SlideShare a Scribd company logo
1 of 32
CHILDREN SAFETY
ONLINE
A presentation by
The Electronic Counter Measures Department
Uganda Police Force
What is Online Safety?
Children Online Safety is the security of children and their information when using the
Internet. Details such as address, full name, telephone number, and birth date which are potentially used by
on-line criminals.
How are children using the internet?
Social networking
Facebook/ Youtube / Twitter /Instagram
Instant messaging
Facetime/Skype/ Whatsapp/Snapchat
Blogs and chat sites
Tumblr / Ask FM / Spillit
Gaming
Free and paid / Club Penguin / Minecraft
Mobile technology
Apps
Children and Cyber safety
What issues could be affecting children?
Cyber Bullying
Cyberbullying can happen via text, email and on social networks and gaming platforms. It
can consist of:
Threats and intimidation
•Harassment and stalking
•Defamation
•Rejection and exclusion
•Identify theft, hacking into social media accounts and impersonation
•Publically posting or sending on personal information about another person
•Manipulation
Why is cyberbullying different?
•It can reach a vast audience in a matter of seconds
•It has the potential to draw in large numbers of people
•It takes ‘repetition’ to a different level, with hurtful comments and images being
shared multiple times
•It has the potential to impact at any time of day or night
•There are very few children that have not been impacted in some way, either as
the perpetrator or the victim
Possible warning signs of children being
bullied or bullying other children
 Complaining that other children or a group of children do not like
them.
 Poor self-esteem. Feeling they are not as good as others.
 Not wanting to go to school or perform other activities.
 Spending a great deal of time on the computer.
 Being secretive about online activities.
Solution to Cyberbullying among Children
 Preserve evidence – this is crucial for identifying the bully and
making a case.
 Attempt to enlist assistance from the service provider.
 If able to identify the bully, contact him or her as a parent.
 Use available blocking technology (i.e., block the user on instant
messaging (IM), email and chat.)
 In serious cases, seek assistance from the police (i.e. threats of
physical harm, or unable to stop.)
Sexting
A recent study by the Internet & American Life Project “found that 4% of cell-owning
teens ages 12-17 say they have sent sexually suggestive nude or nearly nude images or
videos of themselves to someone else via text messaging.” Fifteen percent of young
respondents “say they have received such images of someone they know via text
message.”
Consequences
 Photos sent to boy/girlfriend could potentially be distributed over school,
especially after a breakup
 One could suffer legal consequences after distributing nude photos of an
underage minor i.e
o criminal charges
o listed as registered sex offender
 Criminal charges could result in...
o permanent expulsion from school
o can't reside near school premises because of shame to you fellow students
Sexting – Four steps to trouble
 Sarah, 14, takes a sexual photo of herself on her camera-phone and sends it to her boyfriend
James, 15.
Sarah is now potentially guilty of distributing child pornography. James is potentially guilty of
possession of child pornography
 Sarah dumps James. Out of revenge James sends the photo to his friends at school.
James is now guilty of distributing - and his friends of possession - of child pornography. Sarah is
embarrassed as a sexual photo of herself circulates school
 James’s friend uploads the photo to a social networking profile, where his photos are visible to the
public.
James is in breach of website terms and guilty of distributing child pornography
 Philip browse profiles with loose privacy settings and find the image of Sarah.
Sarah unwittingly becomes the subject of child pornography for distribution among strangers and
philip
Online Grooming
Groomers may go to a social network used by young people and pretend to be one of
them. They might attempt to gain trust by using fake profile pictures, pretending to
have similar interests, offering gifts and saying nice things to the child.
Once they have the child’s trust the groomer often steers the conversation towards
their sexual experiences, even asking them to send sexual photographs or videos of
themselves. Some may try to set up a meeting, or even blackmail children by
threatening to share the pictures or videos with the child’s family and friends.
Online groomers are not always strangers. In many situations they may already have
met them through their family or social activities, and use the internet to build rapport
with them. Sometimes children don’t realise they’ve been groomed, and think that the
person is their boyfriend or girlfriend.
Protect your child
Get Involved
The best way to keep your child safe online is to take an active interest right from
the start. They need your love and protection online as much as they do in the real
world. What your child is exposed to will depend on how they’re using the internet
– social network users are more likely to experience cyberbullying, see sexual or
violent images, or have contact with strangers.
Challenge your child and learn about e-safety together with our tablet app
Set up safely
Set up their device
Whatever device you choose, there are free controls you can
use to stop your child from purchasing and using certain apps,
seeing certain content, or limiting what they can share with
others, like their location for example.
Cont.…
Getting the low down on sites, games and apps
You will probably use social networks yourself, but you might want to know about new
ones that your child is using, or wants to use. Use them yourself and set up your own
account so you can experience what your child might see. There are also a number
of child-friendly social networks they could use while they get ready for the likes of
Snapchat and Instagram.
Privacy settings
Spend time together looking at the privacy settings. It’s always best to assume that
default settings are public and should be changed accordingly.
Cont.….
Blocking software
There are a range of new apps and software that block, filter and monitor online
behaviour. You’ll need to decide as a family whether this is the right approach for
you, taking into consideration your child’s age and maturity, and their need for
privacy.
Negotiating the gaming world
In some games like Minecraft people deliberately try to intimidate other players. In
multi-player games where gamers talk to one another – you might find abusive
language, harassment and there have been instances of grooming.
Protection Methods for Children
Educate you child about safe Internet practices
Studies show that:
 Use strong passwords (including numbers, special characters, and
combination of upper/lower case)
 Never give password to anyone
 Don't communicate online with people you don't know
 Enable & elevate privacy settings
 Disable Facebook Chat
 Do not allow Skype calls from anyone who is not in your contact list
 Teach children about responsible communication
 Regulate length of time a child spends on Internet as well as determine a
window of time for usage
 Request list of email and social networking sites being used and
CHILD LAWS: OFFENCES AND
SENTENCES
PREVENTION OF TRAFFICKING IN PERSONS ACT, 2009.
ACT 7
Milestones
 Legislation in place, Entity focussing on online child protection (some gaps)
 Online and telephonic Reporting Facility linked to police and international networks
 Awareness programs for parents, learners and teachers (limited reach)
 Research
 Partnerships with Law enforcement
 Partnership with other government departments
 Global partnerships
 Partnerships with civil society
International Framework
1. UN Convention on the Rights of the Child
 Spells out the human rights of children:
 The right to survival, to develop to the fullest, to be protected against
abuse and exploitation, to receive protection from harmful influence.
2. African Charter on the Rights and Welfare of the Child
 African Nations have adopted this Charter, which commits them
individually and collectively to take necessary steps and measures(
legislative and others) to ensure the protection, survival and development
of the African child in conformity with the provisions of this charter.
Films and Publications Act
• Criminalizes the creation, possession and distribution of child abuse images
(child-pornography)
• Any image or description of a person who is under the age of 18 years or made to
appear, look like or described as a person under that age, engaged in any form of
sexual conduct.
• The Act does not distinguish between images created by the use of real children
and products of the imagination, including “virtual” child-pornography created by
using sophisticated computer graphics.
Child pornography.
 (1) A person who—
 (a) produces child pornography for the purposes of its distribution through a
computer;
 (b) offers or makes available child pornography through a computer;
 (c) distributes or transmits child pornography through a computer;
 (d) procures child pornography through a computer for himself or herself or
another person; or
 (e) unlawfully possesses child pornography on a computer, commits an offence.
Cont.…
 (2) A person who makes available pornographic materials to a child commits an
offence.
 (3) For the purposes of this section “child pornography” includes pornographic
material that depicts— realistic images representing children engaged in sexually
suggestive or explicit conduct.
 (4) A person who commits an offence under this section is liable on conviction to a
fine not exceeding three hundred and sixty currency points or imprisonment not
exceeding fifteen years or both.
(a) “child” means a person below the age
of 18 years;
Prevention of trafficking in persons act, 2009.
 An Act to provide for the prohibition of trafficking in persons, creation of offences,
prosecution and punishment of offenders, prevention of the vice of trafficking in
persons, protection of victims of trafficking in persons, and other related matters.
Offence of trafficking in persons.
 (1) A person who—
 (a) recruits, transports, transfers, harbors or receives a person by means of the
threat or use of force or other forms of coercion, of abduction, of fraud, of
deception, of the abuse of power or of a position of vulnerability or of the giving or
receiving of payments or benefits to achieve the consent of a person having control
over another person, for the purpose of exploitation;
Cont.….
 (b) recruits, hires, maintains, confines, transports, transfers, harbors or receives a
person or facilitates the aforementioned acts through force or other forms of
coercion for the purpose of engaging that person in prostitution, pornography,
sexual exploitation, forced labor, slavery, involuntary servitude, death bondage,
forced or arranged marriage; commits an offence and is liable to imprisonment for
fifteen years.
 (2) Notwithstanding the provisions of subsection (1), where the offender is a
legal person, it shall be liable to a fine of one thousand currency points, and
temporary or permanent closure, deregistration, dissolution, or disqualification
from practice of certain activities.
 (4) The consent of the victim of trafficking or if a child, the consent of his or her
parents or guardian to the acts of exploitation shall not be relevant.
4. Aggravated trafficking
 A person commits the offence of aggravated trafficking where—
 (a) the victim of trafficking is a child;
 (b) adoption, guardianship, fostering and other orders in relation to children is
undertaken for the purpose of exploitation;
 (c) the offence is committed by a syndicate, or on large scale;
 (d) the offender is an organization engaged in the activities of organizing,
directing or protecting the vulnerable persons in society;
 (e) the offender is engaged in organizing or directing another person or persons
to commit the offence;
Cont.….
 (g) the offence is committed by a public officer;
 (h) the offence is committed by military personnel or law enforcement officer;
 (i) where the person organizes, facilitates or makes preparations for the
kidnapping, abduction, buying, selling, vending, bringing from or sending to,
receiving, detaining or confining of a person for purposes of harmful rituals or
practices, human sacrifice, removal of any body part or organ, or any other act
related to witchcraft;
 (j) the victim dies, becomes a person of unsound mind, suffers mutilation, gets
infected with HIV/ AIDS or any other life threatening illness; and shall be liable to
imprisonment for life.
5. Trafficking in children
 A person who—
 (a) does any act referred to under Section 3 in relation to a child;
 (b) uses a child in any armed conflict;
 (c) removes any part, organ or tissue from the body of a child for
 purposes of human sacrifice;
 (d) uses a child in the commission of a crime;
 (e) abandons a child outside the country;
 (f) uses a child or any body part of a child in witchcraft, rituals and
related practices;
 commits an offence of aggravated trafficking in children and may be liable
to suffer death.
 A person who while knowing or having reason to believe that a person is a
victim of trafficking, engages the labour or services of that victim in that
Offences Related to Trafficking in Children.
 A person who—
 (a) attempts to traffic in persons;
 (b) conspires with another person to do an act of trafficking in
 persons;
 (c) recruits, transports, transfers, harbours, provides or receives a person for
domestic or overseas employment or training or apprenticeship with the intention
of trafficking;
 (d) recruits a person below 16 years in any form of employment for the purposes
of exploitation; introduces or matches any person to another for purposes of
sexual exploitation;
 (e) confiscates, conceals, or destroys a passport, travel documents, or other
personal documents or belongings of a person for the purpose of unlawfully
denying that person freedom of movement, or access to any public services;
 (f) adopts or facilitates the adoption of a person for illicit purposes;
 Commits an offence and is liable on conviction to imprisonment for five years or a
fine of one hundred and twenty currency points or to both such imprisonment and
fine, and on subsequent conviction for the same offence, is liable to imprisonment
Failure to Disclose Conviction.
 A person who, having been convicted of a trafficking offence under this
Act fails to disclose that conviction—
 (a) when applying for employment which places him or her in a position
of authority or care of children; or
 (b) when offering or agreeing to take care of or supervise children,
commits an offence and is liable on conviction to a fine, not exceeding
three thousand currency points or to a term of imprisonment not
exceeding three years or both.
Duty to Report Trafficking
a) Every member of the community, who knows that any person has
committed or intends to commit an offence under this part of the Act,
shall report the matter to the police or other authority for appropriate
action.
b) A person who knowing or having reason to believe that a person has
committed or intends to commit an offence and does not report to police
or other relevant authority, commits an offence and is liable to a fine of
five thousand currency points or imprisonment for six months.
Reference
1. https://www.internetmatters.org/parental-controls/interactive-guide/
2. Advice on using privacy settings on the most popular social
apps.https://www.internetmatters.org/hub/guidance/social-networking-how-to-guides-for-
parents/
3. Online grooming https://youtu.be/Pt-9NI1qCKI
4. The Safe Surfin' Foundation
5. Internet Safety PowerPoint - A Parent's Guide to the Internet:
http://criminaljustice.state.ny.us/missing/i_safety/mediafiles/isafety_parents6.ppt
6. http://www.themonitor.com/articles/palmview-38189-school-charge.html

More Related Content

Similar to Children-safety-online-Presentation.pptx

Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptpurush203
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eveSimonBalle
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of TeensKate Gukeisen
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationjanemiller48
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011DHE2008
 
My protection plan
My protection planMy protection plan
My protection planShakena12
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmribera87
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital worldDan Bowen
 

Similar to Children-safety-online-Presentation.pptx (20)

Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Legalissues
LegalissuesLegalissues
Legalissues
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011
 
My protection plan
My protection planMy protection plan
My protection plan
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
 

More from Rahuljain40418

resaerch methedolgy-I(Rahul Jain).ppt
resaerch methedolgy-I(Rahul Jain).pptresaerch methedolgy-I(Rahul Jain).ppt
resaerch methedolgy-I(Rahul Jain).pptRahuljain40418
 
Contract Labour (regulation and abolition) act , 1970 PPT.pptx
Contract Labour (regulation and abolition) act , 1970 PPT.pptxContract Labour (regulation and abolition) act , 1970 PPT.pptx
Contract Labour (regulation and abolition) act , 1970 PPT.pptxRahuljain40418
 
DOC-20230704-WA0016_230809_131448.pdf
DOC-20230704-WA0016_230809_131448.pdfDOC-20230704-WA0016_230809_131448.pdf
DOC-20230704-WA0016_230809_131448.pdfRahuljain40418
 
Common Sense, Law and Public Policy - LPP2023 .pdf
Common Sense, Law and Public Policy - LPP2023  .pdfCommon Sense, Law and Public Policy - LPP2023  .pdf
Common Sense, Law and Public Policy - LPP2023 .pdfRahuljain40418
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRahuljain40418
 
Itmynt-2-161001101406.pdf
Itmynt-2-161001101406.pdfItmynt-2-161001101406.pdf
Itmynt-2-161001101406.pdfRahuljain40418
 
sairamsii-140206111100-phpapp01.pdf
sairamsii-140206111100-phpapp01.pdfsairamsii-140206111100-phpapp01.pdf
sairamsii-140206111100-phpapp01.pdfRahuljain40418
 
fundamentalrights-130330013756-phpapp02.pdf
fundamentalrights-130330013756-phpapp02.pdffundamentalrights-130330013756-phpapp02.pdf
fundamentalrights-130330013756-phpapp02.pdfRahuljain40418
 
mtp-210624165737 (1)_230625_045321.pdf
mtp-210624165737 (1)_230625_045321.pdfmtp-210624165737 (1)_230625_045321.pdf
mtp-210624165737 (1)_230625_045321.pdfRahuljain40418
 
Contract_Labour_Regulation_and_Abolition.pptx
Contract_Labour_Regulation_and_Abolition.pptxContract_Labour_Regulation_and_Abolition.pptx
Contract_Labour_Regulation_and_Abolition.pptxRahuljain40418
 

More from Rahuljain40418 (20)

resaerch methedolgy-I(Rahul Jain).ppt
resaerch methedolgy-I(Rahul Jain).pptresaerch methedolgy-I(Rahul Jain).ppt
resaerch methedolgy-I(Rahul Jain).ppt
 
Contract Labour (regulation and abolition) act , 1970 PPT.pptx
Contract Labour (regulation and abolition) act , 1970 PPT.pptxContract Labour (regulation and abolition) act , 1970 PPT.pptx
Contract Labour (regulation and abolition) act , 1970 PPT.pptx
 
ESI ACT 1948 PPT.pptx
ESI ACT 1948 PPT.pptxESI ACT 1948 PPT.pptx
ESI ACT 1948 PPT.pptx
 
DOC-20230704-WA0016_230809_131448.pdf
DOC-20230704-WA0016_230809_131448.pdfDOC-20230704-WA0016_230809_131448.pdf
DOC-20230704-WA0016_230809_131448.pdf
 
Common Sense, Law and Public Policy - LPP2023 .pdf
Common Sense, Law and Public Policy - LPP2023  .pdfCommon Sense, Law and Public Policy - LPP2023  .pdf
Common Sense, Law and Public Policy - LPP2023 .pdf
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
 
Pty
PtyPty
Pty
 
Itmynt-2-161001101406.pdf
Itmynt-2-161001101406.pdfItmynt-2-161001101406.pdf
Itmynt-2-161001101406.pdf
 
sairamsii-140206111100-phpapp01.pdf
sairamsii-140206111100-phpapp01.pdfsairamsii-140206111100-phpapp01.pdf
sairamsii-140206111100-phpapp01.pdf
 
Yuu
YuuYuu
Yuu
 
Kyu constitutes
Kyu constitutes Kyu constitutes
Kyu constitutes
 
Copying
Copying Copying
Copying
 
ilovepdf_merged.pptx
ilovepdf_merged.pptxilovepdf_merged.pptx
ilovepdf_merged.pptx
 
Ppt of condt
Ppt of condtPpt of condt
Ppt of condt
 
LL4.pptx
LL4.pptxLL4.pptx
LL4.pptx
 
fundamentalrights-130330013756-phpapp02.pdf
fundamentalrights-130330013756-phpapp02.pdffundamentalrights-130330013756-phpapp02.pdf
fundamentalrights-130330013756-phpapp02.pdf
 
mtp-210624165737.pdf
mtp-210624165737.pdfmtp-210624165737.pdf
mtp-210624165737.pdf
 
LL4.pptx
LL4.pptxLL4.pptx
LL4.pptx
 
mtp-210624165737 (1)_230625_045321.pdf
mtp-210624165737 (1)_230625_045321.pdfmtp-210624165737 (1)_230625_045321.pdf
mtp-210624165737 (1)_230625_045321.pdf
 
Contract_Labour_Regulation_and_Abolition.pptx
Contract_Labour_Regulation_and_Abolition.pptxContract_Labour_Regulation_and_Abolition.pptx
Contract_Labour_Regulation_and_Abolition.pptx
 

Recently uploaded

A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in LawNilendra Kumar
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargainingbartzlawgroup1
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxIshikaChauhan30
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理ss
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理Airst S
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理ss
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...ZurliaSoop
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理Airst S
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理Airst S
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Abdul-Hakim Shabazz
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理F La
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理bd2c5966a56d
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理Airst S
 
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdfposts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdfbhavenpr
 
Call Girls in Nizamabad 9332606886 High Profile Call Girls You Can Get The...
Call Girls in Nizamabad   9332606886  High Profile Call Girls You Can Get The...Call Girls in Nizamabad   9332606886  High Profile Call Girls You Can Get The...
Call Girls in Nizamabad 9332606886 High Profile Call Girls You Can Get The...Sareena Khatun
 

Recently uploaded (20)

A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptx
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy NovicesIt’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdfposts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
 
Call Girls in Nizamabad 9332606886 High Profile Call Girls You Can Get The...
Call Girls in Nizamabad   9332606886  High Profile Call Girls You Can Get The...Call Girls in Nizamabad   9332606886  High Profile Call Girls You Can Get The...
Call Girls in Nizamabad 9332606886 High Profile Call Girls You Can Get The...
 

Children-safety-online-Presentation.pptx

  • 1. CHILDREN SAFETY ONLINE A presentation by The Electronic Counter Measures Department Uganda Police Force
  • 2. What is Online Safety? Children Online Safety is the security of children and their information when using the Internet. Details such as address, full name, telephone number, and birth date which are potentially used by on-line criminals.
  • 3. How are children using the internet? Social networking Facebook/ Youtube / Twitter /Instagram Instant messaging Facetime/Skype/ Whatsapp/Snapchat Blogs and chat sites Tumblr / Ask FM / Spillit Gaming Free and paid / Club Penguin / Minecraft Mobile technology Apps
  • 5. What issues could be affecting children?
  • 6. Cyber Bullying Cyberbullying can happen via text, email and on social networks and gaming platforms. It can consist of: Threats and intimidation •Harassment and stalking •Defamation •Rejection and exclusion •Identify theft, hacking into social media accounts and impersonation •Publically posting or sending on personal information about another person •Manipulation
  • 7. Why is cyberbullying different? •It can reach a vast audience in a matter of seconds •It has the potential to draw in large numbers of people •It takes ‘repetition’ to a different level, with hurtful comments and images being shared multiple times •It has the potential to impact at any time of day or night •There are very few children that have not been impacted in some way, either as the perpetrator or the victim
  • 8. Possible warning signs of children being bullied or bullying other children  Complaining that other children or a group of children do not like them.  Poor self-esteem. Feeling they are not as good as others.  Not wanting to go to school or perform other activities.  Spending a great deal of time on the computer.  Being secretive about online activities.
  • 9. Solution to Cyberbullying among Children  Preserve evidence – this is crucial for identifying the bully and making a case.  Attempt to enlist assistance from the service provider.  If able to identify the bully, contact him or her as a parent.  Use available blocking technology (i.e., block the user on instant messaging (IM), email and chat.)  In serious cases, seek assistance from the police (i.e. threats of physical harm, or unable to stop.)
  • 10. Sexting A recent study by the Internet & American Life Project “found that 4% of cell-owning teens ages 12-17 say they have sent sexually suggestive nude or nearly nude images or videos of themselves to someone else via text messaging.” Fifteen percent of young respondents “say they have received such images of someone they know via text message.” Consequences  Photos sent to boy/girlfriend could potentially be distributed over school, especially after a breakup  One could suffer legal consequences after distributing nude photos of an underage minor i.e o criminal charges o listed as registered sex offender  Criminal charges could result in... o permanent expulsion from school o can't reside near school premises because of shame to you fellow students
  • 11. Sexting – Four steps to trouble  Sarah, 14, takes a sexual photo of herself on her camera-phone and sends it to her boyfriend James, 15. Sarah is now potentially guilty of distributing child pornography. James is potentially guilty of possession of child pornography  Sarah dumps James. Out of revenge James sends the photo to his friends at school. James is now guilty of distributing - and his friends of possession - of child pornography. Sarah is embarrassed as a sexual photo of herself circulates school  James’s friend uploads the photo to a social networking profile, where his photos are visible to the public. James is in breach of website terms and guilty of distributing child pornography  Philip browse profiles with loose privacy settings and find the image of Sarah. Sarah unwittingly becomes the subject of child pornography for distribution among strangers and philip
  • 12. Online Grooming Groomers may go to a social network used by young people and pretend to be one of them. They might attempt to gain trust by using fake profile pictures, pretending to have similar interests, offering gifts and saying nice things to the child. Once they have the child’s trust the groomer often steers the conversation towards their sexual experiences, even asking them to send sexual photographs or videos of themselves. Some may try to set up a meeting, or even blackmail children by threatening to share the pictures or videos with the child’s family and friends. Online groomers are not always strangers. In many situations they may already have met them through their family or social activities, and use the internet to build rapport with them. Sometimes children don’t realise they’ve been groomed, and think that the person is their boyfriend or girlfriend.
  • 13. Protect your child Get Involved The best way to keep your child safe online is to take an active interest right from the start. They need your love and protection online as much as they do in the real world. What your child is exposed to will depend on how they’re using the internet – social network users are more likely to experience cyberbullying, see sexual or violent images, or have contact with strangers. Challenge your child and learn about e-safety together with our tablet app
  • 14. Set up safely Set up their device Whatever device you choose, there are free controls you can use to stop your child from purchasing and using certain apps, seeing certain content, or limiting what they can share with others, like their location for example.
  • 15. Cont.… Getting the low down on sites, games and apps You will probably use social networks yourself, but you might want to know about new ones that your child is using, or wants to use. Use them yourself and set up your own account so you can experience what your child might see. There are also a number of child-friendly social networks they could use while they get ready for the likes of Snapchat and Instagram. Privacy settings Spend time together looking at the privacy settings. It’s always best to assume that default settings are public and should be changed accordingly.
  • 16. Cont.…. Blocking software There are a range of new apps and software that block, filter and monitor online behaviour. You’ll need to decide as a family whether this is the right approach for you, taking into consideration your child’s age and maturity, and their need for privacy. Negotiating the gaming world In some games like Minecraft people deliberately try to intimidate other players. In multi-player games where gamers talk to one another – you might find abusive language, harassment and there have been instances of grooming.
  • 17. Protection Methods for Children Educate you child about safe Internet practices Studies show that:  Use strong passwords (including numbers, special characters, and combination of upper/lower case)  Never give password to anyone  Don't communicate online with people you don't know  Enable & elevate privacy settings  Disable Facebook Chat  Do not allow Skype calls from anyone who is not in your contact list  Teach children about responsible communication  Regulate length of time a child spends on Internet as well as determine a window of time for usage  Request list of email and social networking sites being used and
  • 18. CHILD LAWS: OFFENCES AND SENTENCES PREVENTION OF TRAFFICKING IN PERSONS ACT, 2009. ACT 7
  • 19. Milestones  Legislation in place, Entity focussing on online child protection (some gaps)  Online and telephonic Reporting Facility linked to police and international networks  Awareness programs for parents, learners and teachers (limited reach)  Research  Partnerships with Law enforcement  Partnership with other government departments  Global partnerships  Partnerships with civil society
  • 20. International Framework 1. UN Convention on the Rights of the Child  Spells out the human rights of children:  The right to survival, to develop to the fullest, to be protected against abuse and exploitation, to receive protection from harmful influence. 2. African Charter on the Rights and Welfare of the Child  African Nations have adopted this Charter, which commits them individually and collectively to take necessary steps and measures( legislative and others) to ensure the protection, survival and development of the African child in conformity with the provisions of this charter.
  • 21. Films and Publications Act • Criminalizes the creation, possession and distribution of child abuse images (child-pornography) • Any image or description of a person who is under the age of 18 years or made to appear, look like or described as a person under that age, engaged in any form of sexual conduct. • The Act does not distinguish between images created by the use of real children and products of the imagination, including “virtual” child-pornography created by using sophisticated computer graphics.
  • 22. Child pornography.  (1) A person who—  (a) produces child pornography for the purposes of its distribution through a computer;  (b) offers or makes available child pornography through a computer;  (c) distributes or transmits child pornography through a computer;  (d) procures child pornography through a computer for himself or herself or another person; or  (e) unlawfully possesses child pornography on a computer, commits an offence.
  • 23. Cont.…  (2) A person who makes available pornographic materials to a child commits an offence.  (3) For the purposes of this section “child pornography” includes pornographic material that depicts— realistic images representing children engaged in sexually suggestive or explicit conduct.  (4) A person who commits an offence under this section is liable on conviction to a fine not exceeding three hundred and sixty currency points or imprisonment not exceeding fifteen years or both.
  • 24. (a) “child” means a person below the age of 18 years; Prevention of trafficking in persons act, 2009.  An Act to provide for the prohibition of trafficking in persons, creation of offences, prosecution and punishment of offenders, prevention of the vice of trafficking in persons, protection of victims of trafficking in persons, and other related matters. Offence of trafficking in persons.  (1) A person who—  (a) recruits, transports, transfers, harbors or receives a person by means of the threat or use of force or other forms of coercion, of abduction, of fraud, of deception, of the abuse of power or of a position of vulnerability or of the giving or receiving of payments or benefits to achieve the consent of a person having control over another person, for the purpose of exploitation;
  • 25. Cont.….  (b) recruits, hires, maintains, confines, transports, transfers, harbors or receives a person or facilitates the aforementioned acts through force or other forms of coercion for the purpose of engaging that person in prostitution, pornography, sexual exploitation, forced labor, slavery, involuntary servitude, death bondage, forced or arranged marriage; commits an offence and is liable to imprisonment for fifteen years.  (2) Notwithstanding the provisions of subsection (1), where the offender is a legal person, it shall be liable to a fine of one thousand currency points, and temporary or permanent closure, deregistration, dissolution, or disqualification from practice of certain activities.  (4) The consent of the victim of trafficking or if a child, the consent of his or her parents or guardian to the acts of exploitation shall not be relevant.
  • 26. 4. Aggravated trafficking  A person commits the offence of aggravated trafficking where—  (a) the victim of trafficking is a child;  (b) adoption, guardianship, fostering and other orders in relation to children is undertaken for the purpose of exploitation;  (c) the offence is committed by a syndicate, or on large scale;  (d) the offender is an organization engaged in the activities of organizing, directing or protecting the vulnerable persons in society;  (e) the offender is engaged in organizing or directing another person or persons to commit the offence;
  • 27. Cont.….  (g) the offence is committed by a public officer;  (h) the offence is committed by military personnel or law enforcement officer;  (i) where the person organizes, facilitates or makes preparations for the kidnapping, abduction, buying, selling, vending, bringing from or sending to, receiving, detaining or confining of a person for purposes of harmful rituals or practices, human sacrifice, removal of any body part or organ, or any other act related to witchcraft;  (j) the victim dies, becomes a person of unsound mind, suffers mutilation, gets infected with HIV/ AIDS or any other life threatening illness; and shall be liable to imprisonment for life.
  • 28. 5. Trafficking in children  A person who—  (a) does any act referred to under Section 3 in relation to a child;  (b) uses a child in any armed conflict;  (c) removes any part, organ or tissue from the body of a child for  purposes of human sacrifice;  (d) uses a child in the commission of a crime;  (e) abandons a child outside the country;  (f) uses a child or any body part of a child in witchcraft, rituals and related practices;  commits an offence of aggravated trafficking in children and may be liable to suffer death.  A person who while knowing or having reason to believe that a person is a victim of trafficking, engages the labour or services of that victim in that
  • 29. Offences Related to Trafficking in Children.  A person who—  (a) attempts to traffic in persons;  (b) conspires with another person to do an act of trafficking in  persons;  (c) recruits, transports, transfers, harbours, provides or receives a person for domestic or overseas employment or training or apprenticeship with the intention of trafficking;  (d) recruits a person below 16 years in any form of employment for the purposes of exploitation; introduces or matches any person to another for purposes of sexual exploitation;  (e) confiscates, conceals, or destroys a passport, travel documents, or other personal documents or belongings of a person for the purpose of unlawfully denying that person freedom of movement, or access to any public services;  (f) adopts or facilitates the adoption of a person for illicit purposes;  Commits an offence and is liable on conviction to imprisonment for five years or a fine of one hundred and twenty currency points or to both such imprisonment and fine, and on subsequent conviction for the same offence, is liable to imprisonment
  • 30. Failure to Disclose Conviction.  A person who, having been convicted of a trafficking offence under this Act fails to disclose that conviction—  (a) when applying for employment which places him or her in a position of authority or care of children; or  (b) when offering or agreeing to take care of or supervise children, commits an offence and is liable on conviction to a fine, not exceeding three thousand currency points or to a term of imprisonment not exceeding three years or both.
  • 31. Duty to Report Trafficking a) Every member of the community, who knows that any person has committed or intends to commit an offence under this part of the Act, shall report the matter to the police or other authority for appropriate action. b) A person who knowing or having reason to believe that a person has committed or intends to commit an offence and does not report to police or other relevant authority, commits an offence and is liable to a fine of five thousand currency points or imprisonment for six months.
  • 32. Reference 1. https://www.internetmatters.org/parental-controls/interactive-guide/ 2. Advice on using privacy settings on the most popular social apps.https://www.internetmatters.org/hub/guidance/social-networking-how-to-guides-for- parents/ 3. Online grooming https://youtu.be/Pt-9NI1qCKI 4. The Safe Surfin' Foundation 5. Internet Safety PowerPoint - A Parent's Guide to the Internet: http://criminaljustice.state.ny.us/missing/i_safety/mediafiles/isafety_parents6.ppt 6. http://www.themonitor.com/articles/palmview-38189-school-charge.html