SlideShare a Scribd company logo
1 of 21
ITU’s Child Online Protection (COP) Initiative  17-18 June 2010, London, United Kingdom  Cristina Bueti Programme Coordinator Telecommunication and  Standardization Bureau [email_address]
ITU & Cybersecurity ,[object Object],[object Object],[object Object],[object Object],[object Object]
TUNIS COMMITMENT “ We recognize the role of information and communication technologies (ICT) in the protection of children and in enhancing the development of children. We will strengthen action to protect children from abuse and defend their rights in the context of ICT.”
World Telecommunication & Information Society Day   (WTISD) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ We must work  together like never before if we are to protect our children. In cyberspace, we really are only as strong as our weakest link; we are only as secure as our weakest hub. There's an old Swedish proverb that goes like this: "Fear less, hope more - Whine less, breathe more - Talk less, say more - Hate less, love more - And all good things are yours.“ H.M. Queen Silvia of Sweden,  Patron of WTISD 2009   http://www.itu.int/wtisd/2009/initiatives.html
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],www.itu.int/cop   Mrs Laura Chinchilla Miranda, President of Costa Rica, Patron of the ITU’s Child Online Protection (COP)  Initiative.
How many children are using the Internet? Source: ITU. Note: 2008 or latest available year.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What’s happening online?
Working together Intergovernmental organizations NGOs and Associations Industry   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Guidelines on COP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COP National Survey 2009   ,[object Object],The problems Available advice or guidelines Legal Framework, Law enforcement Request for assistance / National Focal Point Available awareness and training programmes Co-operation with the Internet industry
COP National Survey 2009   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COP National Survey 2009   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Available advice or guidelines ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COP National Survey 2009   ,[object Object],[object Object],[object Object],Available awareness and training programmes ,[object Object],[object Object],[object Object],Legal Framework, Law enforcement ,[object Object],[object Object],Co-operation with the Internet industry
Afghanistan, Andorra, Angola, Bahrain, Bangladesh, Barbados, Bolivia,  Brazil, Bulgaria, Cape Verde, Colombia, Colombia, Czech Rep., Denmark,  Dominican Rep., Ecuador, Egypt, Fiji, Grenada, Iran (Islamic Republic of),  Iraq, Israel, Latvia, Lesotho, Lesotho, Lithuania, Malaysia, Mauritius  Mexico, Moldova, Mongolia, Morocco, Myanmar, Netherlands, Norway,  Philippines, Poland, Portugal, Portugal, Qatar, Rwanda (Republic of), Samoa,  Seychelles, Slovak Republic, South Africa, Sudan, Swaziland, Sweden,  Switzerland, Trinidad and Tobago, Turkey, United Kingdom, Zambia, Zambia ,[object Object],COP National Survey 2009   ,[object Object],[object Object],[object Object],[object Object],Request for assistance
Resources from the COP Survey 2009   ,[object Object],•   Available advice or guidelines     - Name of the agency    - Internet link for the guidelines   •   Available awareness and training programmes   • Programmes/policies within schools    - Name of Child Safety Initiative   - Name of Organization • Programmes for parents • Programmes for teachers • Programmes provided by other agencies • Future planned programme/policy initiatives on Internet safety for children and young people   •   National Focal Point •National focal point or agency   •   Co-operation with the Internet industry  •Hotline or other specific mechanism for reporting suspected illegal content  •Hotline or other specific mechanism for reporting suspected illegal behavior found in the Internet •Main players in the Internet industry co-operate with your government ,[object Object]
Measuring Child Online Protection ,[object Object],[object Object],[object Object],http://www.itu.int/council/groups/wg-cop/index.html
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
“ Children everywhere have the right to a safe  environment, even in the cyberworld.  Because while the connection might be virtual,  the danger is real.” Dr Hamadoun I. Touré, ITU Secretary-General "I welcome the ITU's Child Online Protection Initiative  and I urge all States to support it." Ban Ki-moon, UN Secretary-General
More information   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank you for your attention! Contact us:  cop@itu.int

More Related Content

What's hot

CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010
segughana
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
ITU
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paper
pteromys_volans
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
segughana
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
Thomas Müller
 
Media Regulation Booklet (OCR Media Conference 2009)
Media Regulation Booklet (OCR Media Conference 2009)Media Regulation Booklet (OCR Media Conference 2009)
Media Regulation Booklet (OCR Media Conference 2009)
rikhudson
 
The role of mobile telephony and new media tools in advocating and Combating ...
The role of mobile telephony and new media tools in advocating and Combating ...The role of mobile telephony and new media tools in advocating and Combating ...
The role of mobile telephony and new media tools in advocating and Combating ...
Edward Richard Ahonobadha
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
Yury Chemerkin
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Candice Tang
 

What's hot (20)

CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010CEO-CTO-Cybersecurity-2010
CEO-CTO-Cybersecurity-2010
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
Digital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AUDigital Transformation Strategy for Africa, 2020 - 2030 by AU
Digital Transformation Strategy for Africa, 2020 - 2030 by AU
 
Online Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill DuttonOnline Harms White Paper April 2019 Bill Dutton
Online Harms White Paper April 2019 Bill Dutton
 
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
The UK "Online Harms White Paper" is out, the proposal to write a "code of pr...
 
Council of Europe - Safeguarding Human Rights on the Net (2016)
Council of Europe - Safeguarding Human Rights on the Net (2016)Council of Europe - Safeguarding Human Rights on the Net (2016)
Council of Europe - Safeguarding Human Rights on the Net (2016)
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
EUACM Cybersecurity White Paper
EUACM Cybersecurity White PaperEUACM Cybersecurity White Paper
EUACM Cybersecurity White Paper
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
Guidelines for Children on Child Online Protection
Guidelines for Children on Child Online ProtectionGuidelines for Children on Child Online Protection
Guidelines for Children on Child Online Protection
 
Media Regulation Booklet (OCR Media Conference 2009)
Media Regulation Booklet (OCR Media Conference 2009)Media Regulation Booklet (OCR Media Conference 2009)
Media Regulation Booklet (OCR Media Conference 2009)
 
The role of mobile telephony and new media tools in advocating and Combating ...
The role of mobile telephony and new media tools in advocating and Combating ...The role of mobile telephony and new media tools in advocating and Combating ...
The role of mobile telephony and new media tools in advocating and Combating ...
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
 
T0 b060000033301pdfe
T0 b060000033301pdfeT0 b060000033301pdfe
T0 b060000033301pdfe
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
 
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms SectorThe Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
The Next Six Months in Myanmar: Stakeholder Risk in the Telecoms Sector
 
DeepNines CIPA Whitepaper
DeepNines CIPA WhitepaperDeepNines CIPA Whitepaper
DeepNines CIPA Whitepaper
 
Bueti introduction
Bueti introductionBueti introduction
Bueti introduction
 
CIPA Compliance Information
CIPA Compliance InformationCIPA Compliance Information
CIPA Compliance Information
 
Network Neutrality & Spam
Network Neutrality & SpamNetwork Neutrality & Spam
Network Neutrality & Spam
 

Similar to CTO-Cybersecurity-Forum-2010-Cristina Buetti

3.4 itu cop shah
3.4 itu cop shah3.4 itu cop shah
3.4 itu cop shah
Mr Nyak
 
Doubling digital opportunities
Doubling digital opportunitiesDoubling digital opportunities
Doubling digital opportunities
Dr Lendy Spires
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)
Daniel Asher
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paper
Akshay Sinha
 

Similar to CTO-Cybersecurity-Forum-2010-Cristina Buetti (20)

Guia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / UnicefGuia de orientação para a proteção de crianças online ONU / Unicef
Guia de orientação para a proteção de crianças online ONU / Unicef
 
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyProtecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
 
3.4 itu cop shah
3.4 itu cop shah3.4 itu cop shah
3.4 itu cop shah
 
Children Online Protection
Children Online ProtectionChildren Online Protection
Children Online Protection
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
 
ITU Cybersecurity Capabilities
ITU Cybersecurity CapabilitiesITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
 
Doubling digital opportunities
Doubling digital opportunitiesDoubling digital opportunities
Doubling digital opportunities
 
An exploration of e-safety messages to young people, parents and practitioner...
An exploration of e-safety messages to young people, parents and practitioner...An exploration of e-safety messages to young people, parents and practitioner...
An exploration of e-safety messages to young people, parents and practitioner...
 
Global kids online — Project brief
Global kids online — Project briefGlobal kids online — Project brief
Global kids online — Project brief
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child Protection
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)
 
Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)Online and mobile telephone advertisement by daniel asher (cuts)
Online and mobile telephone advertisement by daniel asher (cuts)
 
Daniel asfaw acopea
Daniel asfaw   acopeaDaniel asfaw   acopea
Daniel asfaw acopea
 
GSMA - Children & Mobile Technology Presentation
GSMA - Children & Mobile Technology Presentation GSMA - Children & Mobile Technology Presentation
GSMA - Children & Mobile Technology Presentation
 
Projektfuzet angol-web
Projektfuzet angol-webProjektfuzet angol-web
Projektfuzet angol-web
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paper
 
1st Congress Speech Final
1st Congress Speech Final1st Congress Speech Final
1st Congress Speech Final
 
Robert final conference 2012 UNICEF presentation
Robert final conference 2012   UNICEF presentationRobert final conference 2012   UNICEF presentation
Robert final conference 2012 UNICEF presentation
 
Report on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdfReport on the 2021 MOCK IGF.pdf
Report on the 2021 MOCK IGF.pdf
 
Children's Rights in Digital Age
Children's Rights in Digital AgeChildren's Rights in Digital Age
Children's Rights in Digital Age
 

More from segughana

CTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-KattaniCTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-Kattani
segughana
 
CTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-ReportCTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-Report
segughana
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Boren
segughana
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
segughana
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Ward
segughana
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
segughana
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victor
segughana
 
CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des WardCTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Ward
segughana
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
segughana
 
CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwe
segughana
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
segughana
 
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John CrainCTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crain
segughana
 
CTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe TorresCTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe Torres
segughana
 
CTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will GardnerCTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will Gardner
segughana
 
CTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-OramCTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-Oram
segughana
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliams
segughana
 
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-MachdonoghCTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
segughana
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
segughana
 
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-DdosCTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
segughana
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnett
segughana
 

More from segughana (20)

CTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-KattaniCTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-Kattani
 
CTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-ReportCTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-Report
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Boren
 
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouseCTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
 
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles WardCTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Ward
 
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders JohansonCTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
 
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip VictorCTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victor
 
CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des WardCTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Ward
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwe
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John CrainCTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crain
 
CTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe TorresCTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe Torres
 
CTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will GardnerCTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will Gardner
 
CTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-OramCTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-Oram
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliams
 
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-MachdonoghCTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-DdosCTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
 
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter BurnettCTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnett
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

CTO-Cybersecurity-Forum-2010-Cristina Buetti

  • 1. ITU’s Child Online Protection (COP) Initiative 17-18 June 2010, London, United Kingdom Cristina Bueti Programme Coordinator Telecommunication and Standardization Bureau [email_address]
  • 2.
  • 3. TUNIS COMMITMENT “ We recognize the role of information and communication technologies (ICT) in the protection of children and in enhancing the development of children. We will strengthen action to protect children from abuse and defend their rights in the context of ICT.”
  • 4.
  • 5.
  • 6. How many children are using the Internet? Source: ITU. Note: 2008 or latest available year.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. “ Children everywhere have the right to a safe environment, even in the cyberworld. Because while the connection might be virtual, the danger is real.” Dr Hamadoun I. Touré, ITU Secretary-General "I welcome the ITU's Child Online Protection Initiative and I urge all States to support it." Ban Ki-moon, UN Secretary-General
  • 20.
  • 21. Thank you for your attention! Contact us: cop@itu.int

Editor's Notes

  1. I am pleased to update you on the Child Online Protection Initiative.
  2. The WSIS outcomes also specifically recognized the needs of children and young people and their protection in cyberspace. The Tunis Commitment recognized "the role of information and communication technologies (ICT) in the protection of children and in enhancing the development of children" and the need to "strengthen action to protect children from abuse and defend their rights in the context of ICT". Children are our future. This universal fact, coupled with young people’s particular vulnerability in an online environment, made a specialized child focused initiative a necessity.  The Child Online Protection (COP) is located within the framework of the larger ITU Global Cybersecurity Agenda (GCA). The legal, technical and institutional challenges posed by the issue of cybersecurity are global and far-reaching and can only be addressed through a coherent strategy taking into account the role of different stakeholders and existing initiatives, within a framework of an international collaborative network.                        The COP initiative is in line with ITU ’ s mandate to establish the foundation for a safe and secure cyberworld for future generations.
  3. Our campaign is enhanced this year through the celebration of WTISD. The theme for 2009, as you know, was “Protecting Children in Cyberspace” and this year SG has invited Ministers from all Member States to launch year long campaigns on this theme. We have transmitted a call for action: calling upon all stakeholders (policy makers, regulators, operators and industry) to promote the adoption of policies and strategies that will protect children in cyberspace and promote their safe access to online resources . Create public awareness on the issues related to protecting children in cyberspace and to identify policies, best practices, tools and resources for adaptation/use in their countries. - promote ongoing work aimed at developing Guidelines on protecting children online for policy makers and regulators. - Identify risks and vulnerabilities to children in cyberspace as the Internet and other online resources continue to expand. - Build resource repositories for common use - Promote capacity building aimed at strengthening global response in protecting children as they venture into cyberspace.
  4. The COP initiative was presented on 13 November 2008 at the ITU Council’s High Level Segment, with top ministers attending from around the world. COP is a global initiative created by ITU together with other UN agencies and partners, as part of the Global Cybersecurity Agenda, which aims to tackle cybersecurity holistically. The key objectives of the initiative are to: Identify risks and vulnerabilities to children in cyberspace; Create awareness; Develop practical tools to help minimize risk; Share knowledge and experience.
  5. ITU data show that young people are currently the main users of the Internet, especially the age group 15-24. In some countries (especially in the developed world), more children under 15 are online compared to the total population. In Switzerland, for example, there are more children in the age group under 15 online than those in the age group 15-24.
  6. So why is there a need for such an initiative? Computers have brought untold benefits to children around the world, with the number of connected households increasing each year. But while the potential for good is undisputed, it has also raised new and disturbing issues, especially where children are concerned. Just look at the numbers: In 1998, there were just 182 million people using the Internet globally By early 2009, there were over 1.5 billion Internet users worldwide According to surveys: Most of children are willing to share personal information about themselves and their family in exchange for goods and services children are increasingly being targeted by online predators. What are the online risks? Pornography While filtering programs and parental controls are getting better, many children around the world are still at risk of viewing images that they aren’t mature enough to understand or appreciate. Violence While aggression is an unfortunate part of life, the sheer range and volume of online violence is something most of us don’t want our children exposed to: images of war, domestic abuse, bigotry, misogyny and other vicious attacks on others. Online Gaming & Addiction There is a growing body of evidence that many children are developing an unhealthy addiction to spending time online. Often, this addiction takes the form of internet gaming, but essentially any online activity can become addictive. The dangers of such an addiction are an increased risk of health and social problems. Online Fraud Many fraudsters like to specifically target children, as young people often don’t hae the experience and knowledge to distinguish legitimate requests from fraudulent ones. Fraudsters can use knowledge gained from children online to steal, blackmail, terrorize and even kidnap. Cyber-bullying With the invention of the Internet and mobile technology, children today are open to bullying and intimidation wherever they are – it’s no longer merely a playground event. Surfing the internet can have severe consequences for a child’s self-confidence and personal development. Racism The Internet has given us instantaneous global access. While this can promote greater communication, understanding and respect; in some cases, this global reach makes it easier to spread racial abuse and hate.  
  7. ITU has been working with some COP members to develop initial sets of guidelines for the different stakeholders. This is a unique exercise that no one before was able achieved. Having so many stakeholders working together on the production of guidelines and reaching an agreement on the main issues surrounding child online protection. We hope that you will find them useful and that you will use them in your country.
  8. This report considers the measurement aspects of child online protection, with the ultimate aim of reliably measuring the problem and monitoring the solutions. Content and structure of this publication Chapter 2 describes a proposed statistical framework for measuring child online protection. It covers scope, actors ( e.g. children, parents), definitions, classifications, indicators and data collection models. Chapter 3 looks at measuring the context in which online threats to children arise. An important element of the context is the Internet and the rapid growth in its content and use. Chapters 4, 5 and 6 consider measurement of aspects of the statistical framework as follows: awareness, concerns and attitudes; risk-prone behaviour of children; incidents and children’s responses; and, preventative actions. The chapters include recommendations for indicators and measurement approaches. Chapter 7 looks at the statistical challenges involved in measuring child online protection, while Chapter 8 presents conclusions and summarizes the recommendations presented in the report.
  9. ITU is lobbying telecommunications administrations around the world to consider the allocation of the number 116111 to give access to helplines run by organizations dedicated to the support and welfare of children. The universal use of this number would make it easier for children to access help when they need it, wherever they are.
  10. ITU is lobbying telecommunications administrations around the world to consider the allocation of the number 116111 to give access to helplines run by organizations dedicated to the support and welfare of children. The universal use of this number would make it easier for children to access help when they need it, wherever they are.
  11. As the ITU SG has said: Children everywhere have the right to a safe environment, even in the cyberworld. Because while the connection might be virtual, the danger is real.” If I can also quote Her Majesty Queen Sylvia of Sweden, Patron of the WTISD 2009: “ We must work together like never before if we are to protect our children. In cyberspace, we really are only as strong as our weakest link; we are only as secure as our weakest hub. There's an old Swedish proverb that goes like this: "Fear less, hope more - Whine less, breathe more - Talk less, say more - Hate less, love more - And all good things are yours.“
  12. For more information, please visit the websites shown on the screen
  13. Or contact us at cop@ itu.int Thank you very much for your attention.