Globally aligned internet regulation has significant potential to boost the response to child sexual exploitation and abuse online, by incentivising consistent action from platforms to tackle harm. Voluntary collaboration will remain critical to enable responsiveness and drive innovation.
Contents
As new technology advancements continue to emerge, there is a clear need for legislation that is technology neutral – i.e., legislation that does not discriminate against or encourage particular technologies.
This would allow governments and regulators to adapt to new technology, helping tackle new and emerging threats while encouraging innovation.
Despite its transformative potential, internet regulation is just one component of the legislative response to child sexual exploitation and abuse online. The Council of Europe Convention on the Protection of Children Against Sexual Exploitation and Sexual Abuse (also known as the Lanzarote Convention) includes important provisions addressing child sexual exploitation and abuse online but is yet to be ratified and implemented in all UN Member States. Its ratification is an important first step for governments, and an enabler for greater global alignment of all relevant laws.
“While we know exactly where to go in case of violence in the street or at home, we are at a complete loss when it comes to reporting any kind of violence that happens in a virtual environment.”
Noa, 18 years old, Microsoft Digital for Good Youth Council
New and upcoming legislation
We are at a turning moment in the global response to child sexual exploitation and abuse online, with many legislation coming into action and others being discussed and proposed, all over the world.
The past decade has seen a shift from the era of insufficient self-regulation to an age of increasing legislative initiatives and regulation around the world.
Six Bills being debated in the US300 (most notably the Kids Online Safety Act, which is the federal counterpart to California’s Age-Appropriate Design Code Act).
“Young people need all those working in the field of child protection to urge states to enact laws to hold criminals accountable in cases of sexual exploitation of children via the Internet, such as a Child Rights Act.”
Ruwaida, 16 years old, Youth Participant, Democracy School Yemen
Global alignment of internet regulation
As globally new online safety legislations are coming into effect, the next challenge is to ensure that all these laws, being developed in different countries, are globally aligned.
We need global alignment across regulatory regimes to:
stop offenders from benefitting from legal loopholes and avoiding penalisation
help tech companies report, remove and block abuse content more efficiently, reducing duplication.
This is key to realising the transformative potential of regulation.
UNICEF’s ‘Legislating for the Digital Age’ report includes the minimum recommended standards for businesses and other organisations, couched within a more comprehensive set of guidelines to support legislative alignment on everything from offence definitions through to investigative and survivor support provisions.
Safety tech’s role in regulation (RegTech)
Safety technology companies are necessary to develop the necessary technologies to implement legislation and, therefore, harness the transformative potential of internet regulation.
As the number of regulations globally is increasing, so is the number of safety tech providers. On a global scale, over 350 safety tech providers were operating in 2022. Innovation has led to new safety tech solutions.
As more and more people access the Internet via their mobile phone, there is a need for device-level safety tech solutions.
The safety technology sector still has clear gaps, which urgently need to be addressed to ensure the sector develops the appropriate tool to support new legislation. One of these gaps, is that technology solutions are generally trained on English datasets, and not for language-specific vocabulary or cultural and regional differences
The app monitors network traffic and images viewed on the user’s screen in real-time, blocking sexual images of children if detected.
One of the gaps is that solutions are generally trained on English datasets, and not for language-specific vocabulary or cultural and regional differences.
Convened by the UK’s Centre for Data Ethics and Innovation, the Online Safety Data Initiative brings together online safety tech suppliers and government, academic, and civil society stakeholders to drive innovation, helping companies develop world-class safety tools that identify and remove harmful online content through greater access to ethical data sources.
Regulation & end-to-end encryption (E2EE)
NCMEC anticipates that with the widespread adoption of E2EE, the number of reports of suspected child sexual abuse from larger platforms (of which five accounted for 93% of all reports in 2022) will decrease by almost 80%. It is technically possible to detect child sexual exploitation and abuse in E2EE environments in a privacy- and security-preserving way. Proposed solutions include:
Client-side scanning, which involves scanning messages on devices for matches or similarities to a database of illegal child sexual abuse material before the message is encrypted and sent.
Homomorphic encryption. This is the use of a different type of encryption which allows operations to be performed without data decryption at any point.
Intermediate secure enclaves, which decrypt the message at the server level by a third party and use tools to detect child sexual abuse materials.
Our website uses cookies to give you the best experience.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
We use cookies to optimise our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.