Professional Documents
Culture Documents
((( (((
for Children on
Child Online
((( (((
Protection
www.itu.int/cop
Legal notice
This document may be updated from time to time.
Third-party sources are quoted as appropriate. The International Telecommunication Union (ITU) is not responsible for the content of external
sources including external websites referenced in this publication.
Neither ITU nor any person acting on its behalf is responsible for the use that might be made of the information contained in this publication.
Disclaimer
Mention of and references to specific countries, companies, products, initiatives or guidelines do not in any way imply that they are endorsed or
recommended by ITU, the authors, or any other organization that the authors are affiliated with, in preference to others of a similar nature that
are not mentioned.
Requests to reproduce extracts of this publication may be submitted to: jur@itu.int
International Telecommunication Union (ITU), Second Edition, 2016
ACKNOWLEDGEMENTS
These Guidelines have been prepared by the International Telecommunication Union (ITU) and a team of contributing authors from leading institutions active
in the information and communications technologies (ICT) sector and in child online safety issues. These Guidelines would not have been possible without the
time, enthusiasm and dedication of its contributing authors.
ITU is grateful to all of the following authors, who have contributed their valuable time and insights: (listed in alphabetical order of organisation)
John Carr (Childrens Charities Coalition on Internet Safety)
Michael Moran (Interpol)
Janice Richardson (Insafe)
Cristina Bueti (ITU)
Dieter Carstensen, Cristiana de Paoli and Mari Laiho (Save the Children)
Maria Jos Cantarino de Fras (Telefonica)
The authors wish to thank Kristin Kvigne (Interpol) for her detailed review and comments. ITU wishes to acknowledge Salma Abbasi from eWWG for her
valuable involvement in the Child Online Protection (COP) Initiative.
The second edition of this publication has been updated by Neha Karkara.
Additional information and materials relating to these Draft Guidelines can be found at: http://www.itu.int/cop/ and will be updated on a regular basis.
If you have any comments, or if you would like to provide any additional information, please contact cop@itu.int
Table of Contents
Foreword
Getting started 1
1. Background 5
2. Children and young peoples use of technology 11
3. What you need to know to stay safe online 29
SMART rules for children and young people 33
Guidelines for the age group 5-7 year old 47
Guidelines for the age group 8-12 year old 49
Guidelines for the age group 13 years and above 55
4. Conclusions 73
Sources for further reading & inspiration 75
Appendix 1 76
Parent Contract 76
Childs Contract 77
Mr Houlin Zhao
Secretary-General of the International Telecommunication Union (ITU)
Getting started
What are these Guide- How should these Guide- useful, it should never be forgot- Why are these Guidelines
ten that, in the end, each child
lines about? lines be used? is different. Each childs specific
important?
This manual contains Guidelines These Guidelines have been needs should be given individual The information society in which
for children and young people in prepared in the context of the consideration. Moreover there todays children and young people
all parts of the world on how to Child Online Protection (COP)1 are many different local legal and are growing up, offers an instant
keep themselves and others safe Initiative in order to establish cultural factors which could have digital world through the click
online. However, a young internet the foundations for a safe and an important bearing on how of a mouse. An unprecedented
user of seven years of age is very secure cyberworld not only for these Guidelines might be used or level of services and information
unlikely to have the same needs or todays children but also for future interpreted in any given country is accessible through a computer
interests as a 12 year old just start- generations. These Guidelines are or region. or a mobile device with Internet
ing at High School or a 17 year meant to act as a blueprint, which access. The barriers associated
Moreover certain subjects con-
old on the brink of adulthood. At can be adapted and used in a way with the cost of these devices and
tained in this manual can be
different points in the Guidelines, that is consistent with national or access to the Internet are dimin-
sensitive such as online sexual ex-
the advice or recommendations local customs and laws. ishing rapidly. All these technical
ploitation and abuse of children.
fits these different contexts. developments provide children
While older children will be able Working with younger children on
and young people with unparal-
to grasp the ideas in the manual this issue should be approached
leled opportunities to explore
directly, younger children will carefully. It is important that the
new frontiers and meet people
need support to understand the explanations and the messages
from faraway places. Children and
context fully. Parents, teach- you give to children about such
young people are truly becoming
ers, caregivers and other adults issues are appropriate to their
digital citizens in an online world
supporting children to use these age and development. Encourage
that has no borders or frontiers.
guidelines should remember that children to ask questions and state
1 www.itu.int/cop while broad guidelines can be their opinions.
More often than not, this is a can at a technical level to make on the Information Society Through these Guidelines, the
positive and educational experi- the Internet as safe as it can be (WSIS) (2003-2005)3, WSIS+10 COP Initiative calls upon all
ence: one that assists for children and young people, High Level Event Outcome stakeholders, including children
the first and best form of defence Documents (2014)4 and the and young people, to promote
younger generations in better outcomes of the United Nations the adoption of policies and
in protecting YOU is making
understanding both the General Assembly Overall strategies that will protect children
you aware of what can happen
differences and commonalities Review of the Implementation in cyberspace and provide safer
online and make you understand
of the people of the world. of the WSIS Outcomes (2015)5 access to all the extraordinary
that there is always a solution to a
However, children and young recognize the needs of children opportunities and resources that
problem that you may encounter
people also need to be aware of and young people to be protected are available online. It is hoped
some of the potentially negative online. Empowering children and
young people through education in cyberspace. The Sustainable that this will not only lead to
aspects of the technologies. Development Goals (SDGs)6 the building of a more inclusive
and awareness raising is therefore
Harmful activities can include of paramount importance. adopted by the United Nations in information society, but also
bullying and harassment, identity 2015 further obligates countries enable countries to meet their
theft and online abuse (such Moreover there is now a substan- to work towards ending all obligations towards protecting
as children seeing harmful and tial body of international com- forms of abuse, exploitation and realizing the rights of
illegal content, or being exposed mitments, law and international and violence affecting children children as stated in the CRC, the
to grooming for sexual purposes, instruments which underpin and and young people by 2030. This WSIS Outcomes Document and
or the production, distribution in many cases mandate action to includes any kind of abuse and now in the SDGs.
and collection of child abuse protect children both generally, exploitation faced by children and
material). and also specifically in relation to young people online.
the Internet. Those commitments,
These are all threats to children laws and instruments form the
and young peoples well being basis of these Guidelines.
and a challenge that must be 2 http://www.unicef.org/crc/
1.
Background
Online technologies present many and young people from any
possibilities to communicate, kind of harm online. While
learn new skills, be creative and these international instruments
contribute to establishing a better recognise that governments are
society for all, but often they foremost responsible to take
also bring new risks e.g. they can action to keep children and
expose children and young people young people safe in relation to
to potential dangers like illegal the Internet, they also recognise
content, viruses, harassment (e.g. the important role children and
in chat rooms), the misuse of young people can play in keeping
personal data or grooming for themselves and other children
sexual purposes. There is no silver safe online.
bullet solution to protect children
and young people online. This is a The CRC, approved by the United
global issue that requires a global Nations in 1989, is the most
response from all segments of important and significant legal
society, including children and tool in the defence and promotion
young people themselves. of children and young peoples
rights. The CRC recognises the
Recognising the grave dangers human rights of all children in
that may face children and all parts of the world, including
young people in cyberspace, the childrens right to be protected
international community has from any kind of violence and
made a number of agreements harm, including in cyberspace. It
and laws that protect children also recognises childrens right to
7 For more details see, WSIS+10 High Level Event Outcome Documents available at http://www.itu.int/net/wsis/implementation/2014/forum/inc/doc/
outcome/362828V2E.pdf
8 http://www.ecpat.net/sites/default/files/ECPATWCIIIReport_FINAL.pdf
The World Congress III against Sexual Exploitation of Children and Adolescents took place in Rio de Janeiro, Brazil, from 25 to 28 November 2008.
There were 3,500 participants including 300 adolescents 150 of which were from foreign countries.
It concluded with an outcome document called the Rio de Janeiro Declaration to Prevent and Stop Sexual Exploitation of Children and
Adolescents, which contains the Adolescent Declaration to End Sexual Exploitation. Here are some of the key messages from children and young
people to the world:
We the children of the world on children. Consequently, we the millions of children throughout the threats of the internet in addition to
commend the Government of Brazil children, ask that action committees world. providing supplemental information
and the other governments and be created to audit the action plans in about sexual exploitation of children.
responsible agencies for giving us each country. 10. We the children must make
the children, the present and future known our plight for governments to 12. Further, we provide a mandate
of the world, a voice at this World 8. We also call for the adoption of an pursue strict and punitive legislation for the media to gather documents,
Congress III International Day where children will with regards to the Internet, reports, folders, CDs, videos and
lead the effort in awareness raising especially child pornography- simply other materials to increase knowledge
9 Source: http://www.iyac.net/iyac_charter.pdf The full Adolescent Declaration to End Sexual Exploitation can be found at: http://www.unicef.org/brazil/pt/br_IIIWC_En.pdf
aware of the opportunities
10 http://content.usatoday.com/communities/technologylive/post/2011/03/study-80-percent-of-children-
under-5-use-internet-weekly/1#.VkDrLOvNz8E (Accessed 9 November 2015)
One of the most used resources part of many children and young likely to engage in activities on a and young people in Europe also
online is Wikipedia26. Wikipedia peoples online lives. When social networking site every day. have a profile on a media-sharing
is a multilingual, Web-based, home from school, the ability to Overall, about 70% of children platform such as YouTube, Insta-
free-content encyclopedia project, continue your discussions with and young people have at least gram or Flickr.29
where you can read, edit and write your friends online whilst doing one profile on a social networking
articles on any subject or issue your homework, sending SMSs site in Europe27. On the same An example of young people
you find relevant. Fact finding and listening to music (frequently lines, about 80% of Internet creatively using media sharing
exercises can easily lead you from at the same time!) is a picture users between the ages of 9 and platforms could be that of
one page on to the next and so many will recognize. Social 17 years have social networking a young band that creates a
on. The search for new informa- networks can often represent profiles in Brazil, reveals the ICT new song, posts the video on
tion is never boring and with the a one-stop gateway to games, Kids Online Brazil 2013 survey.28 YouTube30, and informs their
increased localisation of con- friends, news, music, and ways Among these studies, Facebook friends and fans about it. The
tent, the language barriers slowly of self-expression. In other emerges as the most commonly fans can then see this song by
diminish. words, you can be creative, funny, used social networking site among streaming it online on their
reflective and entertained by using children and young people. mobile phone, tablet or PC. If
Social networks: The birth of ICTs. they like the song, they will spread
online social networks has been In the UK one in four children the word by telling their friends,
a remarkable success. The variety Social networking tends to top use Twitter the most to socially who will then tell their friends and
of social networks caters to all the activities taken up by children network in the online world. so on. With simple techniques
ages, cultures and languages. on a daily basis, and children Sharing photos, videos and other and little financial investment, this
Having a profile on a social who also use a smartphone and content are other most popular band can now gain a greater fan
network has become an important a tablet to go online are more online activities. Most children base and potentially be heard by
26 http://en.wikipedia.org/wiki/Main_Page
27 Mascheroni, G. and Olafsson, K. Net Children Go Mobile: risks and opportunities. Second Edition 2014. Milano: Educatt. Available at: http://eprints.lse.ac.uk/56986/1/__lse.ac.uk_storage_LIBRARY_Secondary_libfile_
shared_repository_Content_Net%20Children%20Go%20Mobile%20Project_Reports_Net%20children%20go%20mobile%20risks%20and%20opportunities%20%282nd%20ed.%29.pdf (Accessed 3 November 2015)
28 ICT Kids Online Brazil 2014, Available at http://cetic.br/media/docs/publicacoes/2/tic-kids-online-2013.pdf (Accessed 10 November 2015)
29 Mascheroni, G. and Olafsson, K. Net Children Go Mobile: risks and opportunities. Second Edition 2014. Milano: Educatt. Available at: http://eprints.lse.ac.uk/56986/1/__lse.ac.uk_storage_LIBRARY_Secondary_libfile_
shared_repository_Content_Net%20Children%20Go%20Mobile%20Project_Reports_Net%20children%20go%20mobile%20risks%20and%20opportunities%20%282nd%20ed.%29.pdf (Accessed 3 November 2015)
30 https://www.youtube.com
Learn to use your 6. Learn to check who you are Your online rights
connected to learn to use
machine safely: tools like Netstat Finally, a
You have the right to make
use of technologies to devel-
1. Make sure you have installed great way to make sure that op your personality and help
and learned how to use a fire- your parents agree with your increase your capabilities;
wall and anti-virus software. online life is to set up a written
agreement with them. The You have the right to protect
Remember to keep them up your identity;
to date! purpose is to reassure them
that you are aware of the risks You have the right to
2. Learn about your computers participate, have fun
associated with being online,
operating system (like and access information
knowing how to behave and
Windows, Linux, etc.) and appropriate to your age and
what to do, as well involving
especially about how to patch personality;
your parents making them
it and keep it up to date.
understand what you actually You have the right to
3. If parental controls are do when you are online. express yourself freely, and
installed then talk with your The agreement needs to be be treated with respect while
parents and agree on the level based on a mutual agreement always respecting others;
that matches your age and between you and your parents.
needs. Dont try to crack them. You have the right to be
There is an example of such critical and discuss anything
4. If you receive a file you are a contract at the end of these you read or come across
unsure of or dont know who guidelines (Appendix 1). You when online;
has sent it, do NOT open it. will be able to find different
This is the way Trojans and You have the right to say
versions of a Family Internet
viruses infect your machine. NO if someone makes you
Safety Contract online.
feel uncomfortable with his/
5. Get a feeling for your machine her requests when online.
and how it works so that you
can act if you spot something
unusual.
Guidelines for the age 1. Be careful who you trust 5. Always keep your password or embarrassed. Its important
online. A person can pretend secret. Dont even share it with to be kind and polite to others
group 8-12 year old your friends. online stop and think about
to be someone they are not.
There are lots of different things 2. Choose your friends. While its 6. If you want to arrange to how your behaviour will affect
you can do online. While most good to have a lot of friends, meet someone youve met them.
of the time its all great fun, having too many, makes it online, check with a parent
sometimes things dont go as well harder to keep an eye on who first and ask them to go with Tips
as you hoped and you may not sees the stuff you post online. you. Always meet in a brightly Treat other people the way
immediately know why or what to Dont accept friend requests lit public place where lots of you would like to be treated.
do about it. This section has some if you really dont know the other people will be around, Avoid using bad language
really helpful tips to help you be person and youre not sure preferably during the day. and dont say things to
safe online. about them. 7. If someone writes something someone to make them feel
3. Keep your personal details rude, scary or something you bad.
Chatting to friends using IM,
in chat rooms and on social private. Use a nickname dont like, tell your parents or Learn about the netiquette
networking sites can be great ways instead of your real name if another adult you trust. of being online. Whats con-
to keep up to date. Meeting new you are in a site or game where sidered okay to do and say
friends online is also fun. You there may be lots of people Netiquette and what isnt? For example,
can meet people online who like you dont know. Ask your By netiquette we mean how you if you type a message to
the same movies or sports as you. parents before giving anyone should or should not behave with someone in UPPER CASE
But while there are lots of good on the Internet your name, other people online. Sometimes they may think you are
points about keeping in touch address, phone number or any its easy to forget that the other shouting at them.
with online friends, there are also other personal details. person you are chatting to on IM, If someone says something
some risks with meeting people 4. Set your profile to private. playing a game with, or posting to rude or something that
onlineespecially if you dont Ask your parents to help you their profile is a real person. Its makes you feel uncomfort-
know them in real life. do this if youre not sure. Its easier to say and do things online able, dont respond. Leave
really important. that you might not do in real the chat room or forum
To help stay safe while you chat, life. This may hurt that persons straight away.
remember some simple tips: feelings or make them feel unsafe
Guidelines for Children and Young People
50 www.itu.int/cop
Tell your parents or another Limit your game play time so ing unsafe and alone. No-one has your ISP and/or phone
adult you trust if you read up- you can still do other things the right to bully another person. provider or the website
setting language, or see nasty like homework, jobs around At its most serious, bullying is administratorthere are
pictures or something scary. the house and hanging out illegal and can be investigated by actions they can take to
with your friends. the police. help.
Playing online games Keep personal details the policeif there is a
Playing games online and using private. Tips threat to your safety the
consoles or games on a computer Remember to make time Ignore it. Dont respond to police will help.
can be great fun, but you need to offline for your friends, your the bully. If they dont get a
be careful about how much you favourite sports and other response they may get bored If a friend is being bullied
play and whom you play with. It activities. and go away. online
is important that if you chat with Block the person. This will It can be hard to know if your
other gamers you protect your Bullying stop you seeing messages friends are being bullied. They
privacy and dont share personal or texts from a particular
The same rules apply online as might keep it to themselves. If
or private information. If you are person.
in the real world about how to they are being bullied, you might
unsure whether a game is suitable,
treat other people. Unfortunately, Tell someone. Tell your notice that they may not chat
ask your parents or a trusted adult
people dont always treat each mum or dad, or another with you online as much, or they
to check its classification and
other well online, and you, or a adult you trust. Keep the suddenly receive lots of SMS
reviews for you.
friend, may find that you are the evidence. This can be useful messages or are unhappy after
target of bullying. You might be in tracking the bully down. they have been on the computer
Tips teased or have rumours spread Save texts, emails, online or checked their phone messages.
If another player is behaving about you online, receive nasty conversations or voice- mails They may stop hanging around
badly or making you uncom- messages or even threats. It can as proof. with friends or have lost interest
fortable, block them from happen in school, or out of it, any Report it to: in school or social activities.
your players list. You may hour of the day, from people you
your schoolthey should
also be able to report them know, and sometimes people you
have policies in place
to the game site operator. dont know. It can leave you feel-
about bullying.
Your digital footprint 2. Dont share your username or Offensive or illegal 4. Check with your parents that
password with anyone. your search engine is set to
Its great to share things online content block material that is meant
with your friends. Part of the 3. Think before you hit send or
When you are surfing the web for adults.
fun of sharing videos, images post. Once posted, it can be
you may come across websites,
and other content, is that lots of content difficult to remove 5. Ask your parents to install
photos, text or other material that
people can view and respond. content. internet filter software to block
makes you feel uncomfortable or
Remember that others whom you 4. Dont post anything you dont bad sites.
upset. There are some easy ways
dont know may also view what want others to know or find to handle these situations. 6. Ask your parents to help you
you share with your friends. They out about you - or that you find safe and fun sites to use
may also be able to look at it for wouldnt say to them face to and bookmark for later.
Tips
years to come. Everything you face.
post adds up to your digital foot- 1. Tell your parents or another
5. Remember that private images
print and, once its online, it could trusted adult if you come
and videos you send to friends
be there forever. So think before across material that upsets you.
or pose of a social networking
you post. sire may be passed on to other 2. Know how to escape from a
and uploaded to public areas. website if an Internet search
Tips takes you to an unpleasant or
6. Be respectful of other peoples
nasty website. Hit control-alt-
1. Keep your personal details content that you post or share.
delete if the site will not allow
private. Use an appropriate For example, a photo that your
you to exit.
nickname instead of your real friend took is their property,
name. Ask your parents before not yours. You should post it 3. If a website looks suspicious
giving anyone on the Internet online only if you have their or has a warning page for
your name, address, phone permission and make a note people under 18 years, leave
number or any other personal about where you got it from. immediately. Some sites are
details. not meant for kids.
Guidelines for the age Harmful and illegal many channels involved in social
networking.
group 13 years and above content
Curiosity, interests, and a desire
Huge number of young people in Therefore
to learn new things and explore
this age group use social network 1. Before starting a search you
new facets of knowledge: the
sites, online games and Instant should have a clear idea of
Internet is a great tool to satisfy
Messenger applications. Going what you are looking for;
such needs. But the Internet is an
online is not just something they
open world in which everyone is 2. In order to narrow things
do occasionally or for fun. For
free to circulate news or almost down you can use advanced
many it is an integral part of their
anything else. It contains an search functions or directories,
daily lives. Its how they stay in
infinite amount of information, that is, the thematic catego-
touch with and communicate with
so vast in scope that it is easy to ries that most search engines
their friends, how they organize
get lost or run into untruths and provide (i.e., for sports, health,
large parts of their social lives and
material not appropriate to your cinema, etc.);
school work. Here you will find
needs or age. We are referring to 3. Put your critical sense to work
information on how to be safe
sites that, for example, promote and try to determine whether
using these online platforms as
racial hatred or incite violence, the site is trustworthy: When
well as insight into what you can
sites that could lead you to you access the site do other
do to help create a safe and posi-
come across pornographic or pages begin to automatically
tive online space for you and your
child abuse material and sites open? Are you able to find
friends.
that can lead you to self-harm. out who owns the site? Is it
This can occur in a purely easy to contact the owner?
accidental way, as in the case of Can you tell who wrote the
searches on completely different page or particular article you
subjects, through e-mailing, P2P are viewing? (You can always
programmes, forums, chat rooms do another search to find out
and, more generally, through the more about the author and/
or owner). Make sure you have happened and any feelings Sexual predators use the Internet Many children and young people
written the website address you may still have about the to contact children and young who get drawn into these kinds
correctly; there are some sites occurrence/experience; people for sexual purposes, often of predatory relationships will
that use a name similar to 5. Contents (images, videos, using a technique known as lack a certain level of emotional
another to take advantage of etc.) that are found on the grooming. This involves gaining maturity or have low self-esteem
possible incorrect typing. Is web relating to sex can often the childs or young persons that can make them susceptible
the sites text spelt correctly or be of a pornographic nature confidence by appealing to his or to this kind of manipulation
are there grammatical errors? and convey sexual material in her interests. These predators are and intimidation. They may
Are there dates included that a typically adult manner with highly manipulative people. They also be hesitant to tell adults
can indicate whether the site sentiments that are not appro- often introduce sexual topics, about their encounters for fear
has been updated? Are there priate to your age group. photos and explicit language to of embarrassment or of losing
any legal notes (regarding, for raise sexual awareness and get access to the Internet. In some
example, privacy)? What is grooming? their intended victims to drop cases they are threatened by
4. If, while surfing online, you their guard. Gifts, money and predators and told to keep the
come across sites containing The Internet and mobile phones even tickets for transportation are relationship or what happened a
violent, self-harm, racist, can potentially be used by abusive sometimes used to persuade and secret.
illegal or child abuse materials adults to make contact with boys lure the child to a place where
For this reason:
dont forget that these sites and girls. This happens particu- the predator can sexually exploit
larly through SMS and MMS mes- him or her. These encounters It is essential that you be
can be reported to the police
saging, chat rooms, Instant Mes- may even be photographed or aware of this risk, and that
or a hotline. Try to find out
saging programmes, newsgroups, video- taped, or if a meeting does not everyone online is who
to whom you can send these
forums, online games, and, more not take place in the real world he/she claims to be. Online
reports in your country; your
generally, through all the social the predator might persuade the seducers can often pretend
parents or another adult you
networking spaces, where it is child to make sexual images of to be your age in order to
trust can also help you in filing
possible to obtain information on themselves or their friends or take create an atmosphere of fa-
a report. You should also
users ages, sex and more, through part in sexual activity using a web miliarity and trust that could
talk to someone about what
the profiles theyve compiled. cam to broadcast it. lead to an offline meeting
and possible abuse;
Protecting your personal to be cautious about these things with people Sexting
data is important; in the real inserting identifiable or who you already know and Sexting is the sending and receiving
world, you would never give traceable data (name and trust in real life. of text, photo or video messages
out such details and youd surname, address, the name If attempts at allurement or of children and young people that
never tell people you dont of your school, mobile awkward situations should are inappropriate and sexually
know about your private phone numbers, e-mail occur, it is important to explicit. These images are mostly
matters. Even if a nice address, etc.). Such details find someone to speak to, self generated and shared through
virtual friendship has been can become accessible to an adult or friend; Internet mobile phone MMS, Skype and so-
formed, that might seem anyone, and it is therefore service providers will also cial networking sites where images
like it could lead to some- advisable to create an often allow users to report can be posted and shared (such as
thing more, it is important identity for yourself, using incidents by clicking on Facebook, Twitter, Tumblr, Flickr,
to remember that you dont nicknames or aliases and report or notify, in YouTube, Instagram, Snapchat
always know who is really at fictional images or avatars, order to report the abuse. etc.)50 According to a recent survey,
the other end of the com- and not provide any detailed Alternatively, you can turn about 20 percent of teen boys and
puter; personal information; directly to the police. girls have sent such messages.51
In order to enter a chat When you are curious about Young people may also call it
room, forum, or more your sexuality or your more It is also advisable to save cybersex or sending a nudie, picture
generally, a social network, intimate feelings, remember e-mails and chat room text, or selfie.52 Most young people do
you often have to compile that the Internet can some- SMS or MMS messages not see sexting as a problem.
a personal profile, inserting times be a source of really (using messages inbox, Many consider it as flirting and are
information that can be good advice and information for example), as they can be reluctant to talk to adults about it
detailed to varying degrees. but very often it is better to provided as evidence to the because they are afraid of being
In such cases, it is essential try to find a way to discuss police. judged or having their phones and
gadgets taken away.
Sexting may be considered harm- by others. These images may just for a bit. It is wrong for could get into trouble with
less but there are several risks. never be completely removed and anyone to be pressuring you the police.
Taking, sharing or receiving an could be found in the future, for in this way. If your picture is posted
image, even voluntarily, can have example when applying for jobs If an adult has been making online then un-tag yourself
a long-lasting negative impact. or university.53 A study finds that you feel uncomfortable by and report it to the website
Young people can become vul- about 90% of self-generated sex- asking you to send them im- where it is posted so it can
nerable to blackmail, bullying, ually explicit photos and videos ages, you can report them. If be removed.
unwanted attention and emotional by young people are taken from an adult does this it is called
distress. Moreover sexting is ille- its original upload source and put online grooming. (You can Its important to know that mak-
gal. By sending an explicit image, somewhere else.54 read more about grooming ing a report doesnt mean the
a young person is producing and in the section above.) If you content will definitely be re-
It is important to be aware that moved. Most websites have a set
distributing child abuse images are under 18, they are break-
sexting is not a harmless activity of rules - Terms of Use - which
and risks being prosecuted, even ing the law.
and can have serious consequenc-
if the picture is taken and shared they expect people using their site
es. Here are some ways to take If you have sent a picture or
with their permission. Its easy to to obey. Websites will only take
action and stay in control55: video you regret to a friend,
send a photo or message but the content down if they break these
If someone is pressuriz- someone you met online or rules. If you want to have some-
sender has no control about how
ing you to send a sexually your girlfriend/boyfriend thing taken down from a site you
its passed on.
explicit picture of you, ask ask them to delete it imme- should check
When images are stored or shared them to stop. Just dont reply diately. If you have received
online they become public. They at all and hopefully theyll a sexually explicit photo, you to see if it breaks one of their
can be deleted on social media get the hint. But if theyre should delete it immediately rules. Facebook calls their rules
or may only last a few seconds still bothering you or mak- too. Remember if you send Community Standards, You-
on apps like Snapchat, but im- ing you feel upset its okay it on, you are distribut- Tubes rules are called Commu-
ages can still be saved or copied to block them - even if its ing pornography - and you nity Guidelines and other sites
like Tumblr, Twitter and Instagram possible to keep in touch with old everyday language bullying often necessarily involving any physical
have their own sets of rules and friends or make new ones in real describes a form of harassment contact can have just as painful
ways to report. Before using any time and in all parts of the world perpetrated by an abuser who pos- consequences as that of tradi-
website you should read them to and to exchange ideas, play games, sesses more physical and/or social tional forms of bullying. In United
learn what is, and what isnt, ac- carry out research, etc. Although power and dominance than the States, about 24% of teens report-
ceptable on the site. You should most of these services and the victim. The victim of bullying is ed being bullied online in 201457.
also learn how to report content to ways they are used are positive, in sometimes referred to as a target. In Europe, 15% of children and
the site.56 some cases these same tools can The harassment can be verbal, young people reported online bul-
be used to offend, deride, defame physical and/or emotional. (www. lying in 201558. Other studies in
If you have been affected by sex-
and annoy Internet users; and wikipedia.org) Europe show that cyberbullying is
ting it is important to tell some-
furthermore, violent or offensive on the rise. Among 13-14 year-
one. Talk your parent, teacher or Very often bullying takes place in
off-line behaviour becomes magni- olds, the rate of cyberbullying has
another adult that you trust so they schools or local neighbourhoods.
fied when filmed with mobile increased from 8% to 15% in four
might be able to get you the sup- Unfortunately, there are increasing
port that you really need. Sharing phones and exchanged or posted years (2010-2014)59.
on the Net. numbers of bullies and real forms
with a trusted friend may help too. of bullying online, ranging from For this reason it is important that
What is bullying? Bullying is the offensive websites to harassing text you know that this phenomenon
Bullying act of intentionally causing harm messages, and sending unwanted exists and that you are aware of
Through services such as e-mail, to another person through verbal photos via mobile phones and the different forms it can take and
forums, chat rooms, blogs, Instant harassment, physical assault or so on. This particular form of what can be done to avoid becom-
Messaging programmes, SMS and other more subtle methods of bullying which can possibly of- ing a victim:
MMS, and video cameras, it is coercion such as manipulation. In fend and hurt someone without
Do not circulate your per- attempting to provoke you it to send the message. with; there are quite a number
sonal data thoughtlessly, as such as: The online bully could of different IM systems, such
this could make you easily Many games allow for also hack into someone as Windows Live Messenger,
identifiable and more prone the exclusion of undesir- elses account and use ICQ, AOL Messenger, Yahoo
to acts of bullying and able (or unwanted users); it for his/her offensive Messenger! Bullies know which
intimidation by others your behaviour and therefore are the most popular among
When chat rooms are youngsters and make use of them
own age; letting the blame fall on
monitored, it is possible for their own purposes such as
Once information is posted the unfortunate person
to save the offending text flaming, or provoking an online
online it is out of your con- whose e-mail account
from the chat and report fight. Conversations or fights that
trol and available to anyone was wrongfully used;
it to the monitor; break out online can, at times,
and open to any sort of use. Most e-mail programmes
Abuses can be reported have after-effects that drag on at
You need to be completely offer filters to block un-
to service providers or, in school or other places offline.
clear on this concept; what wanted incoming e-mails.
may seem like an innocent the case of abuse via mo-
Many instant messaging In all cases remember that it
joke could wind up having bile phones, the report
programmes offer the is important to tell someone
very irritating and hurtful can be sent to the mobile
possibility of creating a list about what is happening if you
consequences for others; phone company;
of names that users can ever feel at all uncomfortable or
It is important to refrain In the more serious cases, threatened.
choose to block. In this way,
from reacting to provoca- such as cases involv-
you can prevent unwanted Tell your parents, a teacher
tions received via SMS, ing physical threats, it is
people from making contact or someone within the school
MMS, and instant messages, advis- able that the police
with you. staff you feel you can trust.
in offensive or defamatory also be informed;
Even telling your friends could
e-mails, in chat rooms or It is possible to trace An Instant Messaging (IM) system
be helpful.
during online encounters the e-mail account from lets you know when one of your
with other users. Instead which the offensive known and approved contacts You can also report to the service
you need to employ certain message was sent, but is online and, at that point, you provider or mobile operator,
strategies that can exclude practically impossible to can begin a chat session with even to the police if it is serious.
or limit the actions of those prove who actually used the person you feel like talking Remember to save the evidence
Guidelines for Children and Young People
64 www.itu.int/cop
of the bullying, as this will be personal profile that includes more Whenever you need to to send you any advertising
really important when you tell or less detailed types of informa- divulge your personal data material, or if they propose
someone. tion. Different sites have different make sure that whoever to pass on your details to
rules. Before you enter any infor- is requesting information any other companies. If you
Bullying is not acceptable either mation about yourself into a sites about you is authentic and dont want them to do either
in an online or an offline environ- database or membership records, serious and also remem- or both of those things, tick
ment. In many countries there check how the information might ber that before giving data the relevant boxes. If they
are national or local organizations
be used, whether or not some or regarding your friends you dont offer you an option
that you can turn to for help. In
all of it will be published, and if so need to first inform them you really should think about
some countries, such as Canada,
where. If you feel uncomfortable and have their permission not using the service at all.
cyber-bullying is considered
with the amount of information because they may not be Send personal photos and
an actual criminal act. In most
being asked of you, if you do not happy about having their videos only to those you
countries it is a criminal offence to
really know or trust the site, dont e-mail addresses or other actually know, your image
threaten someone or to harass or
provide it. Look for another or information about them constitutes personal data and
stalk them, whether in real life or
similar service which asks for less passed on to others; you need to make sure it is
online.
information or promises to treat not circulated thoughtlessly.
You may not be obliged to
An interesting fact: the term bully your information more carefully. The same goes for images
provide all of the informa-
originally had a very different tion requested of you and of others. Keep in mind that
Wherever possible it is advisable
meaning from the one it has today you should insert only the it is practically impossible to
to create an identity (or alias) by
- in fact, 500 years ago it meant determine where an online
using an invented nickname and types of data that are strictly
friend or family member image can end up; before
not add anything else. Above all it required. In any event, it is
how things have changed! filming or photographing
is important for you to have a clear always best to find out as
Defend your privacy: Nowadays, understanding of what may be and much as possible about the someone you should always
setting up a blog or a personal what is best not to share with oth- person, service or company ask for their permission.
website, is relatively simple. In ers. What goes online can quickly you are dealing with before When you need to register
order to join a chat room, forum go beyond your control and be at providing your data. In par- for a particular service, try
or more generally, a social net- anyones disposal for any possible ticular check to see if the site to employ a few simple
work, you must first put together a use: asking for the data proposes devices: for example, use
Guidelines for Children and Young People
66 www.itu.int/cop
a password that would be you already know could be Only engage in activities that Peer to Peer (P2P) software
hard to figure out so that accessed by strangers. you feel you are absolutely enables one to share
no one else can guess it Do not open email sure about. If you smell and exchange ones files
and get into your account; attachments from sources something fishy, something directly with other Internet
use a complex e-mail you do not know or thats not quite right, that users, without any extra
address, possibly with both programmes you do not doesnt totally convince connection costs. Music,
numbers and letters (e.g. know the possible effects of, you, or you think is being films, videos, and games are
mrx- 3wec97@... . com) so they could be a Key Logger unjustly charged for, then among the materials that
it be- comes more difficult your best move is to leave are most sought after and
(capable of recording all
to guess by spammers it alone. You have the right downloaded by youngsters,
the keys being punched
or unknown people who to criticise and question but they are often covered
on the keyboard, enabling
might want to send you what you come across while by copyright provisions
them to find out passwords,
unwanted mail; make sure online. Remember things are and protected by law.
numeric codes, credit card
your anti-spam service (for not always as they appear. Unauthorized downloading
incoming e-mails) and anti- numbers etc.), E- Grabber
(capable of gaining access and distribution of
virus controls (for e-mail
attachments) are activated to all the e-mail addresses Respect copyright copyright-protected content
and continuously updated; stored on the victims PC), Whats great about the Web is the is a crime in most countries
use two e-mail addresses, or Info Grabber (capable of infinite possibilities of finding and and punishable by law. It
one which is strictly personal extracting information such accessing all kinds of materials is also possible for your
and for correspondence with as the various Registration through search engines and they involvement in illegal
only your real life contacts Keys of a PCs most can be downloaded either free downloading of copy-
(friends, relatives, and such), important programmes). of charge or paid for through righted material to be traced.
and another to be inserted in Without your knowledge your PC or mobile phone, and This has led, for example,
all those online registration these programmes can then used offline. Not everything to a childs parents being
forms that ask for personal send over the Internet found online can be used as you sent an enormous bill
data (user profiles, all the information these might wish; a lot of content is to cover the cost of the
competition announcements, programmes pick up to protected by copyright law or material downloaded and
online games, etc.) that unknown persons. entitlement rights. if the family refuse to pay
Guidelines for Children and Young People
68 www.itu.int/cop
the bill other forms of legal could be harmed by viruses You may not always Do not share your entire
action can be taken. Some or other malware. It is end up downloading hard disk: check your
countries are considering therefore always best to what you intended to configurations to ensure
banning people from using install and continuously download: different that you have shared only
the Internet if they are update protection systems types of content may those folders you wanted
caught persistently using such as anti-virus, anti-dialer be concealed behind the to share and remember
it to obtain unauthorised software and a firewall. title of a song or video. that sharing files pro-
access to copyrighted Always make sure to read In the worst cases, for tected by copyright is a
material. In addition, when the guide relating to the example, it might con- crime.
using other peoples work, programme you are using to tain child abuse images.
like articles or dissertations, avoid making the errors that Examine your particular Online commerce
remember to quote the are listed below; programme guide to find You can purchase products online
sources appropriately. If Copyright protected material out how you can detect or by using a mobile phone.
you fail to do so it will be is generally indicated by fake files and only go to Purchases can be made by credit
classified as plagiarism and standard wording, such as sources you know are card or, in the case of mobile
that can cause you a great trustworthy: ask your phones, by debiting the credit on
all rights reserved or other
deal of trouble. friends to tell you which the mobile phone subscription.
similar phrasings; in cases
where this is not evident, it sources to use and which There are also online spaces
Remember is nonetheless best not to to avoid; devoted to exchanges and
You are free to use, modify take any risks; Before opening a down- purchases of all sorts of products,
and distribute freeware loaded file make sure to at very competitive prices.
The Peer to Peer (P2P) pro-
programmes that are not grammes you use to share scan it for viruses; anoth- One of the fundamental
copyright-protected; and download files also carry er quite frequent risk is difference between online and
Some software are, on the certain risks. One must have in fact that a downloaded traditional commerce lies with
other hand, shareware, and a very thorough understand- file might contain viruses the difficulty in identifying who is
therefore free for a specific ing of them to be able to use and spyware that can put at the other end of the exchange
trial period; them without running any PCs, personal data and and the risk of fraud that may lie
Your privacy and your PC security risks: privacy at risk; just around the corner. One of
Guidelines for Children and Young People
70 www.itu.int/cop
the most widespread risks is that Some companies in a number of company, description of the hacks into the server of the
of phishing. This happens when countries are beginning to deploy contracts general conditions company where your credit
people respond to fake emails, age verification systems linked to and, in particular, how to card details have been stored.
spam, which usually appear to their purchasing procedures, but withdraw from the purchase; Clearly, by choosing other
come from a reputable source e.g. this is still a very new and limited also find out about the modes of payment you
a bank or credit card company. technology, however it is a grow- protection and management can avoid the possibility of
They will ask you to enter a lot ing, practice. Buying age restricted of personal data and payment someone stealing your credit
of personal information e.g. bank products online, and telling lies security; and compare prices, card number.
account details, passwords, date of about your age in order to do so looking for the same item on If you receive an unsolicited
birth and so on, which they will means you could be committing other sites; e-mail offering you an
then misuse. a criminal offence and so could Prepaid credit cards, or ones incredible deal, it is highly
the vendor. You could forfeit the that can be topped up, come likely that it is fraudulent;
An additional complication with goods and you could end up with a
online commerce concerns the with spending limits and If something looks too good
criminal record, so dont do it. to be true, it most probably
sale of products or services that can help avoid unpleasant
are age restricted in some way. There are, in any case, a series of surprises. is, and it would be best to
For example, in many countries tactics that can help you reduce the Before you buy anything forget about it.
it is illegal for vendors to sell or risks and enable you to make use online, make sure the In the case of purchases
provide alcohol or tobacco to legal of the convenient opportunities site uses a secure system made by mobile phones for
minors. Gambling is also generally offered by online commerce: for transactions so as to which a credit card is not re-
limited to people over a certain Take great care in choosing prevent, for example, quired, verify what the costs
age. Yet in the online environment the sites that you want to sniffing, which is a means of the services actually are,
it can be very hard for the vendor make purchases from and of capturing data during the services conditions of
to determine the age of the person ensure their credibility. transmission. Even though agreement and how one can
proposing to make the purchase or Gather as much information many sites incorporate back out.
acquire the service. All that many as you can about the site systems that counter the
companies do is ask the person to in question, such as name, interception of data in
check a box to confirm they meet address, telephone number transit, your details could
the minimum age requirement. and head office of the still be stolen if someone
Guidelines for Children and Young People
72 www.itu.int/cop
4.
Conclusions
By keeping these basic rules in mind, you will be able to steer clear
of the majority of the pitfalls you can encounter online. Should you
encounter unpleasant or disturbing experiences, make sure you talk to a
trusted source. Remember, you have the right to be protected as well as
the responsibility to act appropriately, offline as well as online.
Appendix 1
Parent Contract 5. I will try to provide close sup- I agree to the above.
port and supervision of my
I know that the Internet can be a younger childrens use of the
wonderful place for my kids to visit. Internet, for example by trying Parent signature(s)
I also know that I must do my part to keep their computer in a
to help keep them safe on their visits. family area.
Under- standing that my kids can help 6. I will report suspicious and
me, I agree to follow these rules: Date
illegal activity and sites to the
1. I will get to know the services proper authorities.
and websites my child uses. 7. I will make or find a list
2. I will set reasonable rules and I understand that my parents have
of recommended sites for
guidelines for computer use by agreed to live by these rules and I
children.
my children and I will discuss agree to help my parents explore
8. I will frequently check to see the Internet with me.
these rules and post them near where my kids have visited on
the computer as a reminder. the Internet. Child signature
3. I will not overreact if my child 9. I will seek options for filtering
tells me about something and blocking inappropriate
bad he or she finds or does Internet material from my Date
on the Internet. children.
4. I will try to get to know my 10. I will talk to my kids about
childs online friends and their online explorations and
Buddy List contacts just as I take online adventures with
try to get to know his or her them as often as I can.
other friends.
Childs Contract 4. When considering signing up 8. I will use good manners when 12. I will tell my parents if I
to a new online service I will Im online, including good receive pictures, links to bad
I know that the Internet can be a won- avoid those which demand too language and respect. I will not sites, e-mail or instant messag-
derful place to visit. I also know that it is much personal information pick fights or use threatening es with bad language or if Im
important for me to follow rules that will and try to opt for those which or mean words. in a chat room where people
keep me safe on my visits. I agree to the ask for less. 9. I will make my own personal are using swear words or mean
following rules: 5. I will always take steps to find safety my priority, since I know and hateful language.
1. Wherever possible I will choose out what personal information there are some people who 13. I will not send anything in the
a safe and sensible screen name about me will be published might be online and pretend to post to anyone Ive met online,
for myself that will not broad- by the service by default in be someone theyre not. without my parents okay. If I
cast any personal information my profile and will always opt 10. I will be honest with my get something in the post from
about my family or me. for the maximum degree of parents about people I meet someone Ive met online, Ill
2. I will keep all of my passwords privacy. online and will tell them, tell my parents immediately
private. 6. I will not share my personal without always being asked, (because that means they have
3. I will discuss with my parents information, or that of my about these people. I wont my private information).
all of the different programmes parents or any other family answer any e-mails or instant 14. I will not do anything online
and applications I use on my member, in any way, shape or messages from anyone my that someone asks me to if it
computer and on the Internet, form, online or with someone parents have not approved. makes me feel uncomfortable,
and talk to them about the sites I meet online. This includes, 11. If I see or read things that are especially if I know its some-
I visit. Before I download or but is not limited to name, bad, icky or mean, I will log thing my parents would not be
load a new programme or join address, telephone number, off and tell my parents so they happy about or approve of.
a new site I will check with my age or school name. can try to make sure it never
parents first to make sure they 7. I will treat others the way I happens again.
approve. want to be treated.
15. I will not call, write a snail mail I promise to protect my childs
or meet in person anyone who safety online by making sure
Ive met online without my these rules are followed. If my
parents approval or without a child encounters unsafe situations
trusted adult coming with me. and tells me, I will handle each
16. I understand my parents will situation with maturity and good
supervise my time online and sense, without blaming anyone,
may use software to monitor and will calmly work through it
or limit where I go online. with my child to ensure their safer
Theyre doing this because Internet experiences in the future.
they love me and want to
protect me.
Parent signature(s)
I will teach my parents more
about the Internet so we can have
fun together and learn cool new
things. Date
Child signature
Date
Printed in Switzerland
Geneva, 2016