13.07.2015 Views

to download the document in PDF format - Child Centre: Expert ...

to download the document in PDF format - Child Centre: Expert ...

to download the document in PDF format - Child Centre: Expert ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7.2 Actions <strong>to</strong> be achieved by 2013Toge<strong>the</strong>r with all relevant stakeholders, each State should:1. Amend exist<strong>in</strong>g legislation <strong>to</strong> reflect objective, and <strong>in</strong>ternationally acceptable,measures aga<strong>in</strong>st all sexually abusive and sexually exploitative behaviours and materialsrelated <strong>to</strong> <strong>the</strong> new technologies (<strong>in</strong>clud<strong>in</strong>g virtual and car<strong>to</strong>on imagery and text),and make obta<strong>in</strong><strong>in</strong>g for self or o<strong>the</strong>rs, <strong>in</strong>tentional view<strong>in</strong>g and possession, crim<strong>in</strong>alactivities. Such legislation should also protect all victims of sexually abusive andsexually exploitative practices and ensure that law enforcement and judicial processesadopt child sensitive procedures <strong>in</strong> accordance with <strong>the</strong> Guidel<strong>in</strong>es on Justice for<strong>Child</strong> Victims and Witnesses. This should <strong>in</strong>clude children and adolescents whohave engaged <strong>in</strong> sexually abusive behaviours <strong>to</strong>wards o<strong>the</strong>rs through <strong>the</strong> medium of<strong>the</strong> new technologies.2. Demonstrate <strong>in</strong>vestment <strong>in</strong> prioritis<strong>in</strong>g children by allocat<strong>in</strong>g <strong>in</strong>creased childprotection and law enforcement resources <strong>to</strong> <strong>the</strong> identification of children whoseimages are circulat<strong>in</strong>g on <strong>the</strong> Internet and enable greater co-operation at nationaland <strong>in</strong>ternational levels.3. Initiate a programme of research across States <strong>to</strong> address:a. <strong>in</strong>herent aspects of <strong>the</strong> new technologies that appear <strong>to</strong> <strong>in</strong>crease <strong>the</strong> likelihood ofsexually exploitative and sexually abusive practices <strong>to</strong>wards children <strong>in</strong> relation <strong>to</strong><strong>the</strong> new technologies;b. <strong>the</strong> impact of technological expansion on <strong>the</strong> demographic characteristics ofchildren sexually abused and sexually exploited through <strong>the</strong> new technologies;c. <strong>the</strong> impact, on <strong>the</strong> family and wider social networks, of <strong>in</strong>creas<strong>in</strong>g crim<strong>in</strong>alisationof Internet related activityd. <strong>the</strong> role of <strong>the</strong> IT sec<strong>to</strong>r <strong>in</strong> <strong>the</strong> risk assessment and analysis of current andupcom<strong>in</strong>g products, <strong>in</strong> <strong>the</strong> use and adaptability of age verification methods andonl<strong>in</strong>e access systems, and <strong>in</strong> image-detection systems.All States should set targets and <strong>in</strong>dica<strong>to</strong>rs of progress <strong>to</strong> determ<strong>in</strong>e <strong>the</strong> results of thisprogramme and report on <strong>the</strong>se by 2013.104|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!