SlideShare a Scribd company logo
- Bill Gates
As a signatory to the UN Global
Compact, we are committed to:
• Universal Declaration of Human
Rights
• International Covenant on civil
and Political Rights
• International Covenant on
Economic, Social and Cultural
rights
• International Labor Organization
Declaration on Fundamental
Principles and Rights at Work

Our approach to human rights
issues is premised on four key
beliefs:
• The Power of Technology to
Promote Human Rights
• A Global Approach
• Constructive Engagement
• Good Governance/Rule of
Law
Thinkuknow in Australia is an example of our partnership
with NetAlert and The Virtual Global Taskforce . Microsoft
will provide on the ground training for teachers and parents
on the latest internet security and safety practices as well
as infrastructure and content.
Thorn.org (Formely the DNA Foundation)
Supported by an industry coalition this organization support
tech initiatives that disrupt predatory behavior and work to
make the internet a more hostile environment for those
who seek to exploit children. Supports awareness
campaigns and moves prevention websites to the top of
trigger word searches.
Research Grants for research into sex trafficking and
opportunities for technology
Best Practices to Help File Hosting and File Sharing
Companies Fight the Distribution of Child Sexual
Exploitation Content
3. Enforcement
CETS
Microsoft, Canadian police, and international
law enforcement officers developed the Child
Exploitation Tracking System (CETS), a unique
software tool that helps law enforcement
officials collaborate and share information
with other police services.

Photo DNA
Microsoft is are partnering with NetClean to
make our Microsoft PhotoDNA image
matching technology available to law
enforcement at no cost to help enhance their
child sex abuse investigations – empowering
them to more efficiently identify and rescue
victims and bring abusers to justice.
4. Real Impact
Visayan Foundation Forum,
Philippines
Lilibeth Masamloc was rescued from a life
of human trafficking and provided with ICT
and life skills training and guidance.
Now a social worker, she helps others as
manager of the Kasambahay education
center and president of the SUMAPI
training and advocacy organization.
Clair Deevy
Corporate Social Responsibility Lead,
Microsoft Asia Pacific
claird@microsoft.com
@cdeeme

More Related Content

What's hot

parry overall bio aug 2016
parry overall bio aug 2016parry overall bio aug 2016
parry overall bio aug 2016Parry Aftab
 
CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carrsegughana
 
Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)
Jeremy Pesner
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowskisegughana
 
The challenges of building a strong data infrastructure
The challenges of building a strong data infrastructureThe challenges of building a strong data infrastructure
The challenges of building a strong data infrastructure
Jeni Tennison
 
Internet governance and Development 140305
Internet governance and Development 140305Internet governance and Development 140305
Internet governance and Development 140305
Izumi Aizu
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
jwilso
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Charles Mok
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
Commonwealth Telecommunications Organisation
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacy
tolshinoda
 
ICT4GOV gov_leaders_internet_governance
ICT4GOV gov_leaders_internet_governanceICT4GOV gov_leaders_internet_governance
ICT4GOV gov_leaders_internet_governance
John Macasio
 
Social Media in Texas Government
Social Media in Texas GovernmentSocial Media in Texas Government
Social Media in Texas Government
Jon Lee
 
Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
Social Things, Data in a Digitally Responsible Society
Social Things, Data in a Digitally Responsible Society  Social Things, Data in a Digitally Responsible Society
Social Things, Data in a Digitally Responsible Society
University of Geneva
 
Cyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchCyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act research
LaVerne Kemp
 
Cyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchCyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act research
LaVerne Kemp
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
IGF Indonesia
 

What's hot (20)

Social– isms
Social– ismsSocial– isms
Social– isms
 
parry overall bio aug 2016
parry overall bio aug 2016parry overall bio aug 2016
parry overall bio aug 2016
 
CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carr
 
Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)
 
Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
The challenges of building a strong data infrastructure
The challenges of building a strong data infrastructureThe challenges of building a strong data infrastructure
The challenges of building a strong data infrastructure
 
Internet governance and Development 140305
Internet governance and Development 140305Internet governance and Development 140305
Internet governance and Development 140305
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacy
 
ICT4GOV gov_leaders_internet_governance
ICT4GOV gov_leaders_internet_governanceICT4GOV gov_leaders_internet_governance
ICT4GOV gov_leaders_internet_governance
 
Social Media in Texas Government
Social Media in Texas GovernmentSocial Media in Texas Government
Social Media in Texas Government
 
Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill Dutton
 
Social Things, Data in a Digitally Responsible Society
Social Things, Data in a Digitally Responsible Society  Social Things, Data in a Digitally Responsible Society
Social Things, Data in a Digitally Responsible Society
 
Cyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchCyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act research
 
Cyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchCyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act research
 
Cyber Security Cooperation
Cyber Security CooperationCyber Security Cooperation
Cyber Security Cooperation
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan SiberID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
ID IGF 2016 - Hukum 3 - Peran Negara dalam Kedaulatan Siber
 

Similar to Technology Against Trafficking

InfoShare Sri Lanka - Technology for social transformation
InfoShare Sri Lanka - Technology for social transformationInfoShare Sri Lanka - Technology for social transformation
InfoShare Sri Lanka - Technology for social transformation
Sanjana Hattotuwa
 
Leading the Charge Against Human Trafficking
Leading the Charge Against Human TraffickingLeading the Charge Against Human Trafficking
Leading the Charge Against Human Trafficking
TycoonSuccess
 
Leading the Charge Against Human Trafficking
Leading the Charge Against Human TraffickingLeading the Charge Against Human Trafficking
Leading the Charge Against Human Trafficking
TycoonSuccess
 
Week 5 Final Presentation
Week 5 Final PresentationWeek 5 Final Presentation
Week 5 Final Presentationguest29a8d2
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
WAIHIGA K.MUTURI
 
Child Abuse Images Traded by Paedophiles for Bitcoin: Report
Child Abuse Images Traded by Paedophiles for Bitcoin: ReportChild Abuse Images Traded by Paedophiles for Bitcoin: Report
Child Abuse Images Traded by Paedophiles for Bitcoin: Report
Waqas Amir
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
linda gichohi
 
Sept 23 presentation notes
Sept 23 presentation notesSept 23 presentation notes
Sept 23 presentation notesLinda Raftree
 
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina BuettiCTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buettisegughana
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionThomas Müller
 
Disinformation and AI: Separating fact from fiction
Disinformation and AI: Separating fact from fictionDisinformation and AI: Separating fact from fiction
Disinformation and AI: Separating fact from fiction
TitanEurope1
 
ODI overview
ODI overviewODI overview
ODI overview
theODI
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyProtecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
CTIC Technology Centre
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship RedefinedConnectSafely
 
The Ethics of Structured Information
The Ethics of Structured InformationThe Ethics of Structured Information
The Ethics of Structured Information
Nicholas Poole
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Nzeih Chukwuemeka
 
Why Study Ethics In Law Enforcement
Why Study Ethics In Law EnforcementWhy Study Ethics In Law Enforcement
Why Study Ethics In Law Enforcement
Patty Buckley
 
Guia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefGuia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / Unicef
FAIR PLAY AD / @VeronicaRRSouza
 

Similar to Technology Against Trafficking (20)

InfoShare Sri Lanka - Technology for social transformation
InfoShare Sri Lanka - Technology for social transformationInfoShare Sri Lanka - Technology for social transformation
InfoShare Sri Lanka - Technology for social transformation
 
Leading the Charge Against Human Trafficking
Leading the Charge Against Human TraffickingLeading the Charge Against Human Trafficking
Leading the Charge Against Human Trafficking
 
Leading the Charge Against Human Trafficking
Leading the Charge Against Human TraffickingLeading the Charge Against Human Trafficking
Leading the Charge Against Human Trafficking
 
Week 5 Final Presentation
Week 5 Final PresentationWeek 5 Final Presentation
Week 5 Final Presentation
 
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
Child Abuse Images Traded by Paedophiles for Bitcoin: Report
Child Abuse Images Traded by Paedophiles for Bitcoin: ReportChild Abuse Images Traded by Paedophiles for Bitcoin: Report
Child Abuse Images Traded by Paedophiles for Bitcoin: Report
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
Sept 23 presentation notes
Sept 23 presentation notesSept 23 presentation notes
Sept 23 presentation notes
 
INTS2310_PUNZO_EC
INTS2310_PUNZO_ECINTS2310_PUNZO_EC
INTS2310_PUNZO_EC
 
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina BuettiCTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buetti
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
 
Disinformation and AI: Separating fact from fiction
Disinformation and AI: Separating fact from fictionDisinformation and AI: Separating fact from fiction
Disinformation and AI: Separating fact from fiction
 
ODI overview
ODI overviewODI overview
ODI overview
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyProtecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
The Ethics of Structured Information
The Ethics of Structured InformationThe Ethics of Structured Information
The Ethics of Structured Information
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
 
Why Study Ethics In Law Enforcement
Why Study Ethics In Law EnforcementWhy Study Ethics In Law Enforcement
Why Study Ethics In Law Enforcement
 
Guia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefGuia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / Unicef
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

Technology Against Trafficking

  • 2.
  • 3.
  • 4. As a signatory to the UN Global Compact, we are committed to: • Universal Declaration of Human Rights • International Covenant on civil and Political Rights • International Covenant on Economic, Social and Cultural rights • International Labor Organization Declaration on Fundamental Principles and Rights at Work Our approach to human rights issues is premised on four key beliefs: • The Power of Technology to Promote Human Rights • A Global Approach • Constructive Engagement • Good Governance/Rule of Law
  • 5. Thinkuknow in Australia is an example of our partnership with NetAlert and The Virtual Global Taskforce . Microsoft will provide on the ground training for teachers and parents on the latest internet security and safety practices as well as infrastructure and content. Thorn.org (Formely the DNA Foundation) Supported by an industry coalition this organization support tech initiatives that disrupt predatory behavior and work to make the internet a more hostile environment for those who seek to exploit children. Supports awareness campaigns and moves prevention websites to the top of trigger word searches. Research Grants for research into sex trafficking and opportunities for technology
  • 6. Best Practices to Help File Hosting and File Sharing Companies Fight the Distribution of Child Sexual Exploitation Content
  • 7. 3. Enforcement CETS Microsoft, Canadian police, and international law enforcement officers developed the Child Exploitation Tracking System (CETS), a unique software tool that helps law enforcement officials collaborate and share information with other police services. Photo DNA Microsoft is are partnering with NetClean to make our Microsoft PhotoDNA image matching technology available to law enforcement at no cost to help enhance their child sex abuse investigations – empowering them to more efficiently identify and rescue victims and bring abusers to justice.
  • 8. 4. Real Impact Visayan Foundation Forum, Philippines Lilibeth Masamloc was rescued from a life of human trafficking and provided with ICT and life skills training and guidance. Now a social worker, she helps others as manager of the Kasambahay education center and president of the SUMAPI training and advocacy organization.
  • 9. Clair Deevy Corporate Social Responsibility Lead, Microsoft Asia Pacific claird@microsoft.com @cdeeme