Policy and regulation to protect children in online environment

Policy and regulation to protect children in online environment

Strategies of policy and regulatory organizations

    Main issues to consider
 1. Legal environment  a  To update current legislations in order to make sure the power of imminent right of the law to protect under-18 children in internet-supported online mode by law enforcement organization and other relevant organizations.
   b Illegal actions against children in reality are illegal in online mode, too. Thus the procedures to protect privacy and information of under-aged children from online attack will be included in the relevant legal changes.
 2. Sources to implement laws and mechanisms to make reports  a Develop and widely announce a reporting mechanism, to establish a possibility for example to explain how to report easily if any illegal content found in internet. A simple kind of this opportunity in particular is a possibility to have a nation-wide direct phone service, which is able to detect and delete any illegal content quickly or make it unconnected
3. Issues to pay nation-wide attention  a

All the involved parties which can be relevant to the online security of children should be determined and listed, including:

  • Government organizations
  • Law enforcement organizations
  • Social service organizations
  • Internet and other electronic service providers
  • Mobile phone service providers
  • Other hi-tech companies
  • Associations and unions of teachers
  • Associations and unions of parents
  • Children and youth
  • Children care and other relevant NGOs
  • Scientific research unions
Internet café owners and other social service points, such as libraries, tele-centers, online game centers etc
  b Study possible advantages of model which can use independent and joint policy and regulation through developingand publishing specialized law to be used on practice actions in order to raise relevant issues of technical changes and increase the speed to be processed and attract and support relevant interested parties
4. Sources to provide education and knowledge a To list and use the education and experience of the interested parties, prepare internet safety information and material that included local culture and law and distribute them efficiently for all the target audience. To involve media to improve information supplement. To prepare materials that identify power to gain through using internet and its positive side, to support any responsible and positive kind of online communication
    To make roles of online security software for children and filter software understood to provide knowledge about education of internet users and providing them safe environment.
    To support internet users to install antivirus software on their computer, to update the equipment with protection software from external impacts, to update or install operation system etc

LAST UPDATE: 2014/06/19
Building resilience for climate emergencies
by ITU News Australians have been very enthusiastic adopters of cashless payments. In fact, some predict that Australia could become a cashless society by 2022. And then the fires started.
Telecoms, Coronavirus and keeping the networks running: OPINION
By Tomas Lamanauskas, Partner, Envision Associates Ltd.
COVID-19: China’s digital health strategies against the global pandemic
By ITU News Digital health technologies are critical tools in the ongoing fight against the global COVID-19 pandemic.
Reducing the global healthcare shortfall using AI
By ITU News Dr Nick Sireau finally found a way to save his children from decades of disabling pain: weed killer.
COVID-19: How mobile phone contact tracing can save lives – and preserve privacy
By ITU News Contact tracing is a key public health response to limit infectious disease outbreaks such as the global COVID-19 pandemic.
COVID-19: How tech is helping nurses
By ITU News Now more than ever, hospitals are under great stress, and the people bearing the brunt of this pandemic are the nurses and clinicians at the frontlines of patient care.
How can AI impact security? Key takeaways from an ITU Workshop.
By ITU News Artificial intelligence (AI) and machine learning have come a long way and are already being deployed by many of the world’s biggest information and telecommunication (ICT) companies to help combat the growing range of cyberattacks.
As cyber threats evolve, so does investment in new security responses
By ITU News Cyber threats are growing exponentially.
How are governments staying safe? ITU releases its third Global Cybersecurity Index.
By ITU News More than half the world is now online for the first time ever.
COVID-19: 7 key ways to keep children safe online
COVID-19: 7 key ways to keep children safe online