
Table of Contents
Foreword
Getting started 1
1. Background 5
2. Children and young peoples use of technology 11
3. What you need to know to stay safe online 29
SMART rules for children and young people 33
Guidelines for the age group 5-7 year old 47
Guidelines for the age group 8-12 year old 49
Guidelines for the age group 13 years and above 55

4. Conclusions 73
Sources for further reading & inspiration 75
Appendix 1 76
Parent Contract 76
Childs Contract 77

Guidelines for Children and Young People


4 www.itu.int/cop

Guidelines for Children and Young People


Foreword
It is my pleasure to share with you the 2016 update of the Child Online
Protection Guidelines. This version was updated at the request of the
Member States within the framework of the Regional Initiative on COP,
approved by the World Telecommunication Development Conference
(WTDC-2014). I would like to thank the various stakeholders who
contributed to the text.
In an era of always-on Internet, child online protection is a critical
issue which, with the borderless nature of the Internet, requires a global,
coordinated response.
By using computers and mobile devices to access the Internet, children
and young people can do a great deal to combat and guard against cyber
threats themselves, and I hope this guide will help them do so.

Mr Houlin Zhao
Secretary-General of the International Telecommunication Union (ITU)

Guidelines for Children and Young People


www.itu.int/cop

Guidelines for Children and Young People


1

Getting started
What are these Guide- How should these Guide- useful, it should never be forgot- Why are these Guidelines
ten that, in the end, each child
lines about? lines be used? is different. Each childs specific
important?
This manual contains Guidelines These Guidelines have been needs should be given individual The information society in which
for children and young people in prepared in the context of the consideration. Moreover there todays children and young people
all parts of the world on how to Child Online Protection (COP)1 are many different local legal and are growing up, offers an instant
keep themselves and others safe Initiative in order to establish cultural factors which could have digital world through the click
online. However, a young internet the foundations for a safe and an important bearing on how of a mouse. An unprecedented
user of seven years of age is very secure cyberworld not only for these Guidelines might be used or level of services and information
unlikely to have the same needs or todays children but also for future interpreted in any given country is accessible through a computer
interests as a 12 year old just start- generations. These Guidelines are or region. or a mobile device with Internet
ing at High School or a 17 year meant to act as a blueprint, which access. The barriers associated
Moreover certain subjects con-
old on the brink of adulthood. At can be adapted and used in a way with the cost of these devices and
tained in this manual can be
different points in the Guidelines, that is consistent with national or access to the Internet are dimin-
sensitive such as online sexual ex-
the advice or recommendations local customs and laws. ishing rapidly. All these technical
ploitation and abuse of children.
fits these different contexts. developments provide children
While older children will be able Working with younger children on
and young people with unparal-
to grasp the ideas in the manual this issue should be approached
leled opportunities to explore
directly, younger children will carefully. It is important that the
new frontiers and meet people
need support to understand the explanations and the messages
from faraway places. Children and
context fully. Parents, teach- you give to children about such
young people are truly becoming
ers, caregivers and other adults issues are appropriate to their
digital citizens in an online world
supporting children to use these age and development. Encourage
that has no borders or frontiers.
guidelines should remember that children to ask questions and state
1 www.itu.int/cop while broad guidelines can be their opinions.

Guidelines for Children and Young People


2 www.itu.int/cop

Guidelines for Children and Young People


3

More often than not, this is a can at a technical level to make on the Information Society Through these Guidelines, the
positive and educational experi- the Internet as safe as it can be (WSIS) (2003-2005)3, WSIS+10 COP Initiative calls upon all
ence: one that assists for children and young people, High Level Event Outcome stakeholders, including children
the first and best form of defence Documents (2014)4 and the and young people, to promote
younger generations in better outcomes of the United Nations the adoption of policies and
in protecting YOU is making
understanding both the General Assembly Overall strategies that will protect children
you aware of what can happen
differences and commonalities Review of the Implementation in cyberspace and provide safer
online and make you understand
of the people of the world. of the WSIS Outcomes (2015)5 access to all the extraordinary
that there is always a solution to a
However, children and young recognize the needs of children opportunities and resources that
problem that you may encounter
people also need to be aware of and young people to be protected are available online. It is hoped
some of the potentially negative online. Empowering children and
young people through education in cyberspace. The Sustainable that this will not only lead to
aspects of the technologies. Development Goals (SDGs)6 the building of a more inclusive
and awareness raising is therefore
Harmful activities can include of paramount importance. adopted by the United Nations in information society, but also
bullying and harassment, identity 2015 further obligates countries enable countries to meet their
theft and online abuse (such Moreover there is now a substan- to work towards ending all obligations towards protecting
as children seeing harmful and tial body of international com- forms of abuse, exploitation and realizing the rights of
illegal content, or being exposed mitments, law and international and violence affecting children children as stated in the CRC, the
to grooming for sexual purposes, instruments which underpin and and young people by 2030. This WSIS Outcomes Document and
or the production, distribution in many cases mandate action to includes any kind of abuse and now in the SDGs.
and collection of child abuse protect children both generally, exploitation faced by children and
material). and also specifically in relation to young people online.
the Internet. Those commitments,
These are all threats to children laws and instruments form the
and young peoples well being basis of these Guidelines.
and a challenge that must be 2 http://www.unicef.org/crc/

addressed by all stakeholders, The United Nations Convention 3 http://www.itu.int/wsis/outcome/booklet.pdf


4 http://www.itu.int/net/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf
including children themselves. of the Rights of the Child
5 http://unpan3.un.org/wsis10/
Whilst all providers of online (CRC)2 and specifically the 6 http://www.wvi.org/united-nations-and-global-engagement/publication/child-friendly-version-proposed-
services should do whatever they outcomes of The World Summit post-2015-goals

Guidelines for Children and Young People


4 www.itu.int/cop

Guidelines for Children and Young People


5

1.
Background
Online technologies present many and young people from any
possibilities to communicate, kind of harm online. While
learn new skills, be creative and these international instruments
contribute to establishing a better recognise that governments are
society for all, but often they foremost responsible to take
also bring new risks e.g. they can action to keep children and
expose children and young people young people safe in relation to
to potential dangers like illegal the Internet, they also recognise
content, viruses, harassment (e.g. the important role children and
in chat rooms), the misuse of young people can play in keeping
personal data or grooming for themselves and other children
sexual purposes. There is no silver safe online.
bullet solution to protect children
and young people online. This is a The CRC, approved by the United
global issue that requires a global Nations in 1989, is the most
response from all segments of important and significant legal
society, including children and tool in the defence and promotion
young people themselves. of children and young peoples
rights. The CRC recognises the
Recognising the grave dangers human rights of all children in
that may face children and all parts of the world, including
young people in cyberspace, the childrens right to be protected
international community has from any kind of violence and
made a number of agreements harm, including in cyberspace. It
and laws that protect children also recognises childrens right to

Guidelines for Children and Young People


6 www.itu.int/cop

participate in keeping themselves and young people and their


and others safe. The CRC is also protection in cyberspace. The
the most universally accepted Tunis Commitment recognized
convention in history. This means the role of ICTs in the
most governments agree to fulfill protection of children and in
the rights that are set out in the enhancing the development of
CRC. children as well as the need to
strengthen action to protect
Further, the WSIS which was
children from abuse and defend
held in two phases in Geneva
their rights in the context of
(from 10 to 12 December 2003)
ICTs.
and in Tunis (from 16 to 18
November 2005) concluded The year 2015 marks the 10th
with the approval of the WSIS anniversary of WSIS. On this
Outcome Documents which occasion the UN General
made a bold commitment to Assembly is all set to evaluate
build a people-centred, inclusive the progress made by WSIS and
and development oriented define its next steps. To this
information society, where end, the WSIS+10 High-Level
everyone can create, access, Event (that took place in Geneva
utilize and share information and in 2014) was organized as an
knowledge. extended version of the WSIS
At WSIS, ITU was entrusted Forum. The High Level Event
by leaders of the international addressed the progress made
community with Action Line in the implementation of the
C5: building confidence and WSIS outcomes (2003 and 2005)
security in the use of ICTs. The especially related to the Action
WSIS outcomes also specifically Lines, and developed proposals
recognized the needs of children on a new vision beyond 2015.

Guidelines for Children and Young People


7
The WSIS+10 High Level Further the Council of Europe both the websites and within the inequality and injustice and tackle
Event Outcome Documents7 Convention on Protection communities. To this end we call climate change by 2030. These
revised the text of the Action of Children against Sexual for the increased development of goals build upon the Millennium
Line C5 while recognizing the Exploitation and Sexual Abuse, childrens, teachers, parents and Development Goals (MDGs),
importance of the Child Online adopted in 2007 (also known family manuals which address the which will expire at the end of
Protection (COP) Initiative and as the Lanzarote Convention) threats of the Internet in addition 2015. Target 16.2 of the SDGs
youth empowerment. It states, focuses on preventing, protecting to providing supplemental says that abuse, exploitation,
Ensure special emphasis for and prosecuting the sexual information about Sexual trafficking and all forms of
protection and empowerment exploitation and abuse of Exploitation of Children. violence and torture against
of children online. In this children. It strongly criminalises children and young people must
regard, governments and other The African Union has also end by 2030. This includes any
of all kinds of sexual offences adopted the Africa Cyber Security
stakeholders should work together kind of abuse and exploitation
against children including child Convention in 2014, which
to help all enjoy the benefits faced by children and young
pornography. highlights ways to address child
of ICTs in a safe and secure people online. The States are now
environment. The document The global community of pornography in the region. further obligated to work towards
further highlights priority children and young people further making cyberspace safe for
The latest international agreement
areas to be addressed in the stated in the Outcome Document children and young people.
that secures childrens rights is
implementation of WSIS beyond of the World Congress III against the commitment made by world
2015. With regard to childrens Sexual Exploitation of Children leaders to achieve the Sustainable
online security it emphasises, and Adolescents held in Brazil Development Goals (SDGs).
Promoting a culture of online in 20088 the following: We ask The SDGs are a set of 17 goals
security and safety, empowering
for strong cyber safety rules and 169 targets that guide global
users, and encouraging national,
which are well propagated on efforts to end poverty, fight
regional and international
cybersecurity strategies to protect
users, including children.

7 For more details see, WSIS+10 High Level Event Outcome Documents available at http://www.itu.int/net/wsis/implementation/2014/forum/inc/doc/
outcome/362828V2E.pdf
8 http://www.ecpat.net/sites/default/files/ECPATWCIIIReport_FINAL.pdf

Guidelines for Children and Young People


8 www.itu.int/cop

Guidelines for Children and Young People


9
Case Study: Children and Young Peoples Voices9

The World Congress III against Sexual Exploitation of Children and Adolescents took place in Rio de Janeiro, Brazil, from 25 to 28 November 2008.
There were 3,500 participants including 300 adolescents 150 of which were from foreign countries.
It concluded with an outcome document called the Rio de Janeiro Declaration to Prevent and Stop Sexual Exploitation of Children and
Adolescents, which contains the Adolescent Declaration to End Sexual Exploitation. Here are some of the key messages from children and young
people to the world:

We the children of the world on children. Consequently, we the millions of children throughout the threats of the internet in addition to
commend the Government of Brazil children, ask that action committees world. providing supplemental information
and the other governments and be created to audit the action plans in about sexual exploitation of children.
responsible agencies for giving us each country. 10. We the children must make
the children, the present and future known our plight for governments to 12. Further, we provide a mandate
of the world, a voice at this World 8. We also call for the adoption of an pursue strict and punitive legislation for the media to gather documents,
Congress III International Day where children will with regards to the Internet, reports, folders, CDs, videos and
lead the effort in awareness raising especially child pornography- simply other materials to increase knowledge

campaigns, rallies and marches. To on this issue. We the children of


7. We are at this moment calling another form of abuse.
further enlarge the scope of this day, the world pledge to vehemently and
for governmental actions to
we request the organization of an 11. We similarly ask for strong passionately pursue these policies and
effectuate laws and policies that
International Art, Essay and Speech cyber safety rules which are well to call our governments to action if
redound to the benefit, protection
competition which will culminate on propagated on both the websites and we do not see positive steps being
and well-being of children both
this day. within the communities. To this end taken to end this phenomenon that
on the local and international level.
continues to scourge the world today.
However, it is simply not enough 9. We now turn our attention to the we call for the increased development
to allow governments to make media particularly the Internet which of childrens, teachers, parents and
empty promises to curb this attack poses one of the greatest threats to family manuals which address the

9 Source: http://www.iyac.net/iyac_charter.pdf The full Adolescent Declaration to End Sexual Exploitation can be found at: http://www.unicef.org/brazil/pt/br_IIIWC_En.pdf

Guidelines for Children and Young People


10 www.itu.int/cop

Children and young


people online should be


aware of the opportunities

Guidelines for Children and Young People


2.
11

Children and young


peoples use of
technology
Information and Communication and something interesting, fun,
Technologies (ICTs) are changing relaxing, useful, and friendly.
the way children interact with
their peers, the way they access Access: A study in the United
information, express their States10 finds that the age of
views, post and share creative accessing the Internet has reduced
content. Children and young a lot. About 80% of children
people specifically like the under the age of five years use
highly interactive nature of the Internet weekly. Moreover as
many Internet related services. children get older, their use of
In general, for children, the the Internet also increases. In the
Internet is something they feel United States about 42% and 36%
secure about, something they like, of 8-11 year old boys and girls,

10 http://content.usatoday.com/communities/technologylive/post/2011/03/study-80-percent-of-children-
under-5-use-internet-weekly/1#.VkDrLOvNz8E (Accessed 9 November 2015)

Guidelines for Children and Young People


12 www.itu.int/cop

Guidelines for Children and Young People


13
respectively, use the Internet many doing their homework and The widely available fixed broad- relation to mobile subscriptions,
times a day and around one-fifth socialising within childrens virtual band Internet access in the China and India have become
do so daily.11 More than 90% of worlds. The range of activities developed countries is still the leaders in the technology with
teens report going online daily increases with age.14 Listening to preferred way of getting online, about 980 million mobile phone
including about 25% who say they music, watching video clips and in comparison to developing subscribers in India alone16. The
go online almost constantly.12 social networking top the list of countries where such infrastruc- worlds mobile connections now
Across the world in South Korea, activities done on a daily basis by tures are less developed. In many number seven billion17 more
which is considered the worlds 9-16 year olds as revealed in study countries Internet cafes and other than 230 million of which include
most wired country, government of European children and young communal resources are also Mobile Broadband18. In Latin
data says about one in ten South people. Other social activities important providers of access for America, mobile broadband is
Korean children between the ages that rate fairly high include using children and young people. They now more widespread in the
of 10 and 19 are addicted to the Skype and WhatsApp. Other are likely to remain so for some region than fixed broadband, due
Internet.13 activities such as searching for time. to the affordability of mobile
information to satisfy a curiosity, devices and the growing coverage
Children under nine years old schoolwork, playing games (alone In recent years however mobile of mobile networks.19 Australian
enjoy a variety of online activities, or in multiplayer games) are part Internet access has increased tre- statistics show that in 2015 35%
including watching videos, playing of the daily media diets of around mendously. In the Asia Pacific re- of children aged 8 to 11 years
games, searching for information, one in three children.15 gion, the fastest growing region in own a mobile phone, which is

11 http://www.emarketer.com/Article/Most-US-Children-Use-Internet-Least-Daily/1010789#sthash.bZFoyZxz.dpuf (Accessed 25 November 2015)


12 Pew Research Center, Teens, Social Media & Technology Overview 2015, Available at: http://www.pewinternet.org/2015/04/09/teens-social-media-technology-2015/ (Accessed 9 November 2015)
13 http://www.businessinsider.com/south-korea-online-gaming-addiction-rehab-centers-2015-3 (Accessed 10 November 2015)
14 Holloway,D., Green, L. and Livingstone, S. Zero to eight. Young children and their Internet use. 2013. LSE, London: EU Kids Online. Available at: http://eprints.lse.ac.uk/52630/1/Zero_to_eight.pdf
(Accessed 2 November 2015)
15 Mascheroni, G. and Olafsson, K. Net Children Go Mobile: risks and opportunities. Second Edition 2014. Milano: Educatt. Available at: http://eprints.lse.ac.uk/56986/1/__lse.ac.uk_storage_LIBRARY_
Secondary_libfile_shared_repository_Content_Net%20Children%20Go%20Mobile%20Project_Reports_Net%20children%20go%20mobile%20risks%20and%20opportunities%20%282nd%20ed.%29.
pdf (Accessed 3 November 2015)
16 Press Release, Telecom Regulatory Authority of India, 2015, Available at: http://www.trai.gov.in/WriteReadData/WhatsNew/Documents/PR-No=47.pdf (Accessed 2 November 2015)
17 http://www.itu.int/net/pressoffice/press_releases/2015/17.aspx#.VjgW7OvNz8E (Accessed 2 November 2015)
18 https://mobiforge.com/research-analysis/global-mobile-statistics-2014-part-a-mobile-subscribers-handset-market-share-mobile-operators (Accessed 2 November 2015)
19 Economic Commission for Latin America and the Caribbean (ECLAC), The new digital revolution: from the consumer Internet to the industrial Internet, 2015. Available at http://repositorio.cepal.org/
bitstream/handle/11362/38767/S1500587_en.pdf ?sequence=1 (Accessed 26 November 2015)

Guidelines for Children and Young People


14 www.itu.int/cop

Guidelines for Children and Young People


15
twice as many as in 2007.20 It is amongst 5-7 year olds over the last tablet, as they are less likely to be disasters, war civil strife or other
clear children and young people year, with 54% using it in 2014 as monitored by parents or caregivers. major disruptive events.
are now increasingly using mobile compared to 39% in 2013. At the Children with smartphones also
devices to go online, including same time, access to a PC or lap- access the Internet more often, Information: The access to
smartphones and tablets. top in the home for children aged engage in a greater range of activi- information is crucial for children
5-15 years has been declining.21 ties, and have a higher number of and adolescents when doing their
Digital devices: There are This has also resulted in high use online skills.23 homework. A study on childrens
number of digital devices through of social media applications (such Internet usage in the UK24
which children and young people as Facebook, Twitter, Whatsapp) The increased used of Internet indicates that 75% of children
now go online such as desktop especially through mobile apps. through smartphones also pro- aged 8-11 years and 84% of
computers, laptop computers, Similarly in Brazil, in 2013 a little vide several benefits. For example, adolescents aged 12-15 years use
mobile phones, smartphones, over half of the children (53%) a range of educational services the Internet to help them with
tablets, other handheld devices use the mobile phone to access the could be provided via mobiles to their homework. Similarly in Brazil,
such as iPod Touch, e-book Internet. In 2012, this population children in remote villages and 87% of children and young people
readers and games consoles. was 21%. Internet access through communities. Mobile phones could aged 9-17 years use the Internet
tablets went from 2%, in 2012, to serve as an essential means for for schoolwork.25 The library has
A 2014 study in the UK shows children to become connected to moved online and the ability to
16% in 2013.22
that more than a third of 12-15 one another for educational and seek and find relevant and reliable
year olds access the Internet However children and young peo- peer-learning activities. These are information in any language is a
through a smartphone. Moreover ple experience slightly increased particularly important for com- great advantage which has been
the tablet is the one media device risk of harm when accessing the munities that are either nomadic or embraced by the young generation
that has grown most in popularity Internet via a smartphone or have been displaced due to natural throughout the world.

20 https://kids.ownfone.com.au/children-and-cell-phones-statistics#.VldJvITtkhY (Accessed 26 November 2015)


21 Ofcom Report on Internet safety measures, Strategies of parental protection for children online, 2014, Available at http://stakeholders.ofcom.org.uk/binaries/internet/internet-safety-measures.pdf
(accessed 26 November 2015)
22 ICT Kids Online Brazil 2014, Available at http://cetic.br/media/docs/publicacoes/2/tic-kids-online-2013.pdf (accessed 10 November 2015)
23 Stald, G., Green, L., Barbovski, M., Haddon, L., Mascheroni, G., Sagvari, B., Scifo, B. and Tsaliki, L. Online on the mobile: Internet use on smartphones and associated risks among youth in Europe. EU Kids Online 2014.
Available at: http://www.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20III/Reports/MobileReport.pdf (accessed 13 November 2015)
24 Ofcom Report on Internet safety measures, Strategies of parental protection for children online, 2014, Available at http://stakeholders.ofcom.org.uk/binaries/internet/internet-safety-measures.pdf (accessed 25 November 2015)
25 ICT Kids Online Brazil 2014, Available at http://cetic.br/media/docs/publicacoes/2/tic-kids-online-2013.pdf (Accessed 25 November 2015)

Guidelines for Children and Young People


16 www.itu.int/cop

One of the most used resources part of many children and young likely to engage in activities on a and young people in Europe also
online is Wikipedia26. Wikipedia peoples online lives. When social networking site every day. have a profile on a media-sharing
is a multilingual, Web-based, home from school, the ability to Overall, about 70% of children platform such as YouTube, Insta-
free-content encyclopedia project, continue your discussions with and young people have at least gram or Flickr.29
where you can read, edit and write your friends online whilst doing one profile on a social networking
articles on any subject or issue your homework, sending SMSs site in Europe27. On the same An example of young people
you find relevant. Fact finding and listening to music (frequently lines, about 80% of Internet creatively using media sharing
exercises can easily lead you from at the same time!) is a picture users between the ages of 9 and platforms could be that of
one page on to the next and so many will recognize. Social 17 years have social networking a young band that creates a
on. The search for new informa- networks can often represent profiles in Brazil, reveals the ICT new song, posts the video on
tion is never boring and with the a one-stop gateway to games, Kids Online Brazil 2013 survey.28 YouTube30, and informs their
increased localisation of con- friends, news, music, and ways Among these studies, Facebook friends and fans about it. The
tent, the language barriers slowly of self-expression. In other emerges as the most commonly fans can then see this song by
diminish. words, you can be creative, funny, used social networking site among streaming it online on their
reflective and entertained by using children and young people. mobile phone, tablet or PC. If
Social networks: The birth of ICTs. they like the song, they will spread
online social networks has been In the UK one in four children the word by telling their friends,
a remarkable success. The variety Social networking tends to top use Twitter the most to socially who will then tell their friends and
of social networks caters to all the activities taken up by children network in the online world. so on. With simple techniques
ages, cultures and languages. on a daily basis, and children Sharing photos, videos and other and little financial investment, this
Having a profile on a social who also use a smartphone and content are other most popular band can now gain a greater fan
network has become an important a tablet to go online are more online activities. Most children base and potentially be heard by

26 http://en.wikipedia.org/wiki/Main_Page
27 Mascheroni, G. and Olafsson, K. Net Children Go Mobile: risks and opportunities. Second Edition 2014. Milano: Educatt. Available at: http://eprints.lse.ac.uk/56986/1/__lse.ac.uk_storage_LIBRARY_Secondary_libfile_
shared_repository_Content_Net%20Children%20Go%20Mobile%20Project_Reports_Net%20children%20go%20mobile%20risks%20and%20opportunities%20%282nd%20ed.%29.pdf (Accessed 3 November 2015)
28 ICT Kids Online Brazil 2014, Available at http://cetic.br/media/docs/publicacoes/2/tic-kids-online-2013.pdf (Accessed 10 November 2015)
29 Mascheroni, G. and Olafsson, K. Net Children Go Mobile: risks and opportunities. Second Edition 2014. Milano: Educatt. Available at: http://eprints.lse.ac.uk/56986/1/__lse.ac.uk_storage_LIBRARY_Secondary_libfile_
shared_repository_Content_Net%20Children%20Go%20Mobile%20Project_Reports_Net%20children%20go%20mobile%20risks%20and%20opportunities%20%282nd%20ed.%29.pdf (Accessed 3 November 2015)
30 https://www.youtube.com

Guidelines for Children and Young People


17
a record company that wishes to and, with it, explore an imaginary
sign them to their label. Stories universe. They can play games,
now abound of bands promoting chat and decorate virtual rooms
their songs via services like or other spaces. In 2012, there
YouTube and ending up with a were over 150 virtual worlds
record deal. either operating or in develop-
ment which are aimed at children
This is not so different from and young people under 18 years
the offline world, but the ability of age31, according to K Zero, a
to reach a larger audience in a consulting firm. These sites have
shorter time is one of the great around 355 million registered us-
advantages of ICTs. In essence, a ers under the age of 10 and over
service might take off slowly but 800 million aged 10 to 15 years.32
reach critical global mass in a very
short time due to the ability of Webkinz, Neopets and Club
the children and young people to Penguin are some of the vir-
instantly share their experiences tual worlds that are particularly
with friends. popular with children aged eight
and under, while children over
Virtual worlds for children and ten years tend to prefer the virtual
teenagers: In these worlds, chil- worlds of Poptropica, Moshi
dren can often create an avatar Monsters and Moviestar Planet.33

31 http://www.kzero.co.uk/blog/young-childrens-play-in-online-virtual-worlds/ (Accessed 3 November 2015)


32 Burke. A., Childrens Construction of Identity in Virtual Play Worlds A Classroom Perspective, 2013,
Memorial University, Available at: http://ejournals.library.ualberta.ca/index.php/langandlit/article/view
File/19779/15290 (Accessed 3 November 2015)
33 http://www.kzero.co.uk/blog/category/universe-graph/ (Accessed 3 November 2015)

Guidelines for Children and Young People


18 www.itu.int/cop

The positive benefits from


social networks for children
with learning difficulties can
be summarised as follows:22
Practicing social skills: you
get a chance to meet all kinds
of people online. Because
socializing via technology
isnt as immediate as face-to-
face interactions or telephone
conversations, you have a little
more time to think about a
situation before you respond.
This is an opportunity for you
to experiment with greetings,
responses, etc.
Defined/guided social in-
teraction: While online com-

Guidelines for Children and Young People


19
Virtual worlds such as Wizard regardless of their real world Whats your online profile?: An interesting study with Habbo
101, Roblox and Minecraft are physical appearance, to enter a Hotels (a virtual world targeting 13 years and older)36 users reveals the
popular with children aged 12-14 community where all are equal digital profiles of teens online:
years. However among 14 15 and prejudice does not exist.
year olds, girls become more
engaged than boys, showing Taking on this new identity can Achievers Ambitious, strong minded and materialistic. They
allow for the user to express value material success and whilst having lots of
the popularity of fashion based
themselves differently, testing friends do not consider other people's feelings as
virtual worlds such as Stardoll and much as other segments
GoSupermodel. The Stardoll has a new profile or attitude, being
about 250 million global accounts. bold and upfront on issues that
Rebels Value gathering lots of experiences in life and enjoy
As evident there are virtual worlds matter to them, or even just
a fast-paced lifestyle. Like Achievers they want to
catering to each specific age live some- body elses life for become rich and famous, but they are not willing
group and gender.34 a while. Needless to say that to compromise on having fun in order to achieve this
there are rules that need to be goal
Virtual worlds, like Club followed, but the ability to test a
Penguin, that target primary different personality can be a fun Traditionals Value having an ordinary life and see themselves as
and elementary school children, experience. honest, polite and obedient. They are keen to help
allow users to create a profile and others but are less ambitious andpleasure seeking
take on the identities of penguin compared to other segments
avatars35 to play game and
activities. All users will have to Creatives Share many of the same positive traits as
Traditionals, but with a focus on creativity. They
design their own avatar with easy
place value in getting a good education and being
to use tools. The ability to appear influential in life, but they are also active, social and
as an avatar allows for everyone, have an interest in travelling

Loners More introverted and less likely than other segments


to identify with any specific personality traits. They
34 http://www.kzero.co.uk/blog/category/kidstween-worlds/ (Accessed 3 November 2015) rarely see themselves as active or self-assured, but
35 Avatars in video games are essentially the players physical representation in the game world, are more open minded in their attitudes compared to
http://en.wikipedia.org/wiki/Avatar_(computing) Traditionals or Achievers
36 Habbos Second Global Youth Survey 2008

Guidelines for Children and Young People


20 www.itu.int/cop

Guidelines for Children and Young People


21
Children and young people have and so forth. These communities Case Study: The Bright Side of Social Networks for Children with
online profiles and communicate might not be available to you Learning Difficulties
with each other by posting in your town, region, country,
comments or greetings on their but here again; ICTs folds the The positive benefits from social networks for children with learning
friends profile pages. Having world and brings it to your difficulties can be summarised as follows38:
many friends linked to ones screen and offers you the
Practicing social skills: you get a chance to meet all kinds of people on-
profile does appear to give a possibility of experimenting
line. Because socializing via technology isnt as immediate as face-to-face
high status amongst their peers, with forms of participation
interactions or telephone conversations, you have a little more time to think
although it is questionable and freedom of expression that about a situation before you respond. This is an opportunity for you to ex-
whether having a high number are rarely guaranteed in their periment with greetings, responses, etc.
of online friends in itself is an real, everyday lives in the adult
objective to strive for. Still, a world. The positive culture that Defined/guided social interaction: While online communication tech-
nologies increasingly allow for freeform interaction, social interaction can
typical teen Facebook user has reigns in online communities
be narrowed (for purposes of scope and safety). Some examples of focused
an average of 300 friends while helps everyone to have a good interaction online include buddy/friend lists, moderated themed chat rooms
the typical teen Twitter user has experience and increases the or message boards and, for younger children, the opportunity for parents
79 followers found a study in the willingness to engage with other to help a child by typing or reading along some of the time. This can help
United States37. people online and learn about children build skills and confidence that will increase their independence as
new things. they mature.
Many social networks facilitate
the creation of sub groups based Identity experimentation: A child can create an online identity that is dif-
on themes such as democracy, ferent from what he or she normally presents. For example, a kid who really
pets, games, school work music likes comics can be the king of all superhero knowledge online without
being teased about it at school. Such a child can also find a peer group online
that appreciates this aspect of him or her.
Frequent use of existing and emerging/changing technologies:
Technology is evolving faster than ever before. As you learn to adapt to new
technologies (or new applications of existing technologies), you will be bet-
ter equipped to adapt to future technology. This will help you quickly assess
the risks of communicating through these new and adapt your behaviour to
37 Pew Research Center, Teens, Social Media, and Privacy, 2013. Available at http://www.pewinternet.
org/2013/05/21/teens-social-media-and-privacy/(Accessed 9 November 2015) maintain control over your own safety.
38 http://www.greatschools.net/cgi-bin/showarticle/3120 (Accessed 26 November 2015)

Guidelines for Children and Young People


22 www.itu.int/cop

Be smart, responsible and


Be smart, responsible and
safe online just like in the

Guidelines for Children and Young People


real world

23
Games: Classic board games an increase in the numbers of nity within games is really popu- The risks in online gaming also
have also moved online and are younger children playing games lar, as well as the ability to form arise largely due to the minimal
now played alongside what is online. A 2014 Cox Internet Safe- groups, or guilds. These social as- restrictions involved and the fact
called massively-multiplayer ty Survey reveals nearly three in pects are a big reason why people that they are not face-to-face. Be-
online role-playing games four online gamers interact with keep playing games in South cause of this, children and young
(MMORPGs), such as the World other gamers online through web Korea.43 However given the people cannot be sure who they
of Warcraft. As with social chat, voice chat and web cam.41 excessive hours spent by children are playing against and chatting to
networks, online games can con- It is indeed a social activity that and young people playing online or what their motives are. Chil-
nect you with other players from captures youth universally and can games, South Korea passed the dren could also be playing online
around the world. More than 70% be played now on the smallest of Shutdown law (also known as the games with an inappropriate
of gamers play with a friend and handheld devices42. Game Addiction Law) in 2011. age rating. A survey by Get Safe
millions of people worldwide par- The Law forbids children under Online45 reveals about 25% of
ticipate in massive virtual worlds.39 The term online gamer may the age of 16 in South Korea to children and young people have
A recent research in UK shows conjure up images of a lone teen- play online video games from disclosed personal information
majority of children in each age ager playing Ever- Quest in his midnight to 6:00 A.M. Given the while online gaming. About 35%
group who play games online play parents basement, but thats not debate over this law, the Culture of children and young people
on their own/against the com- how it is in South Korea. Group and Gender Equality Ministry have spoken to someone they
puter or games player, accounting interaction is as strong a cultural announced in September 2014 dont know while online gaming,
for over four in five 5-7 year olds, tradition in that country as study- that children aged 16 and below while more than 15% of the chil-
close to seven in ten 8-11 year ing and shopping. Young people may be able to play online games dren have been bullied or verbally
olds and seven in ten 12-15 year go to the PC bangs to blow off in midnight with the approval of abused while online gaming.
olds40. The research also shows steam and to hang out. Commu- their guardians.44

39 http://www.apa.org/news/press/releases/2013/11/video-games.aspx (Accessed 10 November 2015)


40 Ofcom Report on Internet safety measures, Strategies of parental protection for children online, 2014, Available at http://stakeholders.ofcom.org.uk/binaries/internet/internet-safety-measures.pdf (accessed 25 November 2015)
41 Cox 2014 Teen Internet Safety Survey, Available at http://www.cox.com/wcm/en/aboutus/datasheet/takecharge/tween-internet-safety-survey.pdf (Accessed on 26 November 2015)
42 The Integration Centre. Online Gaming and Youth Cultural Perceptions. Available at http://www.integrationcentre.ie/getattachment/3728d764-143f-4ece-bf9a-a0134ceda102/Online-Gaming-and-Youth-Cultural-Perceptions.
aspx (Accessed 3 November 2015)
43 Adapted http://www.msnbc.msn.com/id/17175353/ (accessed 10 November 2015)
44 http://treeofsaviorgame.com/general/313/understand-game-addiction-law-in-south-korea-in-5-minutes/ (accessed 10 November 2015)
45 https://www.getsafeonline.org/safeguarding-children/gaming/ (Accessed 10 November 2015)

Guidelines for Children and Young People


24 www.itu.int/cop

Guidelines for Children and Young People


25
Digital Citizenship: it was not easy to delete personal Safer Internet celebrations:
The introduction of new information from an account.46 The positive and safer use of
technologies always carries the the Internet is celebrated around
Given this scenario, it is up to
need to understand how to use the world every year. This might
children and young people to
it appropriately. We, including involve children, the local school,
carry the main responsibility
children and young people, can industry and relevant players who
of acting appropriately and
demand that the producers and all collaborate in creating greater
respectfully online. Increasingly
providers build in as many safety awareness of the opportunities to
the term of digital citizenship is
features as possible, enabling get a positive online experience.
being used. Digital citizenship
us to make informed choices To get the most updated
isnt just about recognising and
on matters, like for instance, information on these events it is
dealing with online hazards. Its
revealing private information. A suggested you do a search online
about building safe spaces and
2015 global survey on privacy on for terms like internet safety
communities, understanding how
the Internet reveals that two out celebration + country name.
to manage personal information,
of three websites and apps collect
and about being Internet savvy
and process personal data of
- using your online presence to
children, and half of the sites and
grow and shape your world in a
apps share personal information
safe, creative way, and inspiring
about children with other
others to do the same47.
organizations. In more than 70%
per cent of these sites and apps,

46 https://www.getsafeonline.org/safeguarding-children/gaming/ (Accessed 10 November 2015)


47 http://www.insidemarketing.it/privacy-e-minori-il-50-di-siti-web-e-app-condivide-i-dati-di-bambini-con-terze-parti_8103/ (Accessed 25 November 2015) http://www.digizen.org/

Guidelines for Children and Young People


26 www.itu.int/cop

Guidelines for Children and Young People


27
Here is a list of issues you should consider when discussing Digital Citizenship.48
Digital Etiquette: Digital Access: full Digital Law: electronic respon- Digital Security (self-protec-
electronic standards of electronic participation in sibility for actions and deeds. tion): electronic precautions to
conduct or procedure. society. Digital law deals with the guarantee safety.
It is not enough to create Digital exclusion of any kind ethics of technology. There In any society, there are
rules and policy, we must does not enhance the growth are certain rules of society individuals who steal, deface
learn to become responsible of human beings in an elec- that fall under illegal acts. property, or disrupt other-
digital citizens in this new tronic society. One gender These laws apply to anyone peoples lives. The same is
society. should not have preferential who works or plays online. true for the digital com- mu-
treatment over another. Elec- nity. It is not enough to trust
Digital Communication: tronic access should not be Digital Rights and Responsi- your peers in the community
electronic exchange of determined by race, physical bilities: those freedoms extend- for your own safety. In our
information. or mental challenges. The ed to everyone in a digital world. own homes, we put locks on
Anyone should be afforded issue of people in cities or Basic digital rights must be our doors and fire alarms
the opportunity to access towns with limited connec- addressed, discussed, and in our homes to provide
information anywhere and tivity needs to be addressed understood in the digital some level of protection.
anytime. as well. To become produc- world. With these rights also The same must be true in
tive citizens, we need to be come responsibilities. Users, the digital world to provide
Digital Literacy: process of including children and young
committed to equal digital protection and digital secu-
teaching and learning about people, must help define
access. rity. We need to have virus
technology and the use of how the technology is to protection, backups of data,
technology. Digital Commerce: electronic be used in an appropriate and surge control of our
As new technologies emerge, buying and selling of goods. manner. In a digital society equipment. As responsible
we need to learn how to use Children and young people these two areas must work citizens, we must protect our
that technology quickly and need to learn about how to together for everyone to be information from outside
appropriately. We need to be be effective consumers in a productive. forces that might cause dis-
digital literate. safe digital economy. ruption or harm.

48 http://www.digitalcitizenship.net/Nine_Elements.html (Accessed 26 November 2015)

Guidelines for Children and Young People


28 www.itu.int/cop

All children and young people around the world


have the right to a safe experience online

Guidelines for Children and Young People


3.
29

What you need to know


to stay safe online
INTERNET SAFETY requires and deserves individual
GUIDELINES: attention. One size does not fit all.
Internet safety messages need to Nothing should ever be assumed
be timely, age specific, culturally or taken for granted.
sensitive and match the values and The first age group 5-7 year
laws of the society in which the old:
child or young person lives.
This group experience their
The COP Initiative has first contacts with technology.
identified three principal age Their usage should be closely
groupings of young Internet supervised at all times by a parent
users. These groupings broadly or adult. Filtering software or
correspond with the key stages other technical measures may also
of development on a childs have a particularly useful role to
journey to adulthood. Hence play in supporting the use of the
the guidelines can be seen as a Internet by a child of this age. It
ladder which takes you through would be wise to consider limiting
progressive phases. However, we such a young childs potential
cannot emphasise too strongly access e.g. by constructing a list
that every child is different who of safe websites, which are age

Guidelines for Children and Young People


30 www.itu.int/cop

Guidelines for Children and Young People


31
appropriate such as a walled childhood a child is expected their own tastes. They will very The COP guidelines recognize
garden. The aim is to provide to test the barriers and evolve often be able to use technology the difficulty in creating messages
this age group with the basics through this kind of learning. with a high level of proficiency, that will cover the needs of all
in Internet safety, etiquette Filtering software or other without any adult supervision or ages within the defined groups.
and understanding. This age technical measures may have a interaction. Filtering software will Local laws and customs are also
group will probably not be able particularly useful role to play in start to become less useful and profoundly important in matters
to decode more sophisticated supporting the use of the Internet less relevant but it certainly could of this kind. There is not a one-
messages. Parents or adults with by a young person of this age. continue to play an important size-fits-all. The COP Initiative
responsibility for children should supporting role, particularly for would be very happy to assist
consult the COP guidelines for An important aspect of this age some young people who may with adapting and localizing the
parents, guardians and educators group is the sometimes uncritical have temporary or longer-term content of this and any other
to see how they might best assist approach to content and contact, vulnerabilities. COP Guidelines. If you wish to
the youngest age group to stay which can put the age group in a pursue this, you are invited to
particularly vulnerable situation Linked to their own hormonal
safe online. make contact via cop@itu.int.
for predators and commercial development and a growing sense
The second age group: 8-12 entities wishing to engage with of physical maturity, teenagers
year old: them. can go through phases when they
This age span is a challenging feel a very strong need to find
The last age group: 13 year old their own way, to escape close
transition for the child. Typically
and above: parental or adult supervision and
he or she is becoming a young
person with a greater capacity to This group is the one covering seek out their peers. A natural
form questions. Their curiosity the longest span, is the group curiosity about sexual matters
will start to push them to seek consisting of young people can lead some people in this age
out and challenge boundaries, who are, namely, teenagers. This group into potentially worrying
looking for their own answers. It group is growing up rapidly, situations and this makes it all the
is an age group where awareness transitioning from being young more important for them to un-
of what is available online exists. people to becoming young adults. derstand how to stay safe online.
The impulse to seek and find out They are both developing and
whats there is great. Throughout exploring their own identities,

Guidelines for Children and Young People


32 www.itu.int/cop

Guidelines for Children and Young People


33
SMART rules
for children and young people
S = Set your limits
M = Meeting online friends offline
A = Accepting invitations/friendships
R = React
T = Tell someone about your concerns
Using the Internet is fun. Enjoy it most by keeping
yourself safe
1. YoucandoalotofgreatthingsontheInternet.Youcanplaygames,
you can chat with your friends, meet new friends and find a lot of
usefulinformation.Youhavetherighttoenjoyandexploreallthatthe
digital world has to offer!
2. But you also have to be aware that you can find some unpleasant
thingsontheInternet,suchasimagesandstoriesthatmayconfuse
or even frighten you. Your friends and trusted adults are not the
only people within this digital world. Unfortunately the Internet is
also used by people who are not so niceor whomighteven wantto
harm, harass or bully you or other people.While using the Internet
you need to be aware of certain basic rules to be able to safeguard
yourself and others.
3. You have the right to use the Internet safely and to set your own
limits. Be smart, responsible and safe online, as well as in real life!
Guidelines for Children and Young People
34 www.itu.int/cop

Guidelines for Children and Young People


35
S = SET YOUR LIMITS
1. Takecareofyourprivacy.Whetherusingasocialnetworkingsiteor
any other online service take care of your privacy and that of your
familyandfriends.Youmighthavethefeelingofbeinganonymous
onlinebutcollectinginformationfromvarioussourcescanrevealtoo
muchprivateinformationaboutyourselforothersyouarecloseto,
including your family.
2. Ifyoujoinasocialnetworkingsiteusetheprivacysettingstoprotect
your online profile so that only your friends can see it. Wherever
possibleinsteadofyourrealnameyoushoulduseanicknamethat
yourrealfriendswillbeabletorecognize.Otherinteractiveservices,
forexampleinstantmessaging,willoftenalsoprovideprivacytools.Use
them
3. Think twice before you publish or share anything online. Are you
preparedtoshareitwitheveryoneonline;yourclosefriends,aswell
asstrangers?Onceyoupostinformation,photographsoranyother
material on the Internet, you may never be able to remove it or
prevent other people from using it. You can never know for sure
where it might end up.
4. Be critical what appears to be a fact may really not be true at all.
Unfortunately,ifitappearstoogoodtobetrue,itprobablyis.Always
double check the information from other reliable sources.
5. Youhaverightsandyou,aswellasotherpeople,shouldrespectthem.
Youshouldneveracceptharassmentorbullyingbyotherpeople.The
lawsandexpectationsofdecentandacceptablebehaviourarevalid
online as well as in real life.

Guidelines for Children and Young People


36 www.itu.int/cop

Guidelines for Children and Young People


37

M = MEETING ONLINE FRIENDS OFFLINE


1. Sometimes online contacts develop into friendships.
2. Thinktwicebeforemeetinganonlinefriendinreallife.Ifyoustill
wouldliketomeetanonlinefriendoffline,youshouldalwaystake
someonereliablewithyou.Youshouldaskyourparentoranother
trustedadulttojoinyoutoavoidanytroubleincasethemeeting
turns out to be a disappointment.
3. Bear in mind that your online friend might turn out to be a
different kind of person than you thought he or she would be.

Guidelines for Children and Young People


38 www.itu.int/cop

Guidelines for Children and Young People


39

A = ACCEPTING INVITATIONS / FRIENDSHIPS


1. Mostofthepeopleyoucommunicatewithonlineareprobablyalready
your friends in real life. You can also be connected to the friends of
your friends. Very often that can be fun but at the same time if
youdonotactuallyknowsomeoneyourself,areyoureallyprepared
to count them as afriendand share with them exactly the same
information that you share with your oldest and best friends?
2. Throughonlineconnectionsyoucanconnectwithpeoplepreviously
unknowntoyou.Youmaygetrequestsbystrangerswhowanttobe
included in your contact list and see your profile, but it is not wise to
acceptthem.Theresnothingwrongwithdeclininginvitationsyouarenot
sureabout.Gettingmoreandmorecontactsisafterallnotthepointof
social networking.

Guidelines for Children and Young People


40 www.itu.int/cop

Guidelines for Children and Young People


41
R = REACT
1. Protect yourself from upsetting or distressing content. Do not
knowinglyaccessorsharelinkstosuchsites.Ifyouseesomething
that bothers you, talk about this with your parents or someone
you trust.
2. Ignorebadbehaviourandleaveunpleasantconversationsorsites
withinappropriatecontent.Asinreallifetherearepeoplewhofor
somereason,maybehaveaggressively,insultinglyorprovocatively
towardsothers,orwhowanttoshareharmfulcontent.Usuallyitis
better just to ignore them and then block them.
3. Blockanyoneapproachingyouusingrude,intrudingorthreatening
emails or comments. Even if the message may be upsetting and
makes you feel uncomfortable you should save it so you can
show it to an adult for advice if needed.You are not the one to be
ashamed of the content of the messages.
4. Alwaysbealertifsomeone,especiallyastranger,wantstotalkto
you about sex. Remember that you can never be sure of the true
identityortheintentionsofthatperson.Approachingachildora
youngpersoninasexualwayisalwaysaseriouscauseforconcern
andyoushouldtellatrustedadult,soyouorthetrustedadultcan
report it.
5. Ifyouhavebeenluredortrickedbysomeoneintoengaginginsexual
activities or transmitting sexual images of yourself, you should
always tell a trusted adult in order to receive advice and help. No
adulthasarighttorequestthingsofthatparticularnaturefroma
childorayoungperson-theresponsibilityalwayslieswiththeadult!

Guidelines for Children and Young People


42 www.itu.int/cop

Guidelines for Children and Young People


43

T = TELL SOMEONE ABOUT YOUR CONCERNS


1. Ifyouhaveanyconcernsorproblemswhileonline,youneedto
tell someone you can trust. Your parents or some other adult
can help and give you good advice on what to do.There are no
problemsthataretoobigtobesolved!Youmightalsowanttocall
a child helpline available in your country.
2. Youcanreportharmfulorinappropriatecontentoractivitieson
the websites to the abuse e-mail of the host of the site.
3. You can report illegal content to an Internet Hotline or to the
police.
4. Youcanreportillegalorpossiblyillegalactivitiestothelocalpolice.
5. Inadditiontotakinggoodcareofyourself,youshouldalsotake
care of your computer or mobile device. Like the SMART rules,
there are some easy tips to remember in order to keep your
computer and mobile device safe.

49 E.g. CHI available at: www.childhelplineinternational.org

Guidelines for Children and Young People


44 www.itu.int/cop

Guidelines for Children and Young People


45

Learn to use your 6. Learn to check who you are Your online rights
connected to learn to use
machine safely: tools like Netstat Finally, a
You have the right to make
use of technologies to devel-
1. Make sure you have installed great way to make sure that op your personality and help
and learned how to use a fire- your parents agree with your increase your capabilities;
wall and anti-virus software. online life is to set up a written
agreement with them. The You have the right to protect
Remember to keep them up your identity;
to date! purpose is to reassure them
that you are aware of the risks You have the right to
2. Learn about your computers participate, have fun
associated with being online,
operating system (like and access information
knowing how to behave and
Windows, Linux, etc.) and appropriate to your age and
what to do, as well involving
especially about how to patch personality;
your parents making them
it and keep it up to date.
understand what you actually You have the right to
3. If parental controls are do when you are online. express yourself freely, and
installed then talk with your The agreement needs to be be treated with respect while
parents and agree on the level based on a mutual agreement always respecting others;
that matches your age and between you and your parents.
needs. Dont try to crack them. You have the right to be
There is an example of such critical and discuss anything
4. If you receive a file you are a contract at the end of these you read or come across
unsure of or dont know who guidelines (Appendix 1). You when online;
has sent it, do NOT open it. will be able to find different
This is the way Trojans and You have the right to say
versions of a Family Internet
viruses infect your machine. NO if someone makes you
Safety Contract online.
feel uncomfortable with his/
5. Get a feeling for your machine her requests when online.
and how it works so that you
can act if you spot something
unusual.

Guidelines for Children and Young People


46 www.itu.int/cop

Guidelines for Children and Young People


47

Guidelines for the age consult the COP guidelines for


parents, guardians and educators
group 5-7 year old to see how they might best assist
Many young people in this age the youngest age group to stay
group will not be able to read safe online. In addition, several
or understand Guidelines of useful and interesting links to
this kind. Their usage should online resources for this age
be closely supervised at all group have been listed in the
times by a parent or adult as section Sources for Further
well. Filtering software or other Reading and Inspiration.
technical measures may also have
a particularly useful role to play in
supporting the use of the Internet
by a child of this age. It would be
wise to consider limiting such a
young childs potential access to
the Internet e.g. by constructing
a list of safe websites which are
age appropriate. The aim is to
provide this age group with the
basics in Internet safety, etiquette
and understanding. This age
group will probably not be able
to decode more sophisticated
messages. Parent or adults with
responsibility for children should

Guidelines for Children and Young People


48 www.itu.int/cop

Guidelines for Children and Young People


49

Guidelines for the age 1. Be careful who you trust 5. Always keep your password or embarrassed. Its important
online. A person can pretend secret. Dont even share it with to be kind and polite to others
group 8-12 year old your friends. online stop and think about
to be someone they are not.
There are lots of different things 2. Choose your friends. While its 6. If you want to arrange to how your behaviour will affect
you can do online. While most good to have a lot of friends, meet someone youve met them.
of the time its all great fun, having too many, makes it online, check with a parent
sometimes things dont go as well harder to keep an eye on who first and ask them to go with Tips
as you hoped and you may not sees the stuff you post online. you. Always meet in a brightly Treat other people the way
immediately know why or what to Dont accept friend requests lit public place where lots of you would like to be treated.
do about it. This section has some if you really dont know the other people will be around, Avoid using bad language
really helpful tips to help you be person and youre not sure preferably during the day. and dont say things to
safe online. about them. 7. If someone writes something someone to make them feel
3. Keep your personal details rude, scary or something you bad.
Chatting to friends using IM,
in chat rooms and on social private. Use a nickname dont like, tell your parents or Learn about the netiquette
networking sites can be great ways instead of your real name if another adult you trust. of being online. Whats con-
to keep up to date. Meeting new you are in a site or game where sidered okay to do and say
friends online is also fun. You there may be lots of people Netiquette and what isnt? For example,
can meet people online who like you dont know. Ask your By netiquette we mean how you if you type a message to
the same movies or sports as you. parents before giving anyone should or should not behave with someone in UPPER CASE
But while there are lots of good on the Internet your name, other people online. Sometimes they may think you are
points about keeping in touch address, phone number or any its easy to forget that the other shouting at them.
with online friends, there are also other personal details. person you are chatting to on IM, If someone says something
some risks with meeting people 4. Set your profile to private. playing a game with, or posting to rude or something that
onlineespecially if you dont Ask your parents to help you their profile is a real person. Its makes you feel uncomfort-
know them in real life. do this if youre not sure. Its easier to say and do things online able, dont respond. Leave
really important. that you might not do in real the chat room or forum
To help stay safe while you chat, life. This may hurt that persons straight away.
remember some simple tips: feelings or make them feel unsafe
Guidelines for Children and Young People
50 www.itu.int/cop

Tell your parents or another Limit your game play time so ing unsafe and alone. No-one has your ISP and/or phone
adult you trust if you read up- you can still do other things the right to bully another person. provider or the website
setting language, or see nasty like homework, jobs around At its most serious, bullying is administratorthere are
pictures or something scary. the house and hanging out illegal and can be investigated by actions they can take to
with your friends. the police. help.
Playing online games Keep personal details the policeif there is a
Playing games online and using private. Tips threat to your safety the
consoles or games on a computer Remember to make time Ignore it. Dont respond to police will help.
can be great fun, but you need to offline for your friends, your the bully. If they dont get a
be careful about how much you favourite sports and other response they may get bored If a friend is being bullied
play and whom you play with. It activities. and go away. online
is important that if you chat with Block the person. This will It can be hard to know if your
other gamers you protect your Bullying stop you seeing messages friends are being bullied. They
privacy and dont share personal or texts from a particular
The same rules apply online as might keep it to themselves. If
or private information. If you are person.
in the real world about how to they are being bullied, you might
unsure whether a game is suitable,
treat other people. Unfortunately, Tell someone. Tell your notice that they may not chat
ask your parents or a trusted adult
people dont always treat each mum or dad, or another with you online as much, or they
to check its classification and
other well online, and you, or a adult you trust. Keep the suddenly receive lots of SMS
reviews for you.
friend, may find that you are the evidence. This can be useful messages or are unhappy after
target of bullying. You might be in tracking the bully down. they have been on the computer
Tips teased or have rumours spread Save texts, emails, online or checked their phone messages.
If another player is behaving about you online, receive nasty conversations or voice- mails They may stop hanging around
badly or making you uncom- messages or even threats. It can as proof. with friends or have lost interest
fortable, block them from happen in school, or out of it, any Report it to: in school or social activities.
your players list. You may hour of the day, from people you
your schoolthey should
also be able to report them know, and sometimes people you
have policies in place
to the game site operator. dont know. It can leave you feel-
about bullying.

Guidelines for Children and Young People


51

Help stop bullying


1. Stand up and speak out! If you
see or know about bullying
happening to a friend,
support them and report it.
Youd want them to do the
same for you.
2. Dont forward messages or
pictures that may hurt or be
upsetting to someone. Even
though you may not have
started it, you will be seen to
be part of the bullying cycle.
3. Remember to treat others as
you would like to be treated
when communicating online.

Guidelines for Children and Young People


52 www.itu.int/cop

Guidelines for Children and Young People


53

Your digital footprint 2. Dont share your username or Offensive or illegal 4. Check with your parents that
password with anyone. your search engine is set to
Its great to share things online content block material that is meant
with your friends. Part of the 3. Think before you hit send or
When you are surfing the web for adults.
fun of sharing videos, images post. Once posted, it can be
you may come across websites,
and other content, is that lots of content difficult to remove 5. Ask your parents to install
photos, text or other material that
people can view and respond. content. internet filter software to block
makes you feel uncomfortable or
Remember that others whom you 4. Dont post anything you dont bad sites.
upset. There are some easy ways
dont know may also view what want others to know or find to handle these situations. 6. Ask your parents to help you
you share with your friends. They out about you - or that you find safe and fun sites to use
may also be able to look at it for wouldnt say to them face to and bookmark for later.
Tips
years to come. Everything you face.
post adds up to your digital foot- 1. Tell your parents or another
5. Remember that private images
print and, once its online, it could trusted adult if you come
and videos you send to friends
be there forever. So think before across material that upsets you.
or pose of a social networking
you post. sire may be passed on to other 2. Know how to escape from a
and uploaded to public areas. website if an Internet search
Tips takes you to an unpleasant or
6. Be respectful of other peoples
nasty website. Hit control-alt-
1. Keep your personal details content that you post or share.
delete if the site will not allow
private. Use an appropriate For example, a photo that your
you to exit.
nickname instead of your real friend took is their property,
name. Ask your parents before not yours. You should post it 3. If a website looks suspicious
giving anyone on the Internet online only if you have their or has a warning page for
your name, address, phone permission and make a note people under 18 years, leave
number or any other personal about where you got it from. immediately. Some sites are
details. not meant for kids.

Guidelines for Children and Young People


54 www.itu.int/cop

Guidelines for Children and Young People


55

Guidelines for the age Harmful and illegal many channels involved in social
networking.
group 13 years and above content
Curiosity, interests, and a desire
Huge number of young people in Therefore
to learn new things and explore
this age group use social network 1. Before starting a search you
new facets of knowledge: the
sites, online games and Instant should have a clear idea of
Internet is a great tool to satisfy
Messenger applications. Going what you are looking for;
such needs. But the Internet is an
online is not just something they
open world in which everyone is 2. In order to narrow things
do occasionally or for fun. For
free to circulate news or almost down you can use advanced
many it is an integral part of their
anything else. It contains an search functions or directories,
daily lives. Its how they stay in
infinite amount of information, that is, the thematic catego-
touch with and communicate with
so vast in scope that it is easy to ries that most search engines
their friends, how they organize
get lost or run into untruths and provide (i.e., for sports, health,
large parts of their social lives and
material not appropriate to your cinema, etc.);
school work. Here you will find
needs or age. We are referring to 3. Put your critical sense to work
information on how to be safe
sites that, for example, promote and try to determine whether
using these online platforms as
racial hatred or incite violence, the site is trustworthy: When
well as insight into what you can
sites that could lead you to you access the site do other
do to help create a safe and posi-
come across pornographic or pages begin to automatically
tive online space for you and your
child abuse material and sites open? Are you able to find
friends.
that can lead you to self-harm. out who owns the site? Is it
This can occur in a purely easy to contact the owner?
accidental way, as in the case of Can you tell who wrote the
searches on completely different page or particular article you
subjects, through e-mailing, P2P are viewing? (You can always
programmes, forums, chat rooms do another search to find out
and, more generally, through the more about the author and/

Guidelines for Children and Young People


56 www.itu.int/cop

Guidelines for Children and Young People


57

or owner). Make sure you have happened and any feelings Sexual predators use the Internet Many children and young people
written the website address you may still have about the to contact children and young who get drawn into these kinds
correctly; there are some sites occurrence/experience; people for sexual purposes, often of predatory relationships will
that use a name similar to 5. Contents (images, videos, using a technique known as lack a certain level of emotional
another to take advantage of etc.) that are found on the grooming. This involves gaining maturity or have low self-esteem
possible incorrect typing. Is web relating to sex can often the childs or young persons that can make them susceptible
the sites text spelt correctly or be of a pornographic nature confidence by appealing to his or to this kind of manipulation
are there grammatical errors? and convey sexual material in her interests. These predators are and intimidation. They may
Are there dates included that a typically adult manner with highly manipulative people. They also be hesitant to tell adults
can indicate whether the site sentiments that are not appro- often introduce sexual topics, about their encounters for fear
has been updated? Are there priate to your age group. photos and explicit language to of embarrassment or of losing
any legal notes (regarding, for raise sexual awareness and get access to the Internet. In some
example, privacy)? What is grooming? their intended victims to drop cases they are threatened by
4. If, while surfing online, you their guard. Gifts, money and predators and told to keep the
come across sites containing The Internet and mobile phones even tickets for transportation are relationship or what happened a
violent, self-harm, racist, can potentially be used by abusive sometimes used to persuade and secret.
illegal or child abuse materials adults to make contact with boys lure the child to a place where
For this reason:
dont forget that these sites and girls. This happens particu- the predator can sexually exploit
larly through SMS and MMS mes- him or her. These encounters It is essential that you be
can be reported to the police
saging, chat rooms, Instant Mes- may even be photographed or aware of this risk, and that
or a hotline. Try to find out
saging programmes, newsgroups, video- taped, or if a meeting does not everyone online is who
to whom you can send these
forums, online games, and, more not take place in the real world he/she claims to be. Online
reports in your country; your
generally, through all the social the predator might persuade the seducers can often pretend
parents or another adult you
networking spaces, where it is child to make sexual images of to be your age in order to
trust can also help you in filing
possible to obtain information on themselves or their friends or take create an atmosphere of fa-
a report. You should also
users ages, sex and more, through part in sexual activity using a web miliarity and trust that could
talk to someone about what
the profiles theyve compiled. cam to broadcast it. lead to an offline meeting
and possible abuse;

Guidelines for Children and Young People


58 www.itu.int/cop

Guidelines for Children and Young People


59

Protecting your personal to be cautious about these things with people Sexting
data is important; in the real inserting identifiable or who you already know and Sexting is the sending and receiving
world, you would never give traceable data (name and trust in real life. of text, photo or video messages
out such details and youd surname, address, the name If attempts at allurement or of children and young people that
never tell people you dont of your school, mobile awkward situations should are inappropriate and sexually
know about your private phone numbers, e-mail occur, it is important to explicit. These images are mostly
matters. Even if a nice address, etc.). Such details find someone to speak to, self generated and shared through
virtual friendship has been can become accessible to an adult or friend; Internet mobile phone MMS, Skype and so-
formed, that might seem anyone, and it is therefore service providers will also cial networking sites where images
like it could lead to some- advisable to create an often allow users to report can be posted and shared (such as
thing more, it is important identity for yourself, using incidents by clicking on Facebook, Twitter, Tumblr, Flickr,
to remember that you dont nicknames or aliases and report or notify, in YouTube, Instagram, Snapchat
always know who is really at fictional images or avatars, order to report the abuse. etc.)50 According to a recent survey,
the other end of the com- and not provide any detailed Alternatively, you can turn about 20 percent of teen boys and
puter; personal information; directly to the police. girls have sent such messages.51
In order to enter a chat When you are curious about Young people may also call it
room, forum, or more your sexuality or your more It is also advisable to save cybersex or sending a nudie, picture
generally, a social network, intimate feelings, remember e-mails and chat room text, or selfie.52 Most young people do
you often have to compile that the Internet can some- SMS or MMS messages not see sexting as a problem.
a personal profile, inserting times be a source of really (using messages inbox, Many consider it as flirting and are
information that can be good advice and information for example), as they can be reluctant to talk to adults about it
detailed to varying degrees. but very often it is better to provided as evidence to the because they are afraid of being
In such cases, it is essential try to find a way to discuss police. judged or having their phones and
gadgets taken away.

50 So you got naked online. Available at https://esafety.gov.au/~/media/cesc/documents/sygno-english-brochure-pdf-so-you-got-naked-online.pdf


(Accessed 3 November 2015)
51 https://www.aap.org/en-us/about-the-aap/aap-press-room/news-features-and-safety-tips/pages/Talking-to-Kids-and-Teens-About-Social-Media-and-Sexting.
aspx#sthash.TcXDRfUF.dpuf (Accessed 3 November 2015)
52 http://www.nspcc.org.uk/preventing-abuse/keeping-children-safe/sexting/ (Accessed 3 November 2015)

Guidelines for Children and Young People


60 www.itu.int/cop

Sexting may be considered harm- by others. These images may just for a bit. It is wrong for could get into trouble with
less but there are several risks. never be completely removed and anyone to be pressuring you the police.
Taking, sharing or receiving an could be found in the future, for in this way. If your picture is posted
image, even voluntarily, can have example when applying for jobs If an adult has been making online then un-tag yourself
a long-lasting negative impact. or university.53 A study finds that you feel uncomfortable by and report it to the website
Young people can become vul- about 90% of self-generated sex- asking you to send them im- where it is posted so it can
nerable to blackmail, bullying, ually explicit photos and videos ages, you can report them. If be removed.
unwanted attention and emotional by young people are taken from an adult does this it is called
distress. Moreover sexting is ille- its original upload source and put online grooming. (You can Its important to know that mak-
gal. By sending an explicit image, somewhere else.54 read more about grooming ing a report doesnt mean the
a young person is producing and in the section above.) If you content will definitely be re-
It is important to be aware that moved. Most websites have a set
distributing child abuse images are under 18, they are break-
sexting is not a harmless activity of rules - Terms of Use - which
and risks being prosecuted, even ing the law.
and can have serious consequenc-
if the picture is taken and shared they expect people using their site
es. Here are some ways to take If you have sent a picture or
with their permission. Its easy to to obey. Websites will only take
action and stay in control55: video you regret to a friend,
send a photo or message but the content down if they break these
If someone is pressuriz- someone you met online or rules. If you want to have some-
sender has no control about how
ing you to send a sexually your girlfriend/boyfriend thing taken down from a site you
its passed on.
explicit picture of you, ask ask them to delete it imme- should check
When images are stored or shared them to stop. Just dont reply diately. If you have received
online they become public. They at all and hopefully theyll a sexually explicit photo, you to see if it breaks one of their
can be deleted on social media get the hint. But if theyre should delete it immediately rules. Facebook calls their rules
or may only last a few seconds still bothering you or mak- too. Remember if you send Community Standards, You-
on apps like Snapchat, but im- ing you feel upset its okay it on, you are distribut- Tubes rules are called Commu-
ages can still be saved or copied to block them - even if its ing pornography - and you nity Guidelines and other sites

53 http://www.nspcc.org.uk/preventing-abuse/keeping-children-safe/sexting/ (Accessed 3 November 2015)


54 https://www.iwf.org.uk/resources/iwfresearch (Accessed 10 November 2015)
55 Adapted from https://esafety.gov.au/esafety-information/esafety-issues/sexting (Accessed 10 November 2015)

Guidelines for Children and Young People


61

like Tumblr, Twitter and Instagram possible to keep in touch with old everyday language bullying often necessarily involving any physical
have their own sets of rules and friends or make new ones in real describes a form of harassment contact can have just as painful
ways to report. Before using any time and in all parts of the world perpetrated by an abuser who pos- consequences as that of tradi-
website you should read them to and to exchange ideas, play games, sesses more physical and/or social tional forms of bullying. In United
learn what is, and what isnt, ac- carry out research, etc. Although power and dominance than the States, about 24% of teens report-
ceptable on the site. You should most of these services and the victim. The victim of bullying is ed being bullied online in 201457.
also learn how to report content to ways they are used are positive, in sometimes referred to as a target. In Europe, 15% of children and
the site.56 some cases these same tools can The harassment can be verbal, young people reported online bul-
be used to offend, deride, defame physical and/or emotional. (www. lying in 201558. Other studies in
If you have been affected by sex-
and annoy Internet users; and wikipedia.org) Europe show that cyberbullying is
ting it is important to tell some-
furthermore, violent or offensive on the rise. Among 13-14 year-
one. Talk your parent, teacher or Very often bullying takes place in
off-line behaviour becomes magni- olds, the rate of cyberbullying has
another adult that you trust so they schools or local neighbourhoods.
fied when filmed with mobile increased from 8% to 15% in four
might be able to get you the sup- Unfortunately, there are increasing
port that you really need. Sharing phones and exchanged or posted years (2010-2014)59.
on the Net. numbers of bullies and real forms
with a trusted friend may help too. of bullying online, ranging from For this reason it is important that
What is bullying? Bullying is the offensive websites to harassing text you know that this phenomenon
Bullying act of intentionally causing harm messages, and sending unwanted exists and that you are aware of
Through services such as e-mail, to another person through verbal photos via mobile phones and the different forms it can take and
forums, chat rooms, blogs, Instant harassment, physical assault or so on. This particular form of what can be done to avoid becom-
Messaging programmes, SMS and other more subtle methods of bullying which can possibly of- ing a victim:
MMS, and video cameras, it is coercion such as manipulation. In fend and hurt someone without

56 http://www.thinkuknow.co.uk/14_plus/help/Contact-social-sites/ (Accessed 3 November 2015)


57 Cox 2014 Teen Internet Safety Survey, Available at http://www.cox.com/wcm/en/aboutus/datasheet/takecharge/tween-internet-safety-survey.pdf (Accessed on 26 November 2015)
58 INSAFE and INHOPE helpline data, available at http://helplines.betterinternetforkids.eu/# (Accessed 26 November 2015)
59 European Schoolnet, Bullying in Schools, A summary of research and anti-bullying initiatives, 2015 Available at http://files.eun.org/enable/assets/downloads/Review%20of%20bullying%20and%20cyber%20bullying%20
summary%20report.pdf (Accessed 16 November 2015)

Guidelines for Children and Young People


62 www.itu.int/cop

Guidelines for Children and Young People


63

Do not circulate your per- attempting to provoke you it to send the message. with; there are quite a number
sonal data thoughtlessly, as such as: The online bully could of different IM systems, such
this could make you easily Many games allow for also hack into someone as Windows Live Messenger,
identifiable and more prone the exclusion of undesir- elses account and use ICQ, AOL Messenger, Yahoo
to acts of bullying and able (or unwanted users); it for his/her offensive Messenger! Bullies know which
intimidation by others your behaviour and therefore are the most popular among
When chat rooms are youngsters and make use of them
own age; letting the blame fall on
monitored, it is possible for their own purposes such as
Once information is posted the unfortunate person
to save the offending text flaming, or provoking an online
online it is out of your con- whose e-mail account
from the chat and report fight. Conversations or fights that
trol and available to anyone was wrongfully used;
it to the monitor; break out online can, at times,
and open to any sort of use. Most e-mail programmes
Abuses can be reported have after-effects that drag on at
You need to be completely offer filters to block un-
to service providers or, in school or other places offline.
clear on this concept; what wanted incoming e-mails.
may seem like an innocent the case of abuse via mo-
Many instant messaging In all cases remember that it
joke could wind up having bile phones, the report
programmes offer the is important to tell someone
very irritating and hurtful can be sent to the mobile
possibility of creating a list about what is happening if you
consequences for others; phone company;
of names that users can ever feel at all uncomfortable or
It is important to refrain In the more serious cases, threatened.
choose to block. In this way,
from reacting to provoca- such as cases involv-
you can prevent unwanted Tell your parents, a teacher
tions received via SMS, ing physical threats, it is
people from making contact or someone within the school
MMS, and instant messages, advis- able that the police
with you. staff you feel you can trust.
in offensive or defamatory also be informed;
Even telling your friends could
e-mails, in chat rooms or It is possible to trace An Instant Messaging (IM) system
be helpful.
during online encounters the e-mail account from lets you know when one of your
with other users. Instead which the offensive known and approved contacts You can also report to the service
you need to employ certain message was sent, but is online and, at that point, you provider or mobile operator,
strategies that can exclude practically impossible to can begin a chat session with even to the police if it is serious.
or limit the actions of those prove who actually used the person you feel like talking Remember to save the evidence
Guidelines for Children and Young People
64 www.itu.int/cop

Guidelines for Children and Young People


65

of the bullying, as this will be personal profile that includes more Whenever you need to to send you any advertising
really important when you tell or less detailed types of informa- divulge your personal data material, or if they propose
someone. tion. Different sites have different make sure that whoever to pass on your details to
rules. Before you enter any infor- is requesting information any other companies. If you
Bullying is not acceptable either mation about yourself into a sites about you is authentic and dont want them to do either
in an online or an offline environ- database or membership records, serious and also remem- or both of those things, tick
ment. In many countries there check how the information might ber that before giving data the relevant boxes. If they
are national or local organizations
be used, whether or not some or regarding your friends you dont offer you an option
that you can turn to for help. In
all of it will be published, and if so need to first inform them you really should think about
some countries, such as Canada,
where. If you feel uncomfortable and have their permission not using the service at all.
cyber-bullying is considered
with the amount of information because they may not be Send personal photos and
an actual criminal act. In most
being asked of you, if you do not happy about having their videos only to those you
countries it is a criminal offence to
really know or trust the site, dont e-mail addresses or other actually know, your image
threaten someone or to harass or
provide it. Look for another or information about them constitutes personal data and
stalk them, whether in real life or
similar service which asks for less passed on to others; you need to make sure it is
online.
information or promises to treat not circulated thoughtlessly.
You may not be obliged to
An interesting fact: the term bully your information more carefully. The same goes for images
provide all of the informa-
originally had a very different tion requested of you and of others. Keep in mind that
Wherever possible it is advisable
meaning from the one it has today you should insert only the it is practically impossible to
to create an identity (or alias) by
- in fact, 500 years ago it meant determine where an online
using an invented nickname and types of data that are strictly
friend or family member image can end up; before
not add anything else. Above all it required. In any event, it is
how things have changed! filming or photographing
is important for you to have a clear always best to find out as
Defend your privacy: Nowadays, understanding of what may be and much as possible about the someone you should always
setting up a blog or a personal what is best not to share with oth- person, service or company ask for their permission.
website, is relatively simple. In ers. What goes online can quickly you are dealing with before When you need to register
order to join a chat room, forum go beyond your control and be at providing your data. In par- for a particular service, try
or more generally, a social net- anyones disposal for any possible ticular check to see if the site to employ a few simple
work, you must first put together a use: asking for the data proposes devices: for example, use
Guidelines for Children and Young People
66 www.itu.int/cop

Guidelines for Children and Young People


67

a password that would be you already know could be Only engage in activities that Peer to Peer (P2P) software
hard to figure out so that accessed by strangers. you feel you are absolutely enables one to share
no one else can guess it Do not open email sure about. If you smell and exchange ones files
and get into your account; attachments from sources something fishy, something directly with other Internet
use a complex e-mail you do not know or thats not quite right, that users, without any extra
address, possibly with both programmes you do not doesnt totally convince connection costs. Music,
numbers and letters (e.g. know the possible effects of, you, or you think is being films, videos, and games are
mrx- 3wec97@... . com) so they could be a Key Logger unjustly charged for, then among the materials that
it be- comes more difficult your best move is to leave are most sought after and
(capable of recording all
to guess by spammers it alone. You have the right downloaded by youngsters,
the keys being punched
or unknown people who to criticise and question but they are often covered
on the keyboard, enabling
might want to send you what you come across while by copyright provisions
them to find out passwords,
unwanted mail; make sure online. Remember things are and protected by law.
numeric codes, credit card
your anti-spam service (for not always as they appear. Unauthorized downloading
incoming e-mails) and anti- numbers etc.), E- Grabber
(capable of gaining access and distribution of
virus controls (for e-mail
attachments) are activated to all the e-mail addresses Respect copyright copyright-protected content
and continuously updated; stored on the victims PC), Whats great about the Web is the is a crime in most countries
use two e-mail addresses, or Info Grabber (capable of infinite possibilities of finding and and punishable by law. It
one which is strictly personal extracting information such accessing all kinds of materials is also possible for your
and for correspondence with as the various Registration through search engines and they involvement in illegal
only your real life contacts Keys of a PCs most can be downloaded either free downloading of copy-
(friends, relatives, and such), important programmes). of charge or paid for through righted material to be traced.
and another to be inserted in Without your knowledge your PC or mobile phone, and This has led, for example,
all those online registration these programmes can then used offline. Not everything to a childs parents being
forms that ask for personal send over the Internet found online can be used as you sent an enormous bill
data (user profiles, all the information these might wish; a lot of content is to cover the cost of the
competition announcements, programmes pick up to protected by copyright law or material downloaded and
online games, etc.) that unknown persons. entitlement rights. if the family refuse to pay
Guidelines for Children and Young People
68 www.itu.int/cop

Guidelines for Children and Young People


69

the bill other forms of legal could be harmed by viruses You may not always Do not share your entire
action can be taken. Some or other malware. It is end up downloading hard disk: check your
countries are considering therefore always best to what you intended to configurations to ensure
banning people from using install and continuously download: different that you have shared only
the Internet if they are update protection systems types of content may those folders you wanted
caught persistently using such as anti-virus, anti-dialer be concealed behind the to share and remember
it to obtain unauthorised software and a firewall. title of a song or video. that sharing files pro-
access to copyrighted Always make sure to read In the worst cases, for tected by copyright is a
material. In addition, when the guide relating to the example, it might con- crime.
using other peoples work, programme you are using to tain child abuse images.
like articles or dissertations, avoid making the errors that Examine your particular Online commerce
remember to quote the are listed below; programme guide to find You can purchase products online
sources appropriately. If Copyright protected material out how you can detect or by using a mobile phone.
you fail to do so it will be is generally indicated by fake files and only go to Purchases can be made by credit
classified as plagiarism and standard wording, such as sources you know are card or, in the case of mobile
that can cause you a great trustworthy: ask your phones, by debiting the credit on
all rights reserved or other
deal of trouble. friends to tell you which the mobile phone subscription.
similar phrasings; in cases
where this is not evident, it sources to use and which There are also online spaces
Remember is nonetheless best not to to avoid; devoted to exchanges and
You are free to use, modify take any risks; Before opening a down- purchases of all sorts of products,
and distribute freeware loaded file make sure to at very competitive prices.
The Peer to Peer (P2P) pro-
programmes that are not grammes you use to share scan it for viruses; anoth- One of the fundamental
copyright-protected; and download files also carry er quite frequent risk is difference between online and
Some software are, on the certain risks. One must have in fact that a downloaded traditional commerce lies with
other hand, shareware, and a very thorough understand- file might contain viruses the difficulty in identifying who is
therefore free for a specific ing of them to be able to use and spyware that can put at the other end of the exchange
trial period; them without running any PCs, personal data and and the risk of fraud that may lie
Your privacy and your PC security risks: privacy at risk; just around the corner. One of
Guidelines for Children and Young People
70 www.itu.int/cop

Guidelines for Children and Young People


71

the most widespread risks is that Some companies in a number of company, description of the hacks into the server of the
of phishing. This happens when countries are beginning to deploy contracts general conditions company where your credit
people respond to fake emails, age verification systems linked to and, in particular, how to card details have been stored.
spam, which usually appear to their purchasing procedures, but withdraw from the purchase; Clearly, by choosing other
come from a reputable source e.g. this is still a very new and limited also find out about the modes of payment you
a bank or credit card company. technology, however it is a grow- protection and management can avoid the possibility of
They will ask you to enter a lot ing, practice. Buying age restricted of personal data and payment someone stealing your credit
of personal information e.g. bank products online, and telling lies security; and compare prices, card number.
account details, passwords, date of about your age in order to do so looking for the same item on If you receive an unsolicited
birth and so on, which they will means you could be committing other sites; e-mail offering you an
then misuse. a criminal offence and so could Prepaid credit cards, or ones incredible deal, it is highly
the vendor. You could forfeit the that can be topped up, come likely that it is fraudulent;
An additional complication with goods and you could end up with a
online commerce concerns the with spending limits and If something looks too good
criminal record, so dont do it. to be true, it most probably
sale of products or services that can help avoid unpleasant
are age restricted in some way. There are, in any case, a series of surprises. is, and it would be best to
For example, in many countries tactics that can help you reduce the Before you buy anything forget about it.
it is illegal for vendors to sell or risks and enable you to make use online, make sure the In the case of purchases
provide alcohol or tobacco to legal of the convenient opportunities site uses a secure system made by mobile phones for
minors. Gambling is also generally offered by online commerce: for transactions so as to which a credit card is not re-
limited to people over a certain Take great care in choosing prevent, for example, quired, verify what the costs
age. Yet in the online environment the sites that you want to sniffing, which is a means of the services actually are,
it can be very hard for the vendor make purchases from and of capturing data during the services conditions of
to determine the age of the person ensure their credibility. transmission. Even though agreement and how one can
proposing to make the purchase or Gather as much information many sites incorporate back out.
acquire the service. All that many as you can about the site systems that counter the
companies do is ask the person to in question, such as name, interception of data in
check a box to confirm they meet address, telephone number transit, your details could
the minimum age requirement. and head office of the still be stolen if someone
Guidelines for Children and Young People
72 www.itu.int/cop

Guidelines for Children and Young People


73

4.
Conclusions
By keeping these basic rules in mind, you will be able to steer clear
of the majority of the pitfalls you can encounter online. Should you
encounter unpleasant or disturbing experiences, make sure you talk to a
trusted source. Remember, you have the right to be protected as well as
the responsibility to act appropriately, offline as well as online.

Guidelines for Children and Young People


74 www.itu.int/cop

Guidelines for Children and Young People


75

Sources for Further Reading & Inspiration


United Nations Convention of The Internet Big Picture - World The Children and Young Persons
the Rights of the Child Internet Users and Population Global Online Charter http://
http://www.unicef.org/crc/ Stats http://www.internetworld- www.iyac.net/children/index.htm
stats.com/stats.htm
WSIS Outcomes A number of Childnets resources
http://www.itu.int/wsis Child-friendly version of A World for young people
Fit for Children http://www.childnet-int.org/
WSIS+10 High Level Event http://www.unicef.org/ceecis/ young-people/
Outcome Documents child_friendly_ssoc_outcome.pdf
http://www.itu.int/net/wsis/ Internet safety information
implementation/2014/forum/ Opinion polls: What young (access to sites in different
inc/doc/outcome/362828V2E. people think languages)
pdf http://www.unicef.org/polls http://www.saferinternet.org/
ww/en/pub/insafe/index.htm
ITUs activities on cybersecurity Connect Safely is for parents, http://www.getnetwise.org/
http://www.itu.int/cybersecurity teens, educators, advocates
- everyone engaged in and
Child Online Protection (COP) interested in the impact of the
Initiative social Web
http://www.itu.int/cop http://www.connectsafely.org/
Imagine Your Future a Children and Adolescents
prediction of how the future will Statement at World Congress III
be http://www.elon.edu/e-web/ Against Sexual Exploitation
predictions/kidzone/yourfuture. http://www.unicef.org/brazil/pt/
xhtml#kids%27%20 predictions br_IIIWC_En.pdf

Guidelines for Children and Young People


76 www.itu.int/cop

Appendix 1

Parent Contract 5. I will try to provide close sup- I agree to the above.
port and supervision of my
I know that the Internet can be a younger childrens use of the
wonderful place for my kids to visit. Internet, for example by trying Parent signature(s)
I also know that I must do my part to keep their computer in a
to help keep them safe on their visits. family area.
Under- standing that my kids can help 6. I will report suspicious and
me, I agree to follow these rules: Date
illegal activity and sites to the
1. I will get to know the services proper authorities.
and websites my child uses. 7. I will make or find a list
2. I will set reasonable rules and I understand that my parents have
of recommended sites for
guidelines for computer use by agreed to live by these rules and I
children.
my children and I will discuss agree to help my parents explore
8. I will frequently check to see the Internet with me.
these rules and post them near where my kids have visited on
the computer as a reminder. the Internet. Child signature
3. I will not overreact if my child 9. I will seek options for filtering
tells me about something and blocking inappropriate
bad he or she finds or does Internet material from my Date
on the Internet. children.
4. I will try to get to know my 10. I will talk to my kids about
childs online friends and their online explorations and
Buddy List contacts just as I take online adventures with
try to get to know his or her them as often as I can.
other friends.

Guidelines for Children and Young People


77

Childs Contract 4. When considering signing up 8. I will use good manners when 12. I will tell my parents if I
to a new online service I will Im online, including good receive pictures, links to bad
I know that the Internet can be a won- avoid those which demand too language and respect. I will not sites, e-mail or instant messag-
derful place to visit. I also know that it is much personal information pick fights or use threatening es with bad language or if Im
important for me to follow rules that will and try to opt for those which or mean words. in a chat room where people
keep me safe on my visits. I agree to the ask for less. 9. I will make my own personal are using swear words or mean
following rules: 5. I will always take steps to find safety my priority, since I know and hateful language.
1. Wherever possible I will choose out what personal information there are some people who 13. I will not send anything in the
a safe and sensible screen name about me will be published might be online and pretend to post to anyone Ive met online,
for myself that will not broad- by the service by default in be someone theyre not. without my parents okay. If I
cast any personal information my profile and will always opt 10. I will be honest with my get something in the post from
about my family or me. for the maximum degree of parents about people I meet someone Ive met online, Ill
2. I will keep all of my passwords privacy. online and will tell them, tell my parents immediately
private. 6. I will not share my personal without always being asked, (because that means they have
3. I will discuss with my parents information, or that of my about these people. I wont my private information).
all of the different programmes parents or any other family answer any e-mails or instant 14. I will not do anything online
and applications I use on my member, in any way, shape or messages from anyone my that someone asks me to if it
computer and on the Internet, form, online or with someone parents have not approved. makes me feel uncomfortable,
and talk to them about the sites I meet online. This includes, 11. If I see or read things that are especially if I know its some-
I visit. Before I download or but is not limited to name, bad, icky or mean, I will log thing my parents would not be
load a new programme or join address, telephone number, off and tell my parents so they happy about or approve of.
a new site I will check with my age or school name. can try to make sure it never
parents first to make sure they 7. I will treat others the way I happens again.
approve. want to be treated.

Guidelines for Children and Young People


78 www.itu.int/cop

15. I will not call, write a snail mail I promise to protect my childs
or meet in person anyone who safety online by making sure
Ive met online without my these rules are followed. If my
parents approval or without a child encounters unsafe situations
trusted adult coming with me. and tells me, I will handle each
16. I understand my parents will situation with maturity and good
supervise my time online and sense, without blaming anyone,
may use software to monitor and will calmly work through it
or limit where I go online. with my child to ensure their safer
Theyre doing this because Internet experiences in the future.
they love me and want to
protect me.
Parent signature(s)
I will teach my parents more
about the Internet so we can have
fun together and learn cool new
things. Date

I agree to the above.

Child signature

Date

Guidelines for Children and Young People


Photo credits: www.shutterstock.com, Ahone Ayeh Njume-Ebong/ITU

Guidelines for Children and Young People


International Telecommunication Union
Place des Nations
CH-1211 Geneva 20
Switzerland
www.itu.int/cop

Printed in Switzerland
Geneva, 2016

With the support of:

You might also like