to download the document in PDF format - Child Centre: Expert ...
to download the document in PDF format - Child Centre: Expert ...
to download the document in PDF format - Child Centre: Expert ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
7.2 Actions <strong>to</strong> be achieved by 2013Toge<strong>the</strong>r with all relevant stakeholders, each State should:1. Amend exist<strong>in</strong>g legislation <strong>to</strong> reflect objective, and <strong>in</strong>ternationally acceptable,measures aga<strong>in</strong>st all sexually abusive and sexually exploitative behaviours and materialsrelated <strong>to</strong> <strong>the</strong> new technologies (<strong>in</strong>clud<strong>in</strong>g virtual and car<strong>to</strong>on imagery and text),and make obta<strong>in</strong><strong>in</strong>g for self or o<strong>the</strong>rs, <strong>in</strong>tentional view<strong>in</strong>g and possession, crim<strong>in</strong>alactivities. Such legislation should also protect all victims of sexually abusive andsexually exploitative practices and ensure that law enforcement and judicial processesadopt child sensitive procedures <strong>in</strong> accordance with <strong>the</strong> Guidel<strong>in</strong>es on Justice for<strong>Child</strong> Victims and Witnesses. This should <strong>in</strong>clude children and adolescents whohave engaged <strong>in</strong> sexually abusive behaviours <strong>to</strong>wards o<strong>the</strong>rs through <strong>the</strong> medium of<strong>the</strong> new technologies.2. Demonstrate <strong>in</strong>vestment <strong>in</strong> prioritis<strong>in</strong>g children by allocat<strong>in</strong>g <strong>in</strong>creased childprotection and law enforcement resources <strong>to</strong> <strong>the</strong> identification of children whoseimages are circulat<strong>in</strong>g on <strong>the</strong> Internet and enable greater co-operation at nationaland <strong>in</strong>ternational levels.3. Initiate a programme of research across States <strong>to</strong> address:a. <strong>in</strong>herent aspects of <strong>the</strong> new technologies that appear <strong>to</strong> <strong>in</strong>crease <strong>the</strong> likelihood ofsexually exploitative and sexually abusive practices <strong>to</strong>wards children <strong>in</strong> relation <strong>to</strong><strong>the</strong> new technologies;b. <strong>the</strong> impact of technological expansion on <strong>the</strong> demographic characteristics ofchildren sexually abused and sexually exploited through <strong>the</strong> new technologies;c. <strong>the</strong> impact, on <strong>the</strong> family and wider social networks, of <strong>in</strong>creas<strong>in</strong>g crim<strong>in</strong>alisationof Internet related activityd. <strong>the</strong> role of <strong>the</strong> IT sec<strong>to</strong>r <strong>in</strong> <strong>the</strong> risk assessment and analysis of current andupcom<strong>in</strong>g products, <strong>in</strong> <strong>the</strong> use and adaptability of age verification methods andonl<strong>in</strong>e access systems, and <strong>in</strong> image-detection systems.All States should set targets and <strong>in</strong>dica<strong>to</strong>rs of progress <strong>to</strong> determ<strong>in</strong>e <strong>the</strong> results of thisprogramme and report on <strong>the</strong>se by 2013.104|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e